Ingest data using SOAR connectors

Supported in:

The Google Security Operations SOAR platform functionality uses connectors to ingest alerts from a variety of data sources into the platform. A connector is an item in an integration package that you can download from the Google SecOps Content Hub (Marketplace). You configure connectors from SOAR Settings > Ingestion > Connectors .

Connectors are Python-based applications that pull alerts from third-party products into Google SecOps. Connectors also parse and normalize the raw data (alerts and events) into a Google SecOps format, which is then presented as a case in the case queue.

If you're running a third-party SIEM (a central place for all your alerts), one connector is sufficient. You can also pull data from multiple sources with several connectors. Each connector has a dedicated documentation link for additional help.

Use case: Set up an email connector

  1. Go to Google SecOps Content Hub (Marketplace) > Integrations .
  2. Search for and install email integration.
  3. Select settings Configure default instance to open the Email - Configure Instance dialog.
  4. Complete all required parameters.
  5. Optional: Go to SOAR Settings > Response > Integrations Setup to configure the integration to a different, relevant instance (not the default environment).
  6. Go to SOAR Settings > Ingestion > Connectors .
  7. Click add Create New Connector .
  8. Select the IMAP Email connector and click Create .
  9. Complete the required fields. When prompted, click Save , and then click Yes .
  10. Enable the connector and save it again. This makes it run periodically to pull any new emails according to the configuration.

Need more help? Get answers from Community members and Google SecOps professionals.

Design a Mobile Site
View Site in Mobile | Classic
Share by: