Having a comprehensive and structured Google backup coverage gap detection process can have many benefits for MSPs. First and foremost, it can confirm and ensure that every licensed user and dataset is protected. Administrators can more easily identify misconfigurations or coverage blind spots early, document results for audits and QBRs, and justify remediation steps or additional SaaS backup investments.
A guide on how to check Google backup data
📌 Prerequisites:
- You need to have the Super Admin role or a delegated admin with access to the Google Admin console and Vault.
- If you’re using APIs, you will need a Google Cloud project with Admin SDK Directory and Reports APIs enabled.
- OAuth 2.0 credentials for delegated access are required.
- You should have a baseline inventory of users, OUs, and groups for cross-checking.
- You should already have a spreadsheet or documentation platform to record findings.
📌 Recommended deployment strategies:
Method 1: Validate user coverage via Admin Console
- Go to Google Admin Console.
- Navigate to Menu > Directory > Users.
- Click the Download icon in the top right section.
- Select All users.
- It will give you a choice to download the data as a CSV file or to put the information in Google Sheets. Select the option most suited to your preferences and organization policies.
- Compare the data from Google Console with the data from your SaaS backup list.
- Flag any mismatched or missing entries. If they’re not in the SaaS backup file, this means that the user is not properly tied to a backup policy.
Method 2: Check organizational unit (OU) and group-based exceptions
- Go through the different organizational units and groups used to apply for backup in your organization.
- Ensure that all organizations are covered and that all users are tied to an appropriate backup policy.
- If there are users or groups that aren’t covered, flag them immediately. This can happen if the OU is new or if the users were recently moved to a new group.
- Make sure that your backup policies are consistently applied to all users, groups, and organizational units.
Method 3: Review vault retention policies
- Open Google Vault.
- Go to Retention.
- Confirm that the retention rules for Gmail, Drive, Chat, and Meet are applied consistently to all of your organizational units.
- If the rules aren’t consistently applied, document the gaps.
- Go through your documentation and modify each setting to ensure that the rules are applied consistently across all your organizational units.
Method 4: Use the admin SDK directory API to detect uncovered accounts
You can also use Windows PowerShell to run a query in the SDK directory API to find coverage gaps. Here’s a sample script you can use:
| # Example PowerShell snippet using Google Admin SDK Directory API $uri = “https://admin.googleapis.com/admin/directory/v1/users?customer=my_customer&maxResults=500” $headers = @{ Authorization = “Bearer $AccessToken” } $response = Invoke-RestMethod -Uri $uri -Headers $headers $response.users | Select-Object primaryEmail, suspended, orgUnitPath |
“Bearer $AccessToken” should be replaced with a valid API token.
This script will allow you to connect to Google Workspace using the Admin SDK API and show you a list of 500 users with their email, if they’re suspended, and which organizational unit they belong to. If you have more than 500 users, you must use nextPageToken to view the other users.
Export the data as a CSV file and compare it against the data in your backup tools. Flag any mismatched or missing accounts to see if there are uncovered users.
Method 5: Use Reports API to spot deletion risks
Frequent deletions and “Empty Trash” actions can compromise recoverability. You can use Reports API to spot actions like that using this script:
| # === CONFIGURATION === $AccessToken = “<YOUR_ACCESS_TOKEN>” # Paste your OAuth token here $Application = “admin” # ‘admin’ = Admin Console events $EventName = “DELETE_USER” # Type of deletion event $StartTime = (Get-Date).AddDays(-30).ToString(“yyyy-MM-ddTHH:mm:ssZ”) # Last 30 days $OutputCsv = “C:\Reports\UserDeletions.csv”# === INITIALIZE === $uri = “https://admin.googleapis.com/admin/reports/v1/activity/users/all/applications/$Application?eventName=$EventName&startTime=$StartTime” $headers = @{ Authorization = “Bearer $AccessToken” }$allEvents = @() $pageToken = $nullWrite-Host “Fetching deletion events from Reports API…”do { $fullUri = if ($pageToken) { “$uri&pageToken=$pageToken” } else { $uri } try { $response = Invoke-RestMethod -Uri $fullUri -Headers $headers -Method Get } catch { Write-Error “API call failed: $_” break } if ($response.items) { $pageToken = $response.nextPageToken # === EXPORT === |
This will show you all deletion events in your Google Workspace. Document patterns and ensure Vault rules or backup coverage address those situations.
Method 6: Document findings and build a gap register
When you identify a gap, you must do the following:
- Record workload/service, user or OU affected, the issue and gap that needs to be addressed, and remediation steps.
- Assign people who will work to resolve them and give them a deadline.
- Store the register in a shared doc for governance and QBR discussions.
Best practices summary table for Google Workspace backup coverage
| Component | Value Delivered |
| User list export vs. backup list | This will detect unprotected accounts and allow you to address them. |
| OU and group policy review | This prevents misconfigurations and ensures that each organizational unit and group is covered. |
| Vault retention check | This will ensure that Google Vault rules align with your organization’s. |
| Directory API queries | This will automatically detect gaps in your Google Workspace. |
| Reports API audit | This will identify risky deletion trends and give you a chance to address them. |
| Gap register | This will track remediation and encourage accountability. |
Example workflows for daily gap-detection
- Deploy a script that pulls a user list via the Admin SDK Directory API.
- Compare the user list to the user list from your SaaS backup.
- Export discrepancies into a CSV file.
- Trigger ticket creation in PSA software for uncovered accounts.
- Archive results weekly for audits.
NinjaOne integration for managing backup coverage
NinjaOne tools can help you with:
- Running scheduled scripts to query Directory or Reports APIs
- Auto-generating tickets for uncovered accounts
- Storing gap registers in NinjaOne Docs for client-facing transparency
- Including coverage compliance in QBR dashboards
- Automating reminders for quarterly coverage audits
Ensure user accounts are protected with proper SaaS governance
It’s critical to detect backup coverage gaps in your organization’s Google Workspace because it will ensure all the accounts and services you use are protected. To do that, you can use Google Admin console exports, Vault retention checks, and Admin SDK APIs. This can systematically uncover blind spots and document results for clients.
Related Links:
