aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • Engineering

Extend Chrome Security Reporting To CrowdStrike Falcon LogScale

  • aster.cloud
  • December 3, 2022
  • 3 minute read

Security insights are a critical piece of a secure enterprise browsing solution. Integrating your chosen security solution with Chrome, made possible by Chrome Enterprise Connectors Framework, gives IT and security teams a birds-eye view of the potential threats users face on the web and make data-driven decisions in their security journey.

We’re pleased to share that the Chrome and CrowdStrike Falcon LogScale integration is now available in the Google Admin console in Chrome Browser Cloud Management. Organizations can now easily set up the integration to extract and analyze insights from security events within managed Chrome browsers.Available Security Events


Partner with aster.cloud
for your next big idea.
Let us know here.



From our partners:

CITI.IO :: Business. Institutions. Society. Global Political Economy.
CYBERPOGO.COM :: For the Arts, Sciences, and Technology.
DADAHACKS.COM :: Parenting For The Rest Of Us.
ZEDISTA.COM :: Entertainment. Sports. Culture. Escape.
TAKUMAKU.COM :: For The Hearth And Home.
ASTER.CLOUD :: From The Cloud And Beyond.
LIWAIWAI.COM :: Intelligence, Inside and Outside.
GLOBALCLOUDPLATFORMS.COM :: For The World's Computing Needs.
FIREGULAMAN.COM :: For The Fire In The Belly Of The Coder.
ASTERCASTER.COM :: Supra Astra. Beyond The Stars.
BARTDAY.COM :: Prosperity For Everyone.

  • Malware transfer
  • Password changed
  • Unapproved password reuse
  • Unsafe site visit
  • Log-in events
  • Password breaches
  • Extension installs (coming soon)
  • Crash events (coming soon)

Enrolling machines in Chrome Browser Cloud Management

Getting started is easy. The first step is to make sure Chrome Browser Cloud Management is set up for your organization. This tool helps manage Chrome browser from a single, cloud-based Admin console across Windows, Mac, Linux, Android and iOS at no additional cost. This is the same console where IT teams can also manage Chrome OS.

Check out this guide for steps on how to enroll your devices. Once you are done, or if you already have Chrome Browser Cloud Management in place, move to the steps below.

Setup in CrowdStrike Falcon LogScale instance

  1. Log into your CrowdStrike Falcon LogScale instance.
  2. You will need to create a new repository for your Google Chrome data.
  3. Once you’ve created a new repository, under packages, click on the Marketplace section.
  4. Search for Chrome, then install the CrowdStrike Falcon LogScale package for google/chrome-enterprise. When choosing the package, the README provides information about the package contents and other related information.
  5. After installing the package, under Ingest, click on Ingest tokens and click the Add token button. Give it a name and type in Chrome under the assigned parsers.
  6. Select the Google_Chrome_Enterprise parser. Click on the eye icon to bring up the token value.
  7. Hit the copy button and save the token value, as you will be entering this into the admin console in the following section
Read More  Using AI To Increase Asset Utilization And Production Uptime For Manufacturers

 

Setup in Chrome Browser Cloud Management 
  1. Log into the Google Admin console at admin.google.com and select the organizational unit containing the enrolled browsers you want to send security events to CrowdStrike.
  2. Navigate to Devices>Chrome>Users and browsers. Add a filter for “event reporting.”
  3. Under events reporting, select Enable event reporting. Under the additional settings, you can specify which events you want to send to CrowdStrike.
  4. Now that the events are turned on, click on the blue hyperlink called “Reporting connector provider configurations” to take you to the connector provider configurations, or it can be found under Devices>Chrome>Connectors.
  5. Click the New Provider Configuration button and select CrowdStrike as the provider.
  6. Enter the configuration name that you want this connector to display as in the Google Admin console.
  7. Enter the host name of your CrowdStrike instance (most likely cloud.us.humio.com orsa-cluster.humio-support.com or your on-prem instance) and the ingest token value from step 7 of the last section
  8. Press the Add Configuration to save.
  9. Select the Organizational Unit where the reporting events are turned on, select the Chrome CrowdStrike connector created in the previous step, and hit Save.

You can also download the setup guide here or watch the setup of integration with CrowdStrike Falcon LogScale end-to-end in the video below:

 

Chrome is continuously working with other partners to expand the security ecosystem to help businesses work safer on the web. Learn more about Chrome browser security. 

By: Fletcher Oliver (Chrome Browser Customer Engineer)
Source: Google Cloud Blog


For enquiries, product placements, sponsorships, and collaborations, connect with us at [email protected]. We'd love to hear from you!

Our humans need coffee too! Your support is highly appreciated, thank you!

aster.cloud

Related Topics
  • Chrome Enterprise
  • CrowdStrike
  • Google Cloud
  • Security
You May Also Like
View Post
  • Engineering

Just make it scale: An Aurora DSQL story

  • May 29, 2025
View Post
  • Engineering
  • Technology

Guide: Our top four AI Hypercomputer use cases, reference architectures and tutorials

  • March 9, 2025
View Post
  • Computing
  • Engineering

Why a decades old architecture decision is impeding the power of AI computing

  • February 19, 2025
View Post
  • Engineering
  • Software Engineering

This Month in Julia World

  • January 17, 2025
View Post
  • Engineering
  • Software Engineering

Google Summer of Code 2025 is here!

  • January 17, 2025
View Post
  • Data
  • Engineering

Hiding in Plain Site: Attackers Sneaking Malware into Images on Websites

  • January 16, 2025
View Post
  • Computing
  • Design
  • Engineering
  • Technology

Here’s why it’s important to build long-term cryptographic resilience

  • December 24, 2024
IBM and Ferrari Premium Partner
View Post
  • Data
  • Engineering

IBM Selected as Official Fan Engagement and Data Analytics Partner for Scuderia Ferrari HP

  • November 7, 2024

Stay Connected!
LATEST
  • 1
    Just make it scale: An Aurora DSQL story
    • May 29, 2025
  • 2
    Reliance on US tech providers is making IT leaders skittish
    • May 28, 2025
  • Examine the 4 types of edge computing, with examples
    • May 28, 2025
  • AI and private cloud: 2 lessons from Dell Tech World 2025
    • May 28, 2025
  • 5
    TD Synnex named as UK distributor for Cohesity
    • May 28, 2025
  • Weigh these 6 enterprise advantages of storage as a service
    • May 28, 2025
  • 7
    Broadcom’s ‘harsh’ VMware contracts are costing customers up to 1,500% more
    • May 28, 2025
  • 8
    Pulsant targets partner diversity with new IaaS solution
    • May 23, 2025
  • 9
    Growing AI workloads are causing hybrid cloud headaches
    • May 23, 2025
  • Gemma 3n 10
    Announcing Gemma 3n preview: powerful, efficient, mobile-first AI
    • May 22, 2025
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • Understand how Windows Server 2025 PAYG licensing works
    • May 20, 2025
  • By the numbers: How upskilling fills the IT skills gap
    • May 21, 2025
  • 3
    Cloud adoption isn’t all it’s cut out to be as enterprises report growing dissatisfaction
    • May 15, 2025
  • 4
    Hybrid cloud is complicated – Red Hat’s new AI assistant wants to solve that
    • May 20, 2025
  • 5
    Google is getting serious on cloud sovereignty
    • May 22, 2025
  • /
  • Technology
  • Tools
  • About
  • Contact Us

Input your search keywords and press Enter.