This article leads you through the process of integrating Google Workspace with Red Canary. Follow the procedure from beginning to end.
Note: If you don't see Google Workspace as an option, please reach out to your Red Canary account team who can talk to you about upgrading.
Step 1: Google Cloud Console–Create a project
Create a Google Cloud Console project to start sending google workspace telemetry for ingestion.
- From your Google Cloud Console dashboard, click Create Project.
- Fill in the mandatory fields:
- Project Name - The name associated with your project
- Organization - The name of your organization
- Location - Location of your organization
- Click Create.
Step 2: Google Cloud Console–Enable the Administrator software development kit (SDK)
Enable the Admin SDK to create and manage admin-controlled resources owned by a Google Workspace account.
- From your Google Cloud Console dashboard, type Admin SDK API into the search bar.
- From the Marketplace section, click Admin SDK API. Check the drop down in the top left, next to “Google Cloud” and verify that the current project matches the project created in Step 1.
- Click Enable.
Step 3: Google Cloud Console–Enable the Alert Center API
Enable the Alert Center API to create and manage alerts and issues owned by a Google Workspace account.
- From your Google Cloud Console dashboard, type Alert Center API into the search bar.
- From the Marketplace section, click Alert Center API.
- Check the drop down in the top left, next to “Google Cloud” and verify that the current project matches the project created in Step 1.
- Click Enable.
Step 4: Google Cloud Console–Create a service account
Create a service account to enable Red Canary to ingest your data.
- From your Google Cloud Console dashboard, select the project you created in Step 1.
- Click the navigation menu icon.
- Click IAM & Admin, and then click Service Accounts.
- Click Create Service Account.
- Fill in the mandatory fields:
- Service account name
- Service account ID
- Click CREATE AND CONTINUE.
- Click Done.
Step 5: Google Cloud Console–Create a private key
Create a private key so that sanctioned users can use the service account.
- From the service account you just created, click the Actions icon, and then click Manage Keys.
- Click the Add Key dropdown.
- Click Create new key.
- Select JSON, and then click Create.
- Save this .JSON file in a secure location.
Step 6: Google Cloud Console–Enable domain-wide delegation for service accounts
Enable domain wide delegation to allow applications to access user data across your organization's Google Workspace environment.
- From your Google Cloud Console dashboard, select the project you created in Step 1.
- Click the navigation menu icon.
- Click IAM & Admin, and then click Service Accounts.
- From the service account you just created, click the Actions icon, and then click Manage Details.
- Copy and save the Client ID (Same as Unique ID).
- Click View Google Workspace Admin Console.
Step 7: Google Workspace–Grant the Service Account the required API Permissions scope
Granting the service account proper permissions enables Red Canary to ingest all the necessary telemetry.
- From your Google Workspace Admin Console, click the Security dropdown.
- Click the Access and data control dropdown.
- Click API Controls.
- Scroll down, and then click Manage Domain-Wide Delegation.
- Click Add New.
- For the Client Name field, enter the Client ID from Step 6.5.
- For the OAuth scopes field, enter:
- Click Authorize.
Step 8: Google Workspace–Create a Google Workspace service account for Red Canary
The Google service account created in Step 4 requires a google workspace account to start sending telemetry to Red Canary.
Note: You can re-use an existing Google Workspace user account with Admin Console Reports permissions.
- From your Google Workspace Admin Console, click the Directory dropdown.
- From the Directory dropdown, click Users.
- Click Add new user.
- Fill in the fields to identify the Red Canary service account.
- Click ADD NEW USER.
Note: You do not need to copy or use the automatically generated password. To set your own password, click PREVIEW AND SEND. - Click Done.
- To see your new user account, refresh the Users page.
- Select the user account you just created.
- Scroll down to the Admin roles and Privileges section, and then click the Expand Roles and Privileges dropdown.
- Click Create Custom Role.
- Click Create new role.
- Enter a name for your new role.
- Enter a description for your new role.
- Click Continue.
- From the Privilege Name section, scroll down and then click the Services dropdown.
- Click the Alert Center Dropdown, and then select View Access.
- From the Privilege Name section, scroll down and select Reports.
- Click Continue.
- Click Create Role.
- Click Assign users.
- Enter the name of the new service account you created in Step 8.4.
- Click Assign Role.
Step 9: Red Canary–Integrate Google Workspace with Red Canary
Connect your Google service account key to Red Canary in order to start receiving Google Workspace alerts in Red Canary.
- From your Red Canary homepage, click Integrations.
- From the Integrations section, locate and then click the security product you want to integrate with Red Canary.
Note: If you do not see your security product listed, click See all integrations. - In the search bar, type and then select your third-party security source.
- Continue onto the next step by configuring your third-party security source in Red Canary.
Note: Your third-party security source may require that you contact Red Canary to configure. - Enter the service account key from the .JSON file you downloaded from Google Workspace in Step 5.5
- Click Save.
Comments
2 comments
Does the Google Workspace integration pull in Devices and if so, do these devices count towards the Red Canary end-point license count?
Hey Kyle, great question! We will create new "devices" when we discover them based on Google Workspace alerts, but those do not count towards your endpoint license count. Only EDR monitored endpoints count towards that number.
Please sign in to leave a comment.