What should you do?

Your company has a broad, granular IT administration team, and you are in charge of ensuring proper administrative control. One of those teams, the security team, requires access to the Security Investigation Tool.

What should you do?
A . Assign the pre-built security admin role to the security team members.
B . Create a Custom Admin Role with the Security Center privileges, and then assign the role to each of the security team members.
C . Assign the Super Admin Role to the security team members.
D . Create a Custom Admin Role with the security settings privilege, and then assign the role to each of the security team members.

Answer: B

Explanation:

https://support.google.com/a/answer/9043255#:~:text=To%20give%20access%20only%20to%20the%20investigation%20tool%2C%20check%20the%20individual%20boxes%20for%C2%A0Investigation%20Tool%20privileges.%20You%20can%20add%20specific%20privileges%20for%20access%20to%20different%20types%20of%20data%20(for%20example%2C%20Gmail%2C%20Drive%2C%20Device%2C%20and%20User)%3A

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments