Send Google Workspace data to Google Security Operations
You can use Google Security Operations to detect insider risks in your Google Workspace by configuring your Google Workspace account to forward data to your Google Security Operations instance.
This document describes how to use direct ingestion to ingest Google Workspace Activity
logs (WORKSPACE_ACTIVITIES
) into your Google Security Operations instance
from the following supported Google application types:
- Access Transparency
- Accounts
- Google Admin console
- Google Calendar
- Google Chat
- Google Chrome
- Classroom
- Google Cloud
- Access Context Manager
- Looker Studio
- Device
- Google Drive
- Gmail
- Google Groups
- Jamboard management
- LDAP
- Login
- Google Meet
- OAuth
- Password Vault
- Firewall Rules Logging
- SAML
- User accounts
- Voice
You must have Google Workspace Enterprise Standard or Enterprise Plus edition to access this integration. If you don't, you can use the feed ingestion method to ingest Google Workspace Activity logs.
Before you begin
Complete the following steps before you begin:
If you don't have a Google Security Operations instance, create a new one. For more information, see Onboarding and migrating a Google Security Operations instance.
Copy your Google Workspace Customer ID from the Google Workspace Admin console.
Obtain your Google Security Operations instance ID and token
To obtain your Google Security Operations instance ID and token, complete the following steps from your Google Security Operations account:
- Open your Google Security Operations instance.
- From the navigation bar, select Settings.
- Click Google Workspace.
- Enter your Google Workspace Customer ID.
- Click Generate Token.
- Copy the token and your Google Security Operations instance ID (located on the same page).
Link Google Workspace to your Google Security Operations instance
To send your Google Workspace data to your Google Security Operations instance, complete the following steps from the Google Workspace Admin console:
- Open the Google Workspace Admin console.
- Click Reporting.
- Click Data Integrations.
- Select Chronicle export, and then click Connect to Chronicle. This opens the Connect to Chronicle page.
- Paste the token copied from your Google Security Operations account into the indicated field. Click Connect. Export audit data to Google Security Operations should now display On. Your Google Workspace account is now linked to your Google Security Operations instance and will begin sending your Google Workspace data.
- Click Go to Chronicle to open your Google Security Operations instance and begin to monitor your Google Workspace data from Google Security Operations. For more information, see the Data Ingestion and Health dashboard.
Disconnect Google Workspace from Google Security Operations
To disconnect your Google Workspace account from your Google Security Operations instance, complete the following steps:
- Open the Google Workspace Admin console.
- Click Data Integrations.
- In the Chronicle export panel, click Disconnect from Chronicle. Export audit data to Chronicle should now display Off.
What's next
The next step is to enable the Cloud Threats category rules sets designed to help identify threats using Google Workspace data.