Collect ChromeOS XDR logs

Supported in:

This document explains how to ingest ChromeOS XDR logs to Google Security Operations.

Chrome Enterprise provides comprehensive visibility into browser and ChromeOS device security events, including malware transfers, unsafe site visits, password reuse, extension installations, login activity, and ChromeOS device telemetry. The Chrome Enterprise Reporting Connector forwards these logs directly from Google Admin Console to Google Security Operations for analysis and threat detection.

Before you begin

Ensure that you have the following prerequisites:

  • A Google SecOps instance
  • Google Workspace Administrator account with Super Admin privileges
  • Google Chrome 137 or later (earlier versions don't provide complete referrer URL data)
  • Chrome Enterprise Premium licenses for advanced features (optional, but recommended for full event coverage)
  • Chrome browser cloud management enabled on target devices
  • Your Google Workspace Customer ID from the Google Workspace Admin console

Configure the Chrome Management parser

You may need to update to a new version of the Chrome Management parser to support recent Chrome logs.

  1. In your Google SecOps instance, go to Menu > Settings > Parsers.
  2. Find the Chrome Managementprebuilt entry.
  3. Verify that you are using a version date 2025-08-14or newer by applying any pending updates.

Obtain Chronicle Ingestion API credentials

You can configure the Chrome Enterprise reporting connector using one of three methods. This document covers the Chronicle Ingestion API key method, which should only be used if no other integration method is available.

Create Google Cloud API key

  1. Go to the Google Cloud Console Credentials page .
  2. Select your project (the project associated with your Google SecOps instance).
  3. Click Create credentials > API key.
  4. An API key is created and displayed in a dialog.
  5. Click Edit API keyto restrict the key.
  6. In the API keysettings page:

    • Name: Enter a descriptive name (for example, Chronicle Chrome Enterprise API Key )
  7. Under API restrictions:

    1. Select Restrict key.
    2. In the Select APIsdropdown, search for and select Google SecOps API(or Chronicle API).
  8. Click Save.

  9. Copythe API key value from the API keyfield at the top of the page.

  10. Save the API key securely.

Determine the ingestion endpoint hostname

The hostname depends on your Google SecOps instance region:

  • US customers: malachiteingestion-pa.googleapis.com
  • Europe customers: europe-malachiteingestion-pa.googleapis.com
  • Asia Southeast customers: asia-southeast1-malachiteingestion-pa.googleapis.com

For other regions, see the regional endpoints documentation .

Configure Chrome Enterprise Reporting Connector

Add the Google SecOps provider configuration

  1. Sign in with a super administratoraccount to the Google Admin console .

    If you aren't using a super administrator account, you can't complete these steps.

  2. Go to Menu > Devices > Chrome > Connectors.

  3. Optional: If you're configuring Chrome Enterprise connectors settings for the first time, follow the prompts to turn on Chrome Enterprise Connectors.

  4. At the top, click + New provider configuration.

  5. In the panel that appears on the right, find the Google SecOpssetup.

  6. Click Set up.

  7. Enter the following configuration details:

    • Configuration ID: Enter a descriptive name (for example, Chronicle Chrome Enterprise Connector ). This ID is shown on the User & browsers settings page and the Connectors page.
    • API key: Paste the API key you created in the previous section.
    • Host Name: Enter the ingestion API endpoint hostname for your region (for example, malachiteingestion-pa.googleapis.com for US customers).
  8. Click Test connectionto validate the configuration details.

    If the validation fails, review the configuration details and retest. Verify that:

    • The API key is correct and has not expired
    • The hostname matches your Google SecOps instance region
    • The API key has the Chronicle API restriction applied
  9. If the validation is successful, click Add Configuration.

The configuration is now added for your entire organization and can be used in any organizational unit.

Enable event reporting

  1. In the Google Admin console, go to Menu > Devices > Chrome > Settings.

    The User & browser settingspage opens by default.

  2. To apply the setting to all users and enrolled browsers, leave the top organizational unit selected. Otherwise, select a child organizational unit.

  3. Go to Browser reporting.

  4. Click Event reporting.

  5. Select Enable event reporting.

  6. Optional: Configure additional settings. Choose the reported event types that you need, based on what type of content you want to send for analysis:

    • Default event types: Chrome threat and data protection events include malware transfer, password reuse, and unsafe site visits
    • Browser crashes: Browser crash events
    • Content transfers: File upload and download events
    • Data access controls: Data access control events
    • Extension installations: Browser extension installation events
    • Extension telemetry: Extension telemetry events
    • Google login activity: Google account login events
    • Malware transfer: Malware transfer events
    • Password breach: Password breach events
    • Password changed: Password change events
    • Password reuse: Password reuse events
    • Sensitive data transfer: Sensitive data transfer events
    • Suspicious URL: Suspicious URL events
    • Unsafe site visits: Unsafe site visit events
    • URL filtering interstitial: URL filtering interstitial events
    • URL navigations: URL navigation events
  7. Click Save.

    Or, you might click Overridefor an organizational unit. To later restore the inherited value, click Inherit.

After you have configured the Chrome Enterprise reporting connector, you must enable the connector for the specific Organizational Units (OUs) from which you want to collect logs.

  1. In the Google Admin console, go to Menu > Devices > Chrome > Settings.

    The Users & browserstab is selected by default.

  2. In the Organizational Unitspanel, select the OU you want to collect logs from.

  3. In the main settings list, go to the Chrome Enterprise reporting connectorsetting.

  4. Set the status to Enabledand select the configuration you created in the previous steps.

  5. Click Save.

  6. Repeat these steps for any other OUs that require log ingestion.

Configure ChromeOS device reporting

Optional: If you want to collect ChromeOS device events in addition to Chrome browser events, enable ChromeOS device reporting.

  1. In the Google Admin console, go to Menu > Devices > Chrome > Settings > Device settings.
  2. Optional: To apply the setting to a department or team, at the side, select an organizational unit.
  3. Go to User and Device reporting.
  4. Next to Report extended detection and response (XDR) events, select Report information about extended detection and response (XDR) events.
  5. Click Save.

Verify the data flow

To verify that Chrome Enterprise logs are being ingested into Google SecOps:

  1. Open your Google SecOps instance.
  2. Go to Menu > Search.
  3. Run the following search query to look for Chrome Management events:

     metadata.log_type = "CHROME_MANAGEMENT" 
    
  4. You should see events appearing within a few minutes of configuration. If no events appear:

    • Verify that event reporting is enabled in Google Admin Console
    • Verify that the connector is linked to the correct organizational units
    • Verify that Chrome browsers are enrolled in cloud management
    • Check that the API key is valid and has not expired
    • Verify that the hostname matches your Google SecOps instance region

Supported log types

The Chrome Enterprise Reporting Connector forwards the following event types to Google SecOps:

Chrome browser events

Event Type Description Security Category
badNavigationEvent
User navigated to a malicious or suspicious URL SOFTWARE_MALICIOUS, SOCIAL_ENGINEERING, NETWORK_SUSPICIOUS
browserCrashEvent
Chrome browser crashed STATUS_UPDATE
browserExtensionInstallEvent
Browser extension was installed USER_RESOURCE_UPDATE_CONTENT
contentTransferEvent
File was uploaded or downloaded SCAN_FILE
dangerousDownloadEvent
Dangerous file was downloaded SOFTWARE_PUA, SOFTWARE_MALICIOUS
extensionTelemetryEvent
Extension telemetry data USER_RESOURCE_ACCESS, NETWORK_HTTP
loginEvent
User logged in to Google account USER_LOGIN
malwareTransferEvent
Malware was transferred SOFTWARE_MALICIOUS
passwordBreachEvent
Password was found in a breach USER_RESOURCE_ACCESS
passwordChangedEvent
User changed their password USER_CHANGE_PASSWORD
passwordReuseEvent
Password was reused on unauthorized site POLICY_VIOLATION, AUTH_VIOLATION, PHISHING
sensitiveDataEvent
Sensitive data was detected DATA_EXFILTRATION
sensitiveDataTransferEvent
Sensitive data was transferred DATA_EXFILTRATION
suspiciousUrlEvent
Suspicious URL was accessed SOFTWARE_SUSPICIOUS
unsafeSiteVisitEvent
User visited an unsafe site SOFTWARE_MALICIOUS, NETWORK_SUSPICIOUS
urlFilteringInterstitialEvent
URL filtering interstitial was displayed POLICY_VIOLATION
urlNavigationEvent
User navigated to a URL NETWORK_HTTP

