Coletar dados do Chrome Enterprise
Este documento descreve como coletar registros do Google Chrome no Google SecOps usando o conector de relatórios corporativos. Ele detalha o processo de ingestão de dados para implantações do Google Chrome Enterprise Core e do Chrome Enterprise Premium, observando que alguns dados de registro avançados exigem uma licença do Chrome Enterprise Premium.
Implantação típica
Uma implantação típica consiste em uma combinação dos seguintes componentes:
Chrome: os eventos de gerenciamento do navegador Chrome e do ChromeOS que você quer coletar.
ChromeOS: é possível configurar dispositivos gerenciados com ChromeOS para enviar registros ao Google SecOps. Os dispositivos ChromeOS são opcionais.
Conector de relatórios do Chrome Enterprise: encaminha registros do Chrome para o Google SecOps.
Google SecOps: retém e analisa registros do Chrome.
Antes de começar
- Uma conta de administrador do Google Workspace.
- Google Chrome 137 ou mais recente. As versões anteriores não fornecem dados completos de URL de referenciador.
- Licenças do Chrome Enterprise Premium para recursos avançados.
- Opcional: um token de ingestão do Google SecOps. Se você usar essa opção, também vai precisar do
Customer IDdo Google Workspace no Admin Console. - Opcional: uma chave da API de ingestão do Chronicle fornecida pelo representante do Google SecOps.
Configurar o Gerenciamento de nuvem do navegador Chrome
Registre os dispositivos de destino para ativar o gerenciamento de nuvem dos navegadores Chrome. Para mais detalhes, consulte Registrar os navegadores Chrome gerenciados na nuvem.
Opcional: configure o Evidence Locker para investigar arquivos suspeitos. (somente no Chrome Enterprise Premium)
Opcional: se você usa o Identity-Aware Proxy, siga as etapas em Coletar dados de acesso com reconhecimento de contexto do Chrome Enterprise Premium para integrar esses dados ao Google SecOps.
Conectar dados do Chrome à sua instância do Google SecOps
Configure o analisador do Gerenciamento do Chrome e o conector de relatórios do Chrome Enterprise.
Configurar o analisador do Gerenciamento do Chrome
Talvez seja necessário atualizar para uma nova versão do analisador do Gerenciamento do Chrome para oferecer suporte aos registros recentes do Chrome.
- Na sua instância do Google SecOps, acesse Menu > Configurações > Analizadores.
- Encontre a entrada predefinida do Gerenciamento do Chrome e verifique se você está usando uma data de versão 2025-08-14 ou mais recente aplicando as atualizações pendentes.
Configurar o Chrome Enterprise Premium
Nesta seção, descrevemos como configurar o registro em log para o Chrome Enterprise Premium.
É possível configurar o encaminhamento de registros para o Chrome Enterprise Premium, que inclui o contexto da Navegação segura. O conector de relatórios do Chrome Enterprise para o Chrome Enterprise Premium pode configurar e, opcionalmente, encaminhar os seguintes tipos de registros:
- Falhas do navegador
- Transferências de conteúdo
- Controles de acesso aos dados
- Instalações de extensões
- Telemetria de extensão
- Atividade de login do Google
- Transferência de malware
- Violação de senha
- Senha alterada
- Reutilização de senha
- Transferência de dados confidenciais
- URL suspeito
- Visitas a sites não seguros
- Intersticial de filtragem de URL
- Navegações de URL
Configurar os dados do Chrome Enterprise Premium para exportação
Para configurar o conector de relatórios do Chrome Enterprise para o registro em log do Chrome Enterprise Premium usando as configurações de segurança recomendadas:
- No Google Admin Console, acesse Menu > Navegador Chrome > Conectores.
- No banner Apresentamos o Google SecOps para dados do Chrome Enterprise, clique em Conferir detalhes e ativar.
- Na página Ativar o Google SecOps para o Chrome Enterprise Premium, insira um Nome da configuração.
- Selecione uma opção de encaminhamento, conforme descrito em Configurar o conector de relatórios do Chrome Enterprise.
Configurar o conector de relatórios do Chrome Enterprise
O conector de relatórios do Chrome Enterprise envia dados de registro para o Google SecOps no Chrome Enterprise Premium e no Chrome Enterprise Core.
Configure o conector de relatórios do Chrome Enterprise para enviar dados do Chrome ao Google SecOps usando uma das seguintes opções:
Se você já configurou os registros de auditoria do Google Cloud para encaminhar para um Google SecOps, talvez tenha a opção de enviar registros do Chrome Enterprise Premium. Para mais detalhes, consulte
Configurar o encaminhamento do Chrome para uma instância do Google SecOps na mesma organização.Você pode usar um código de token temporário gerado pelo Google SecOps para configurar o encaminhamento para uma instância do Chrome Enterprise Premium. Para mais detalhes, consulte
Configurar o encaminhamento do Chrome para o Google SecOps usando um token de integração.Como alternativa, use uma chave de API de ingestão do Chronicle. Para mais detalhes, consulte
Configurar o encaminhamento do Chrome para o Google SecOps usando a API de ingestão do Chronicle.
Configurar o encaminhamento do Chrome para uma instância do Google SecOps na mesma organização
Você pode selecionar uma instância do Google SecOps na configuração do conector se todos os seguintes pré-requisitos forem atendidos:
A instância do Google SecOps está conectada a um projeto Google Cloud .
O projeto Google Cloud está na mesma organização que o Google Workspace que gerencia o Chrome Enterprise Premium.
Você já configurou uma integração dos registros de auditoria do Cloud dessa organização com o Google SecOps.
Se esses pré-requisitos forem atendidos, a instância do Google SecOps vai aparecer na lista de seleção em Usar instância na conta do GCP associada.
Para configurar o encaminhamento do Chrome para uma instância do Google SecOps na mesma organização, faça o seguinte:
- Digite um nome para a configuração.
- Na opção Usar instância na conta do GCP associada, selecione a instância do Google SecOps.
- Selecione os tipos de registros a serem encaminhados em Configurações de exportação de registros.
- Clique em Testar conexão.
- Clique em Ativar depois de testar a conexão.
- Clique em Concluído quando a configuração terminar.
Configurar o encaminhamento do Chrome para o Google SecOps usando um token de integração
Se a instância de destino do Google SecOps não aparecer na lista de seleção ou se você precisar encaminhar os registros do Chrome para uma instância do Google SecOps em um Google Clouddiferente, faça o seguinte:
Forneça seu ID de cliente do Google Workspace ao administrador do Google SecOps da instância de destino e peça para ele obter seu ID da instância e token do Google SecOps. Ele é válido por 24 horas.
Digite um nome para a configuração.
Selecione Usar a instância fora da sua organização.
Digite o código do token fornecido pelo administrador do Google SecOps.
Selecione os tipos de registros a serem encaminhados em Configurações de exportação de registros.
Clique em Testar conexão.
Clique em Ativar depois de testar a conexão.
Clique em Concluído quando a configuração terminar.
Configurar o encaminhamento do Chrome para o Google SecOps usando a API de ingestão do Chronicle
É possível configurar o conector de relatórios do Google Chrome usando uma chave de API de ingestão do Chronicle. Use esse método apenas se nenhum outro método de integração estiver disponível.
No Admin Console, acesse Menu > Dispositivos > Chrome > Conectores.
Clique em + Nova configuração do provedor.
No painel lateral, encontre a configuração do Google SecOps e clique em Configurar.
Insira o ID da configuração, a chave de API e o nome do host:
ID da configuração: o ID é mostrado nas páginas Configurações do usuário e navegadores e Conectores.
Chave de API: a chave de API a ser especificada ao chamar a API de ingestão do Chronicle para identificar o cliente.
Nome do host: o endpoint de API Ingestion. Para clientes nos EUA, esse valor precisa ser malachiteingestion-pa.googleapis.com. Para outras regiões, consulte a documentação de endpoints regionais.
Clique em Adicionar configuração para adicionar a nova configuração de provedor.
Coletar dados do Chrome Enterprise Premium com reconhecimento de acesso baseado no contexto
Configure feeds para ingerir conteúdo do Chrome Enterprise Premium específico para o Identity-Aware Proxy (IAP) e dados de acesso baseado no contexto.
Quem deve ativar a API Identity-Aware Proxy?
- Os clientes do Chrome Enterprise Premium que usam dados do Identity-Aware Proxy (IAP) precisam ativar essa opção.
- Para clientes do Chrome Enterprise Premium que não usam dados do Identity-Aware Proxy, ativar a API Identity-Aware Proxy é opcional, mas recomendado. Isso adiciona mais campos de dados de acesso sensíveis ao contexto aos seus dados de registro.
Para ativar a API Identity-Aware Proxy, siga as etapas em Coletar dados do Chrome Enterprise Premium Context Access Aware.
Verificar o fluxo de dados
Para verificar o fluxo de dados:
- Abra sua instância do Google SecOps.
- Acesse Menu > Pesquisar.
- Execute a seguinte consulta de pesquisa para procurar eventos brutos e não analisados:
metadata.log_type = "CHROME_MANAGEMENT"
Tipos de registros compatíveis
As seções a seguir são aplicáveis ao analisador CHROME_MANAGEMENT.
Eventos de registro aceitos
| Categoria de segurança | Tipo de evento |
|---|---|
Audit Activity |
|
ChromeOS |
Falha de login no ChromeOS Login no ChromeOS Usuário saiu do ChromeOS Usuário adicionado ao ChromeOS Usuário removido do ChromeOS ChromeOS bloqueado com sucesso ChromeOS desbloqueado com sucesso Falha ao desbloquear o ChromeOS Mudança do estado de inicialização do dispositivo ChromeOS Dispositivo USB adicionado ao ChromeOS Dispositivo USB removido do ChromeOS Mudança de status do USB no ChromeOS Host da CRD do Chrome OS iniciado Cliente da CRD do Chrome OS conectado Cliente da CRD do ChromeOS desconectado Host da CRD do ChromeOS interrompido |
Credential Security |
|
Data Protection |
|
File Transfer |
|
Malicious Activity |
|
Navigation |
|
Formatos de registro do Chrome aceitos
O analisador CHROME_MANAGEMENT é compatível com registros no formato JSON.
Exemplo de registro do Chrome com suporte
Exemplo de um registro bruto para ingestão pelo analisador Chrome Management, no formato JSON:
JSON:
{ "event": "badNavigationEvent", "time": "1622093983.104", "reason": "SOCIAL_ENGINEERING", "result": "EVENT_RESULT_WARNED", "device_name": "", "device_user": "", "profile_user": "sample@domain.io", "url": "https://test.domain.com/s/phishing.html", "device_id": "e9806c71-0f4e-4dfa-8c52-93c05420bb8f", "os_platform": "", "os_version": "", "browser_version": "109.0.5414.120", "user_agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36", "client_type": "CHROME_BROWSER_PROFILE" }
Referência de mapeamento de campos
As tabelas de mapeamento de campos a seguir são relevantes para o analisador CHROME_MANAGEMENT (tipo de registro).
Esta seção explica como o analisador do Google SecOps mapeia os campos de registro do Chrome para os campos do modelo de dados unificado (UDM) do Google SecOps nos conjuntos de dados.
Referência de mapeamento de campos: identificador de evento para tipo de evento
A tabela a seguir lista os tipos de registros CHROME_MANAGEMENT e os tipos de eventos da UDM correspondentes.
| Event Identifier | Event Type | Security Category |
|---|---|---|
badNavigationEvent - SOCIAL_ENGINEERING |
USER_RESOURCE_ACCESS |
SOCIAL_ENGINEERING |
badNavigationEvent - SSL_ERROR |
USER_RESOURCE_ACCESS |
NETWORK_SUSPICIOUS |
badNavigationEvent - MALWARE |
USER_RESOURCE_ACCESS |
SOFTWARE_MALICIOUS |
badNavigationEvent - UNWANTED_SOFTWARE |
USER_RESOURCE_ACCESS |
SOFTWARE_PUA |
badNavigationEvent - THREAT_TYPE_UNSPECIFIED |
USER_RESOURCE_ACCESS |
SOFTWARE_MALICIOUS |
browserCrashEvent |
STATUS_UPDATE |
|
browserExtensionInstallEvent |
USER_RESOURCE_UPDATE_CONTENT |
|
Extension install - BROWSER_EXTENSION_INSTALL |
USER_RESOURCE_UPDATE_CONTENT |
|
EXTENSION_REQUEST |
USER_UNCATEGORIZED |
|
CHROME_OS_ADD_USER - CHROMEOS_AFFILIATED_USER_ADDED |
USER_CREATION |
|
CHROME_OS_ADD_USER - CHROMEOS_UNAFFILIATED_USER_ADDED |
USER_CREATION |
|
ChromeOS user added - CHROMEOS_UNAFFILIATED_USER_ADDED |
USER_CREATION |
|
ChromeOS user removed - CHROMEOS_UNAFFILIATED_USER_REMOVED |
USER_DELETION |
|
CHROME_OS_REMOVE_USER - CHROMEOS_AFFILIATED_USER_REMOVED |
USER_DELETION |
|
CHROME_OS_REMOVE_USER - CHROMEOS_UNAFFILIATED_USER_REMOVED |
USER_DELETION |
|
Login events |
USER_LOGIN |
|
LOGIN_EVENT - CHROMEOS_UNAFFILIATED_LOGIN |
USER_LOGIN |
|
loginEvent |
USER_LOGIN |
|
ChromeOS login success |
USER_LOGIN |
|
CHROME_OS_LOGIN_EVENT - CHROMEOS_AFFILIATED_LOGIN |
USER_LOGIN |
|
CHROME_OS_LOGIN_EVENT - CHROMEOS_UNAFFILIATED_LOGIN |
USER_LOGIN |
|
CHROME_OS_LOGIN_EVENT - CHROMEOS_GUEST_LOGIN |
USER_LOGIN |
|
CHROME_OS_LOGIN_EVENT - CHROMEOS_KIOSK_SESSION_LOGIN |
USER_LOGIN |
|
CHROME_OS_LOGIN_EVENT - CHROMEOS_GUEST_SESSION_LOGIN |
USER_LOGIN |
|
CHROME_OS_LOGIN_EVENT - CHROMEOS_MANAGED_GUEST_SESSION_LOGIN |
USER_LOGIN |
|
ChromeOS login failure - CHROMEOS_AFFILIATED_LOGIN |
USER_LOGIN |
|
CHROME_OS_LOGIN_FAILURE_EVENT - CHROMEOS_AFFILIATED_LOGIN |
USER_LOGIN |
|
CHROME_OS_LOGIN_FAILURE_EVENT - CHROMEOS_UNAFFILIATED_LOGIN |
USER_LOGIN |
|
CHROME_OS_LOGIN_LOGOUT_EVENT - CHROMEOS_AFFILIATED_LOGIN |
USER_LOGIN |
|
CHROME_OS_LOGOUT_EVENT - CHROMEOS_AFFILIATED_LOGOUT |
USER_LOGOUT |
|
CHROME_OS_LOGOUT_EVENT - CHROMEOS_GUEST_LOGOUT |
USER_LOGOUT |
|
CHROME_OS_LOGOUT_EVENT - CHROMEOS_MANAGED_GUEST_SESSION_LOGOUT |
USER_LOGOUT |
|
CHROME_OS_LOGOUT_EVENT - CHROMEOS_UNAFFILIATED_LOGOUT |
USER_LOGOUT |
|
CHROME_OS_LOGOUT_EVENT - CHROMEOS_KIOSK_SESSION_LOGOUT |
USER_LOGOUT |
|
CHROME_OS_LOGOUT_EVENT - CHROMEOS_GUEST_SESSION_LOGOUT |
USER_LOGOUT |
|
ChromeOS logout - CHROMEOS_AFFILIATED_LOGOUT |
USER_LOGOUT |
|
CHROME_OS_REPORTING_DATA_LOST |
STATUS_UPDATE |
|
ChromeOS CRD client connected - CHROMEOS_CRD_CLIENT_CONNECTED |
USER_LOGIN |
|
ChromeOS CRD client disconnected |
USER_LOGOUT |
|
CHROME_OS_CRD_HOST_STARTED - CHROMEOS_CRD_HOST_STARTED |
STATUS_STARTUP |
|
ChromeOS CRD host started - CHROMEOS_CRD_HOST_STARTED |
STATUS_STARTUP |
|
ChromeOS CRD host stopped - CHROMEOS_CRD_HOST_ENDED |
STATUS_STARTUP |
|
ChromeOS device boot state change - CHROME_OS_VERIFIED_MODE |
SETTING_MODIFICATION |
|
ChromeOS device boot state change - CHROME_OS_DEV_MODE |
SETTING_MODIFICATION |
|
DEVICE_BOOT_STATE_CHANGE - CHROME_OS_VERIFIED_MODE |
SETTING_MODIFICATION |
|
ChromeOS lock success - CHROMEOS_AFFILIATED_LOCK_SUCCESS |
USER_LOGOUT |
|
ChromeOS unlock success - CHROMEOS_AFFILIATED_UNLOCK_SUCCESS |
USER_LOGIN |
|
ChromeOS unlock failure - CHROMEOS_AFFILIATED_LOGIN |
USER_LOGIN |
|
ChromeOS USB device added - CHROMEOS_PERIPHERAL_ADDED |
USER_RESOURCE_ACCESS |
|
ChromeOS USB device removed - CHROMEOS_PERIPHERAL_REMOVED |
USER_RESOURCE_DELETION |
|
ChromeOS USB status change - CHROMEOS_PERIPHERAL_STATUS_UPDATED |
USER_RESOURCE_UPDATE_CONTENT |
|
CHROMEOS_PERIPHERAL_STATUS_UPDATED - CHROMEOS_PERIPHERAL_STATUS_UPDATED |
USER_RESOURCE_UPDATE_CONTENT |
|
Client Side Detection |
USER_UNCATEGORIZED |
|
Content transfer |
SCAN_FILE |
|
CONTENT_TRANSFER |
SCAN_FILE |
|
contentTransferEvent |
SCAN_FILE |
|
Content unscanned |
SCAN_UNCATEGORIZED |
|
CONTENT_UNSCANNED |
SCAN_UNCATEGORIZED |
|
dataAccessControlEvent |
USER_RESOURCE_ACCESS |
|
dangerousDownloadEvent - Dangerous |
SCAN_FILE |
SOFTWARE_PUA |
dangerousDownloadEvent - DANGEROUS_HOST |
SCAN_HOST |
|
dangerousDownloadEvent - UNCOMMON |
SCAN_UNCATEGORIZED |
|
dangerousDownloadEvent - POTENTIALLY_UNWANTED |
SCAN_UNCATEGORIZED |
SOFTWARE_PUA |
dangerousDownloadEvent - UNKNOWN |
SCAN_UNCATEGORIZED |
|
dangerousDownloadEvent - DANGEROUS_URL |
SCAN_UNCATEGORIZED |
|
dangerousDownloadEvent - UNWANTED_SOFTWARE |
SCAN_FILE |
SOFTWARE_PUA |
dangerousDownloadEvent - DANGEROUS_FILE_TYPE |
SCAN_FILE |
SOFTWARE_MALICIOUS |
Desktop DLP Warnings |
USER_UNCATEGORIZED |
|
DLP_EVENT |
USER_UNCATEGORIZED |
|
interstitialEvent - Malware |
NETWORK_HTTP |
NETWORK_SUSPICIOUS |
IOS/OSX Warnings |
SCAN_UNCATEGORIZED |
|
Malware transfer - MALWARE_TRANSFER_DANGEROUS |
SCAN_FILE |
SOFTWARE_MALICIOUS |
MALWARE_TRANSFER - MALWARE_TRANSFER_UNCOMMON |
SCAN_FILE |
SOFTWARE_MALICIOUS |
MALWARE_TRANSFER - MALWARE_TRANSFER_DANGEROUS |
SCAN_FILE |
SOFTWARE_MALICIOUS |
MALWARE_TRANSFER - MALWARE_TRANSFER_UNWANTED_SOFTWARE |
SCAN_FILE |
SOFTWARE_MALICIOUS |
MALWARE_TRANSFER - MALWARE_TRANSFER_UNKNOWN |
SCAN_FILE |
SOFTWARE_MALICIOUS |
MALWARE_TRANSFER - MALWARE_TRANSFER_DANGEROUS_HOST |
SCAN_FILE |
SOFTWARE_MALICIOUS |
malwareTransferEvent - DANGEROUS |
SCAN_FILE |
SOFTWARE_MALICIOUS |
malwareTransferEvent - UNSPECIFIED |
SCAN_FILE |
SOFTWARE_MALICIOUS |
Password breach |
USER_RESOURCE_ACCESS |
|
PASSWORD_BREACH |
USER_RESOURCE_ACCESS |
|
passwordBreachEvent - PASSWORD_ENTRY |
USER_RESOURCE_ACCESS |
|
Password changed |
USER_CHANGE_PASSWORD |
|
PASSWORD_CHANGED |
USER_CHANGE_PASSWORD |
|
passwordChangedEvent |
USER_CHANGE_PASSWORD |
|
Password reuse - PASSWORD_REUSED_UNAUTHORIZED_SITE |
USER_RESOURCE_ACCESS |
POLICY_VIOLATION, AUTH_VIOLATION |
Password reuse - PASSWORD_REUSED_PHISHING_URL |
USER_UNCATEGORIZED |
PHISHING |
PASSWORD_REUSE - PASSWORD_REUSED_UNAUTHORIZED_SITE |
USER_RESOURCE_ACCESS |
POLICY_VIOLATION, AUTH_VIOLATION |
passwordReuseEvent - Unauthorized site |
USER_RESOURCE_ACCESS |
POLICY_VIOLATION, AUTH_VIOLATION |
passwordReuseEvent - PASSWORD_REUSED_PHISHING_URL |
USER_UNCATEGORIZED |
PHISHING |
passwordReuseEvent - PASSWORD_REUSED_UNAUTHORIZED_SITE |
USER_RESOURCE_ACCESS |
POLICY_VIOLATION, AUTH_VIOLATION |
Permissions Blacklisting |
RESOURCE_PERMISSIONS_CHANGE |
|
Sensitive data transfer |
SCAN_FILE |
DATA_EXFILTRATION |
SENSITIVE_DATA_TRANSFER |
SCAN_FILE |
DATA_EXFILTRATION |
sensitiveDataEvent - [test_user_5] warn |
SCAN_FILE |
DATA_EXFILTRATION |
sensitiveDataTransferEvent |
SCAN_FILE |
DATA_EXFILTRATION |
Unsafe site visit - UNSAFE_SITE_VISIT_SSL_ERROR |
USER_RESOURCE_ACCESS |
NETWORK_SUSPICIOUS |
UNSAFE_SITE_VISIT - UNSAFE_SITE_VISIT_MALWARE |
USER_RESOURCE_ACCESS |
SOFTWARE_MALICIOUS |
UNSAFE_SITE_VISIT - UNSAFE_SITE_VISIT_UNWANTED_SOFTWARE |
USER_RESOURCE_ACCESS |
SOFTWARE_SUSPICIOUS |
UNSAFE_SITE_VISIT - EVENT_REASON_UNSPECIFIED |
USER_RESOURCE_ACCESS |
|
UNSAFE_SITE_VISIT - UNSAFE_SITE_VISIT_SOCIAL_ENGINEERING |
USER_RESOURCE_ACCESS |
SOCIAL_ENGINEERING |
UNSAFE_SITE_VISIT - UNSAFE_SITE_VISIT_SSL_ERROR |
USER_RESOURCE_ACCESS |
NETWORK_SUSPICIOUS |
unscannedFileEvent - FILE_PASSWORD_PROTECTED |
SCAN_FILE |
|
unscannedFileEvent - FILE_TOO_LARGE |
SCAN_FILE |
|
urlFilteringInterstitialEvent |
USER_RESOURCE_ACCESS |
POLICY_VIOLATION |
extensionTelemetryEvent |
If the telemetry_event_signals.signal_name log field value is equal to the COOKIES_GET_ALL_INFO, COOKIES_GET_INFO, TABS_API_INFO, then the event_type set to USER_RESOURCE_ACCESS.Else, if the telemetry_event_signals.signal_name log field value is equal to REMOTE_HOST_CONTACTED_INFO, then if the telemetry_event_signals.connection_protocol log field value is equal to HTTP_HTTPS, then the event_type is set to NETWORK_HTTP.Else, the event_type UDM field is set to NETWORK_UNCATEGORIZED. |
If the telemetry_event_signals.signal_name log field value is equal to REMOTE_HOST_CONTACTED_INFO, then the security category is set to NETWORK_SUSPICIOUS.Else, if the telemetry_event_signals.signal_name log field value contain one of the following values, then the security category UDM field is set to SOFTWARE_SUSPICIOUS.
|
Referência de mapeamento de campo: CHROME_MANAGEMENT
A tabela a seguir lista os campos de registro do tipo CHROME_MANAGEMENT e os campos correspondentes da UDM.
| Log field | UDM mapping | Logic |
|---|---|---|
id.customerId |
about.resource.product_object_id |
|
event_detail |
metadata.description |
|
time |
metadata.event_timestamp |
|
events.parameters.name [TIMESTAMP] |
metadata.event_timestamp |
|
event |
metadata.product_event_type |
|
events.name |
metadata.product_event_type |
|
id.uniqueQualifier |
metadata.product_log_id |
|
|
metadata.product_name |
The metadata.product_name UDM field is set to Chrome Management. |
id.applicationName |
|
|
|
metadata.vendor_name |
The metadata.vendor_name UDM field is set to GOOGLE. |
user_agent |
network.http.user_agent |
|
userAgent |
network.http.user_agent |
|
events.parameters.name [USER_AGENT] |
network.http.user_agent |
|
events.parameters.name [SESSION_ID] |
network.session_id |
|
client_type |
principal.application |
|
clientType |
principal.application |
|
events.parameters.name [CLIENT_TYPE] |
principal.application |
|
device_id |
principal.asset.product_object_id |
|
deviceId |
principal.asset.product_object_id |
|
events.parameters.name [DEVICE_ID] |
principal.asset.product_object_id |
|
device_name |
principal.hostname |
|
deviceName |
principal.hostname |
|
events.parameters.name [DEVICE_NAME] |
principal.hostname |
|
os_platform |
principal.platform |
The principal.platform UDM field is set to one of the following values:
Else, if the os_platform log field value is not empty and osVersion log field value is not empty, then the os_platform osVersion log field is mapped to the principal.platform_version UDM field. |
os_platform |
principal.asset.platform_software.platform |
The principal.asset.platform_software.platform UDM field is set to one of the following values:
|
os_platform |
principal.asset.platform_software.platform |
The principal.asset.platform_software.platform UDM field is set to one of the following values:
|
osPlatform |
principal.platform |
The principal.platform UDM field is set to one of the following values:
Else, if the osPlatform log field value is not empty and osVersion log field value is not empty, then the osPlatform osVersion log field is mapped to the principal.platform_version UDM field. |
osPlatform |
principal.asset.platform_software.platform |
The principal.asset.platform_software.platform UDM field is set to one of the following values:
|
events.parameters.name [DEVICE_PLATFORM] |
principal.platform |
The os_platform and os_version is extracted from the events.parameters.name [DEVICE_PLATFORM] log field using Grok pattern.The principal.platform UDM field is set to one of the following values:
Else, if the os_platform log field value is not empty and osVersion log field value is not empty, then the os_platform osVersion log field is mapped to the principal.platform_version UDM field. |
events.parameters.name [DEVICE_PLATFORM] |
principal.asset.platform_software.platform |
The os_platform is extracted from the events.parameters.name [DEVICE_PLATFORM] log field using Grok pattern.The principal.asset.platform_software.platform UDM field is set to one of the following values:
|
os_version |
principal.platform_version |
|
osVersion |
principal.platform_version |
|
events.parameters.name [DEVICE_PLATFORM] |
principal.platform_version |
The Version is extracted from the events.parameters.name [DEVICE_PLATFORM] log field using Grok pattern. |
device_id |
principal.resource.id |
|
deviceId |
principal.resource.id |
|
events.parameters.name [DEVICE_ID] |
principal.resource.id |
|
directory_device_id |
principal.resource.product_object_id |
|
events.parameters.name [DIRECTORY_DEVICE_ID] |
principal.resource.product_object_id |
|
|
principal.resource.resource_subtype |
If the event log field value is equal to CHROMEOS_PERIPHERAL_STATUS_UPDATED, then the principal.resource.resource_subtype UDM field is set to USB.Else, if the events.name log field value is equal to CHROMEOS_PERIPHERAL_STATUS_UPDATED, then the principal.resource.resource_subtype UDM field is set to USB. |
|
principal.resource.resource_type |
If the device_id log field value is not empty, then the principal.resource.resource_type UDM field is set to DEVICE. |
actor.email |
principal.user.email_addresses |
|
actor.profileId |
principal.user.userid |
|
result |
security_result.action_details |
|
events.parameters.name [EVENT_RESULT] |
security_result.action_details |
|
event_result |
security_result.action_details |
|
|
security_result.action |
The security_result.action UDM field is set to one of the following values:
|
reason |
security_result.category_details |
|
events.parameters.name [EVENT_REASON] |
security_result.category_details |
|
events.parameters.name [EVENT_REASON] |
security_result.summary |
|
events.parameters.name [LOGIN_FAILURE_REASON] |
security_result.description |
|
events.parameters.name [REMOVE_USER_REASON] |
security_result.description |
If the events.name log field value is equal to CHROME_OS_REMOVE_USER, then the events.parameters.name REMOVE_USER_REASON log field value is mapped to the security_result.description UDM field. |
triggered_rules |
security_result.rule_name |
|
events.type |
security_result.category_details |
|
events.parameters.name [PRODUCT_NAME] |
target.application |
If the events.name log field value contains one of the following values, then the events.parameters.name [PRODUCT_NAME] log field is mapped to the target.resource.name UDM field:
|
content_name |
target.file.full_path |
|
contentName |
target.file.full_path |
|
events.parameters.name [CONTENT_NAME] |
target.file.full_path |
|
content_type |
target.file.mime_type |
|
contentType |
target.file.mime_type |
|
events.parameters.name [CONTENT_TYPE] |
target.file.mime_type |
|
content_hash |
target.file.sha256 |
|
events.parameters.name [CONTENT_HASH] |
target.file.sha256 |
|
content_size |
target.file.size |
|
contentSize |
target.file.size |
|
events.parameters.name [CONTENT_SIZE] |
target.file.size |
|
|
target.file.file_type |
The fileType is extracted from the content_name log field using Grok pattern, Then target.file.file_type UDM field is set to one of the following values:
|
extension_id |
target.resource.product_object_id |
|
events.parameters.name [APP_ID] |
target.resource.product_object_id |
|
extension_name |
target.resource.name |
If the event log field value is equal to badNavigationEvent or the events.name log field value is equal to badNavigationEvent, then the extension_name log field is mapped to the target.resource.name UDM field. |
telemetry_event_signals.signal_name |
target.resource.name |
If the event log field value is equal to extensionTelemetryEvent, then the telemetry_event_signals.signal_name log field is mapped to the target.resource.name UDM field. |
events.parameters.name [APP_NAME] |
target.resource.name |
|
url |
target.url |
|
events.parameters.name [URL] |
target.url |
|
telemetry_event_signals.url |
target.url |
If the telemetry_event_signals.url log field value matches the regular expression pattern the [http:\/\/ or https:\/\/].*, then the telemetry_event_signals.url log field is mapped to the target.url UDM field. |
device_user |
target.user.userid |
|
deviceUser |
principal.user.userid |
If the event log field value is equal to passwordChangedEvent, then the deviceUser log field is mapped to the principal.user.userid UDM field.Else, the deviceUser log field is mapped to the principal.user.user_display_name UDM field. |
events.parameters.name [DEVICE_USER] |
If the event log field value is equal to passwordChangedEvent, then the events.parameters.name [DEVICE_USER] log field is mapped to the principal.user.userid UDM field.Else, the events.parameters.name [DEVICE_USER] log field is mapped to the principal.user.user_display_name UDM field. |
|
scan_id |
about.labels [scan_id] |
|
events.parameters.name [CONNECTION_TYPE] |
about.labels [connection_type] |
|
etag |
about.labels [etag] |
|
kind |
about.labels [kind] |
|
actor.key |
principal.user.attribute.labels [actor_key] |
|
actor.callerType |
principal.user.attribute.labels [actor_callerType] |
|
events.parameters.name [EVIDENCE_LOCKER_FILEPATH] |
security_result.about.labels [evidence_locker_filepath] |
|
federated_origin |
security_result.about.labels [federated_origin] |
|
is_federated |
security_result.about.labels [is_federated] |
|
destination |
security_result.about.labels [trigger_destination] |
|
events.parameters.name [TRIGGER_DESTINATION] |
security_result.about.labels [trigger_destination] |
|
source |
security_result.about.labels [trigger_source] |
|
events.parameters.name [TRIGGER_SOURCE] |
security_result.about.labels [trigger_source] |
|
trigger_type |
security_result.about.labels [trigger_type] |
|
trigger_type |
additional.fields [trigger_type] |
|
triggerType |
security_result.about.labels [trigger_type] |
|
triggerType |
additional.fields [trigger_type] |
|
events.parameters.name [TRIGGER_TYPE] |
security_result.about.labels [trigger_type] |
|
trigger_user |
security_result.about.labels [trigger_user] |
|
events.parameters.name [TRIGGER_USER] |
security_result.about.labels [trigger_user] |
|
events.parameters.name [MALWARE_CATEGORY] |
security_result.threat_name |
|
events.parameters.name [MALWARE_FAMILY] |
security_result.detection_fields [malware_family] |
|
events.parameters.name [VENDOR_ID] |
src.labels [vendor_id] |
|
events.parameters.name [VENDOR_NAME] |
src.labels [vendor_name] |
|
events.parameters.name [VIRTUAL_DEVICE_ID] |
src.labels [virtual_device_id] |
|
events.parameters.name [VIRTUAL_DEVICE_ID] |
additional.fields [virtual_device_id] |
|
events.parameters.name [NEW_BOOT_MODE] |
target.asset.attribute.labels [new_boot_mode] |
|
events.parameters.name [PREVIOUS_BOOT_MODE] |
target.asset.attribute.labels [previous_boot_mode] |
|
id.time |
target.asset.attribute.labels [timestamp] |
|
events.parameters.name [PRODUCT_ID] |
target.labels [product_id] |
If the events.name log field value contains one of the following values, then the events.parameters.name [PRODUCT_ID] log field is mapped to the target.resource.product_object_id UDM field:
Else, the events.parameters.name [PRODUCT_ID] log field is mapped to the target.labels UDM field. |
|
extensions.auth.mechanism |
If the events.name log field value contains one of the following values, then the extensions.auth.mechanism UDM field is set to USERNAME_PASSWORD:
|
events.parameters.name [UNLOCK_TYPE] |
target.labels [unlock_type] |
|
extension_description |
target.resource.attribute.labels [extension_description] |
|
extension_action |
target.resource.attribute.labels [extension_action] |
|
extension_version |
target.resource.attribute.labels [extension_version] |
If the event log field value is not equal to extensionTelemetryEvent, then the extension_version log field is mapped to the target.resource.attribute.labels[extension_version] UDM field. |
extension_source |
target.resource.attribute.labels[extension_source] |
If the event log field value is not equal to extensionTelemetryEvent, then the extension_source log field is mapped to the target.resource.attribute.labels[extension_source] UDM field. |
browser_version |
target.resource.attributes.labels [browser_version] |
|
browserVersion |
target.resource.attributes.labels [browser_version] |
|
events.parameters.name [BROWSER_VERSION] |
target.resource.attributes.labels [browser_version] |
|
profile_user |
target.user.email_addresses |
If the event log field value contain one of the following values and the profile_user log field value matches the regular expression pattern ^.+@.+$, then the profile_user log field is mapped to the target.user.email_addresses UDM field.
|
profile_user |
principal.user.email_addresses |
If the event log field value does not contain one of the following values and the profile_user log field value matches the regular expression pattern ^.+@.+$ and the actor.email log field value is not equal to the profile_user, then the profile_user log field is mapped to the principal.user.email_addresses UDM field.
|
profile_user |
target.user.attribute.labels[profile_user_name] |
If the event log field value contain one of the following values and the profile_user log field value does not match the regular expression pattern ^.+@.+$, then the profile_user log field is mapped to the target.user.attribute.labels.profile_user_name UDM field.
|
profile_user |
principal.user.attribute.labels[profile_user_name] |
If the event log field value does not contain one of the following values and the profile_user log field value does not match the regular expression pattern ^.+@.+$ or the actor.email log field value is equal to the profile_user, then the profile_user log field is mapped to the principal.user.attribute.labels.profile_user_name UDM field.
|
events.parameters.name [PROFILE_USER_NAME] |
target.user.email_addresses |
If the event log field value contain one of the following values and the events.parameters.name [PROFILE_USER_NAME] log field value matches the regular expression pattern ^.+@.+$, then the events.parameters.name [PROFILE_USER_NAME] log field is mapped to the target.user.email_addresses UDM field.
|
events.parameters.name [PROFILE_USER_NAME] |
principal.user.email_addresses |
If the event log field value does not contain one of the following values and the events.parameters.name [PROFILE_USER_NAME] log field value matches the regular expression pattern ^.+@.+$ and the actor.email log field value is not equal to the events.parameters.name [PROFILE_USER_NAME], then the events.parameters.name [PROFILE_USER_NAME] log field is mapped to the principal.user.email_addresses UDM field.
|
events.parameters.name [PROFILE_USER_NAME] |
target.user.attribute.labels[profile_user_name] |
If the event log field value contain one of the following values and the events.parameters.name [PROFILE_USER_NAME] log field value does not match the regular expression pattern ^.+@.+$, then the events.parameters.name [PROFILE_USER_NAME] log field is mapped to the target.user.attribute.labels.profile_user_name UDM field.
|
events.parameters.name [PROFILE_USER_NAME] |
principal.user.attribute.labels[profile_user_name] |
If the event log field value does not contain one of the following values and the events.parameters.name [PROFILE_USER_NAME] log field value does not match the regular expression pattern ^.+@.+$ or the actor.email log field value is equal to the events.parameters.name [PROFILE_USER_NAME], then the events.parameters.name [PROFILE_USER_NAME] log field is mapped to the principal.user.attribute.labels.profile_user_name UDM field.
|
|
target.resource.resource_type |
If the events.name log field value is equal to DEVICE_BOOT_STATE_CHANGE, then the target.resource.resource_type UDM field is set to SETTING. |
url_category |
target.labels [url_category] |
|
browser_channel |
target.resource.attribute.labels [browser_channel] |
|
report_id |
target.labels [report_id] |
|
clickedThrough |
target.labels [clickedThrough] |
|
threat_type |
security_result.detection_fields [threatType] |
|
triggered_rule_info.action |
security_result.action |
If the triggered_rule_info.action log field value contains one of the following values, then the triggered_rule_info.action log field is mapped to the security_result.action UDM field:
Else, the triggered_rule_info.action log field is mapped to the security_result.rule_labels [triggeredRuleInfo_action] UDM field. |
triggered_rule_info.rule_id |
security_result.rule_id |
|
triggered_rule_info.rule_name |
security_result.rule_name |
|
triggered_rule_info.url_category |
security_result.category_details |
|
transfer_method |
additional.fields [transfer_method] |
|
extension_name |
target.resource_ancestors.name |
If the event log field value is equal to extensionTelemetryEvent, then the extension_name log field is mapped to the target.resource_ancestors.name UDM field. |
extension_id |
target.resource_ancestors.product_object_id |
If the event log field value is equal to extensionTelemetryEvent, then the extension_id log field is mapped to the target.resource_ancestors.product_object_id UDM field. |
extension_version |
target.resource_ancestors.attribute.labels[extension_version] |
If the event log field value is equal to extensionTelemetryEvent, then the extension_version log field is mapped to the target.resource_ancestors.attribute.labels[extension_version] UDM field. |
extension_source |
target.resource_ancestors.attribute.labels[extension_source] |
If the event log field value is equal to extensionTelemetryEvent, then the extension_source log field is mapped to the target.resource_ancestors.attribute.labels[extension_source] UDM field. |
profile_identifier |
additional.fields[profile_identifier] |
|
extension_files_info.file_name |
target.resource_ancestors.file.names |
|
extension_files_info.file_hash.hash |
target.resource_ancestors.attribute.labels[file_hash] |
|
telemetry_event_signals.count |
target.resource.attribute.labels[count] |
|
telemetry_event_signals.tabs_api_method |
target.resource.attribute.labels[tabs_api_method] |
|
|
target.hostname |
If the telemetry_event_signals.url log field value does not match the regular expression pattern the [http:\/\/ or https:\/\/].*, then the telemetry_event_signals.url log field is mapped to the target.hostname UDM field. |
telemetry_event_signals.destination |
target.resource.attribute.labels[destination] |
|
telemetry_event_signals.source |
target.resource.attribute.labels[source] |
|
telemetry_event_signals.domain |
target.domain.name |
|
telemetry_event_signals.cookie_name |
target.resource.attribute.labels[cookie_name] |
|
telemetry_event_signals.cookie_path |
target.resource.attribute.labels[cookie_path] |
|
telemetry_event_signals.cookie_is_secure |
target.resource.attribute.labels[cookie_is_secure] |
|
telemetry_event_signals.cookie_store_id |
target.resource.attribute.labels[cookie_store_id] |
|
telemetry_event_signals.cookie_is_session |
target.resource.attribute.labels[cookie_is_session] |
|
telemetry_event_signals.connection_protocol |
network.application_protocol |
If the telemetry_event_signals.connection_protocol log field value is equal to HTTP_HTTPS, then the network.application_protocol UDM field is set to HTTP Else, If the telemetry_event_signals.connection_protocol log field value is equal to UNSPECIFIED, then the network.application_protocol UDM field is set to UNKNOWN_APPLICATION_PROTOCOLElse, the telemetry_event_signals.connection_protocol log field is mapped to the target.resource.attribute.labels UDM field. |
telemetry_event_signals.contacted_by |
target.resource.attribute.labels[contacted_by] |
|
local_ips |
principal.ip |
If the event log field value is equal to extensionTelemetryEvent, then the local_ips log field is mapped to the principal.ip UDM field. |
remote_ip |
target.ip |
If the event log field value is equal to extensionTelemetryEvent, then the remote_ip log field is mapped to the target.ip UDM field. |
device_fqdn |
principal.asset.attribute.labels |
If the event log field value is equal to extensionTelemetryEvent, then the device_fqdn log field is mapped to the principal.asset.attribute.labels UDM field. |
network_name |
principal.network.carrier_name |
If the event log field value is equal to extensionTelemetryEvent, then the network_name log field is mapped to the principal.network.carrier_name UDM field. |
web_app_signed_in_account |
target.user.email_addresses |
If the event log field value contains one of the following values, then the web_app_signed_in_account log field is mapped to the target.user.email_addresses UDM field:
|
Referência de mapeamento de campo (versão prévia)
Todos os campos são aplicáveis a clientes do Chrome Enterprise Core e do Chrome Enterprise Premium. Os campos aplicáveis apenas a clientes do Chrome Enterprise Premium são marcados como "[Somente CEP]".
Referência de mapeamento de campo: CHROME_MANAGEMENT (versão de prévia)
A tabela a seguir lista os campos de registro do tipo CHROME_MANAGEMENT e os campos correspondentes da UDM.
| Log field | UDM mapping | Logic |
|---|---|---|
pehash_sha256 |
about.file.sha256 |
[CEP Only] The SHA256 file hash (pehash_sha256) reported from a dangerousDownloadEvent
or contentTransferEvent. |
device_fqdn |
principal.asset.attribute.labels |
[CEP Only] The device's fully qualified domain name reported in a urlNavigationEvent,
suspiciousUrlEvent, or urlFilteringInterstitialEvent. Not reported for unmanaged devices
with managed user profiles. |
network_name |
principal.network.carrier_name |
[CEP Only] The network name (SSID) the device is connected to reported in a
urlNavigationEvent, suspiciousUrlEvent, or urlFilteringInterstitialEvent.
|
content_risk.threat_type |
security_result.threat_name |
[CEP Only] The threat type of the content reported in a dangerousDownloadEvent or
contentTransferEvent. |
content_risk_level, content_risk.risk_level |
security_result.severity |
[CEP Only] The content risk level reported by Safe Browsing in a dangerousDownloadEvent or
contentTransferEvent. |
content_risk.risk_reasons |
security_result.rule_label |
[CEP Only] The content risk reason reported by Safe Browsing in a dangerousDownloadEvent or
contentTransferEvent. |
content_risk.risk_indicators |
security_result.detection_fields[content_risk_indicators] |
[CEP Only] The list of indicators from the Safe Browsing risk level in a dangerousDownloadEvent or
contentTransferEvent. |
content_risk.risk_source |
security_result.detection_fields[content_risk_source] |
[CEP Only] The risk source of the content reported by Safe Browsing in a dangerousDownloadEvent or
contentTransferEvent. |
is_encrypted |
additional.fields[is_encrypted] |
[CEP Only] Set to true if the content is encrypted in dangerousDownloadEvent or
contentTransferEvent. |
server_scan_status |
additional.fields[server_scan_status] |
[CEP Only] The status of whether the content in dangerousDownloadEvent or
contentTransferEvent was successfully scanned by Safe Browsing. |
url_info.url |
principal.url |
[CEP Only] The URL of dangerousDownloadEvent, contentTransferEvent,
urlNavigationEvent, suspiciousUrlEvent, or urlFilteringInterstitialEvent.
|
url_info.ip |
principal.ip |
[CEP Only] The IP address of dangerousDownloadEvent, contentTransferEvent,
urlNavigationEvent, suspiciousUrlEvent, or urlFilteringInterstitialEvent.
|
url_info.type |
principal.security_result.detection_fields[url_info_type] |
[CEP Only] The URL type (download, tab, or redirect) of dangerousDownloadEvent,
contentTransferEvent, urlNavigationEvent, suspiciousUrlEvent, or
urlFilteringInterstitialEvent. |
url_info.risk_level |
principal.security_result.severity |
[CEP Only] The risk level of the URL reported by Safe Browsing. |
url_info.risk_infos.risk_level |
principal.security_result.severity |
[CEP Only] Additional risk information reported by Safe Browsing. |
url_info.navigation_initiator.initiator_type |
principal.security_result.detection_fields[url_info_initiator_type] |
[CEP Only] This maps the url_info_initiator_type in a dangerousDownloadEvent or
contentTransferEvent. In a urlNavigationEvent, suspiciousUrlEvent, or
urlFilteringInterstitialEvent this maps the url_navigation_initiator. |
url_info.navigation_initiator.entity |
principal.security_result.detection_fields[url_info_entity] |
[CEP Only] This maps the url_info_entity in a dangerousDownloadEvent or
contentTransferEvent. In a urlNavigationEvent, suspiciousUrlEvent, or
urlFilteringInterstitialEvent this maps the url_infos_navigation_entity. |
url_info.request_http_method |
principal.security_result.detection_fields[url_info_request_http_method] |
[CEP Only] The HTTP method used to contact the URL. |
url_info.url_categories |
principal.url_metadata.categories |
[CEP Only] The URL category reported by Safe Browsing of urlNavigationEvent or
suspiciousUrlEvent. |
url_info.risk_infos.risk_indicators |
principal.security_result.detection_fields[url_info_risk_infos_risk_indicators_key] |
[CEP Only] The URL risk indicators reported by Safe Browsing of urlNavigationEvent or
suspiciousUrlEvent. |
url_info.risk_infos.risk_reasons |
principal.security_result.rule_label[risk_reason] |
[CEP Only] The Safe Browsing reason for the URL risk classification of urlNavigationEvent or
suspiciousUrlEvent. |
url_info.risk_infos.risk_source |
principal.security_result.detection_fields[content_risk_source] |
[CEP Only] The risk source determination reported by Safe Browsing. This includes URL and file reputation
and content scanning results for urlNavigationEvent, suspiciousUrlEvent, or
urlFilteringInterstitialEvent. |
url_info.risk_infos.threat_type |
security_result.threat_name |
[CEP Only] The threat type reported by Safe Browsing of the URL for urlNavigationEvent,
suspiciousUrlEvent, or urlFilteringInterstitialEvent. |
tab_url_info.url, tab_url, referrers.url |
about.url |
[CEP Only] Maps the tab_url_info.url of dangerousDownloadEvent or
contentTransferEvent. Maps the referrers.url of a urlNavigationEvent, or
suspiciousUrlEvent. |
tab_url_info.ip, referrers.ip |
about.ip |
[CEP Only] Maps the tab_url_info_ip IP address associated with dangerousDownloadEvent
or contentTransferEvent. Maps the IP address of referrers.ip
in urlNavigationEvent or suspiciousUrlEvent. |
remote_ip |
target.ip |
[CEP Only] If the event log field value contains one of the following values, then the remote_ip log field is mapped to the target.ip UDM field:
|
tab_url_info.type |
about.security_result.detection_fields[tab_url_info_type] |
[CEP Only] The URL tab type for dangerousDownloadEvent or contentTransferEvent.
|
tab_url_info.risk_level |
about.security_result.severity |
[CEP Only] The Safe Browsing risk level associated with the URL from a tab event for
dangerousDownloadEvent or contentTransferEvent. |
tab_url_info.navigation_initiator.initiator_type |
about.security_result.detection_fields[tab_url_info_initiator_type] |
[CEP Only] The initiator type of the tab event for dangerousDownloadEvent or
contentTransferEvent. |
tab_url_info.navigation_initiator.entity |
about.security_result.detection_fields[tab_url_info_entity] |
[CEP Only] The tab_url_info_entity for dangerousDownloadEvent or
contentTransferEvent. |
tab_url_info.request_http_method |
about.security_result.detection_fields[tab_url_info_request_http_method] |
[CEP Only] The HTTP method a tab used to contact the URL of dangerousDownloadEvent or
contentTransferEvent. |
referrers.navigation_initiator.entity |
about.security_result.detection_fields[referrers_navigation_initiator_entity] |
[CEP Only] The referrer entity name that initiated the navigation event for
urlNavigationEvent or suspiciousUrlEvent. |
referrers.navigation_initiator.initiator_type |
about.security_result.detection_fields[referrers_navigation_initiator_initiator_type] |
[CEP Only] The referrer type that initiated urlNavigationEvent or
suspiciousUrlEvent. |
referrers.request_http_method |
about.security_result.detection_fields[referrers_request_http_method] |
[CEP Only] The HTTP method of urlNavigationEvent or suspiciousUrlEvent. |
referrers.risk_infos.risk_categories |
about.security_result.detection_fields[referrers_risk_infos_risk_categories] |
[CEP Only] The URL category of the referrer, as provided by the Safe Browsing service, associated with urlNavigationEvent or suspiciousUrlEvent. |
referrers.risk_infos.risk_level, referrers.risk_level |
about.security_result.severity |
[CEP Only] Maps the risk level provided by Safe Browsing referrers.risk_level for a
urlNavigationEvent or suspiciousUrlEvent or
referrers.risk_infos.risk_level for urlNavigationEvent or
suspiciousUrlEvent. |
referrers.type |
about.security_result.detection_fields[referrers_type] |
[CEP Only] The URL type provided by Safe Browsing of the referrer URL of urlNavigationEvent or
suspiciousUrlEvent. |
referrers.risk_infos.risk_source |
about.security_result.detection_fields[referrers_risk_source] |
[CEP Only] The risk source provided by Safe Browsing for the referrer URL of urlNavigationEvent or
suspiciousUrlEvent. |
referrers.risk_infos.threat_type |
about.security_result.threat_name |
[CEP Only] The threat type provided by Safe Browsing for the referrer URL of urlNavigationEvent or
suspiciousUrlEvent. |
referrers.url_categories |
about.url_metadata.categories |
[CEP Only] The URL category provided by Safe Browsing for the referrer URL of urlNavigationEvent or
suspiciousUrlEvent. |
Precisa de mais ajuda? Receba respostas de membros da comunidade e profissionais do Google SecOps.