Improve your Google Workspace™ digital resilience with the help of Splunk! Stream audit events from managed Google Chrome™ browsers and profiles straight to your Splunk instance via Google's reporting connector. Just set up a HEC token, choose which events should be sent and create a service account. This add-on ships with CIM compliant sourcetype, built-in modular inputs to gather current state of your environment at custom intervals and workflow actions to immediately respond to potential threats. Be sure to get the second component of the whole solution: Google Chrome App for Splunk at https://splunkbase.splunk.com/app/6896/
NOTE: only releases >= 2.0.0 are compatible with the Google Chrome App for Splunk.
NOTE: Events indexed within Add-on version < 2.0.0 will still be available for search but some field extractions will not be visible. If you wish to keep the old sourcetype definition, consider adding them to the props.conf file.