ChromeOS device events

Event Type Description Security Category
CHROME_OS_LOGIN_EVENT
User logged in to ChromeOS device USER_LOGIN
CHROME_OS_LOGIN_FAILURE_EVENT
ChromeOS login failed USER_LOGIN
CHROME_OS_LOGOUT_EVENT
User logged out of ChromeOS device USER_LOGOUT
CHROME_OS_ADD_USER
User was added to ChromeOS device USER_CREATION
CHROME_OS_REMOVE_USER
User was removed from ChromeOS device USER_DELETION
CHROMEOS_AFFILIATED_LOCK_SUCCESS
ChromeOS device was locked USER_LOGOUT
CHROMEOS_AFFILIATED_UNLOCK_SUCCESS
ChromeOS device was unlocked USER_LOGIN
CHROMEOS_AFFILIATED_UNLOCK_FAILURE
ChromeOS unlock failed USER_LOGIN
CHROMEOS_DEVICE_BOOT_STATE_CHANGE
Device boot state changed SETTING_MODIFICATION
CHROMEOS_PERIPHERAL_ADDED
USB device was added USER_RESOURCE_ACCESS
CHROMEOS_PERIPHERAL_REMOVED
USB device was removed USER_RESOURCE_DELETION
CHROMEOS_PERIPHERAL_STATUS_UPDATED
USB device status changed USER_RESOURCE_UPDATE_CONTENT
CHROME_OS_CRD_HOST_STARTED
Chrome Remote Desktop host started STATUS_STARTUP
CHROME_OS_CRD_CLIENT_CONNECTED
Chrome Remote Desktop client connected USER_LOGIN
CHROME_OS_CRD_CLIENT_DISCONNECTED
Chrome Remote Desktop client disconnected USER_LOGOUT
CHROME_OS_CRD_HOST_ENDED
Chrome Remote Desktop host stopped STATUS_STARTUP

UDM mapping table

The following table shows how Chrome Management log fields are mapped to Google SecOps Unified Data Model (UDM) fields:

Chrome Log Field UDM Field Description
event
metadata.product_event_type Event type identifier
time
metadata.event_timestamp Event timestamp
device_id
principal.asset.product_object_id Device identifier
device_name
principal.hostname Device hostname
device_user
principal.user.user_display_name Device user
profile_user
principal.user.email_addresses Profile user email
os_platform
principal.platform Operating system platform
os_version
principal.platform_version Operating system version
browser_version
target.resource.attributes.labels[browser_version] Browser version
user_agent
network.http.user_agent HTTP user agent
url
target.url Target URL
reason
security_result.category_details Event reason
result
security_result.action_details Event result
content_name
target.file.full_path File name
content_type
target.file.mime_type File MIME type
content_hash
target.file.sha256 File SHA256 hash
content_size
target.file.size File size
extension_id
target.resource.product_object_id Extension identifier
extension_name
target.resource.name Extension name
extension_version
target.resource.attribute.labels[extension_version] Extension version

For a complete field mapping reference, see the Chrome Management parser documentation .

Need more help? Get answers from Community members and Google SecOps professionals.

Create a Mobile Website
View Site in Mobile | Classic
Share by: