Recoger registros de Google Chrome
En este documento se describe cómo puedes recoger registros de eventos de seguridad de Chrome Browser y ChromeOS configurando un conector de informes de Chrome Enterprise y cómo se asignan los campos de registro a los campos del modelo de datos unificado (UDM) de Chrome.
Para obtener más información, consulta Ingestión de datos en Google SecOps.
Información general
Una implementación típica consta de eventos de seguridad del navegador Chrome y de ChromeOS configurados para enviar registros a Google SecOps. Cada implementación de cliente puede ser diferente y más compleja. La implementación consta de los siguientes componentes:
- Chrome los eventos de seguridad del navegador Chrome y de ChromeOS que quieras recoger. 
- Conector de informes de Chrome Enterprise: reenvía los registros de Chrome a Google SecOps. 
- Google SecOps: conserva y analiza los registros de Chrome. 
Una etiqueta de ingestión identifica el analizador que normaliza los datos de registro sin procesar en formato UDM estructurado.
La información de este documento se aplica al analizador con la etiqueta de ingestión CHROME_MANAGEMENT.
Antes de empezar
- Asegúrate de que tienes una cuenta de administrador de Google Workspace. 
- Asegúrate de que todos los sistemas de la arquitectura de implementación estén configurados en la zona horaria UTC. 
- Asegúrate de que tienes una clave de API de ingestión de Chronicle. Si no tienes ninguna, ponte en contacto con el equipo de Asistencia de SecOps de Google o con tu punto de contacto de cliente de SecOps de Google para solicitar tu clave de la API Ingestion de Chronicle. 
- Para obtener más información, consulta el artículo Eventos de registro de Chrome. 
Configura Gestión en la nube del navegador Chrome
Estos son los pasos generales para configurar Gestión en la nube del navegador Chrome:
Sigue estos pasos para configurar Gestión en la nube del navegador Chrome.
- En la consola de administración, haz clic en Menú > Dispositivos > Chrome > Navegadores gestionados. 
- Opcional: Selecciona la organización de nivel superior o la unidad organizativa en la que quieras generar un token que registre los navegadores directamente en esa unidad organizativa. Para obtener más información, consulta el artículo Añadir unidades organizativas. 
- Haz clic en Enroll (Registrar). Si es la primera vez que registras un navegador, se te pedirá que aceptes los Términos del Servicio de Gestión en la nube del navegador Chrome (CBCM). 
- Haz clic en Copiar token de registro en el portapapeles. 
- Para registrar navegadores Chrome gestionados en la nube, haz clic en Hecho. 
- En la consola de administración, ve a Menú > Dispositivos > Chrome > Configuración > Usuarios y navegadores. Selecciona el nivel organizativo superior para que todas las organizaciones secundarias hereden la política. Desplázate hacia abajo hasta Informes del navegador. 
- En Informes del navegador gestionado, selecciona Activar los informes en la nube del navegador gestionado. 
- Para activar los informes del navegador Chrome, haz clic en Guardar. 
- En la consola de administración, ve a Menú > Dispositivos > Chrome > Conectores. 
- Opcional: Si vas a configurar los ajustes de Chrome Enterprise Connectors por primera vez, sigue las indicaciones para activar Chrome Enterprise Connectors. 
- En la parte superior, haz clic en + Nueva configuración de proveedor. 
- En el panel que aparece a la derecha, busca la configuración de Google SecOps y haz clic en Configurar. 
- Introduce el ID de configuración, la clave de API y el nombre de host: - ID de configuración: el ID que se muestra en la página Configuración de usuario y de navegador y en la página Conectores. 
- Clave de API: la clave de API que se debe especificar al llamar a la API de ingestión de Chronicle para identificar al cliente. 
- Nombre de host: el endpoint de la API de ingestión. Para los clientes de EE. UU., siempre será malachiteingestion-pa.googleapis.com. Para los de otras regiones, consulta la documentación de endpoints regionales. 
 
- Haz clic en AÑADIR CONFIGURACIÓN para añadir la nueva configuración de proveedor. 
Tipos de registros y modelos de datos admitidos
A continuación se indican los tipos de registros y eventos admitidos para la gestión de Chrome. Todos los tipos de registros y eventos admitidos están en formato JSON.
| Tipo de registro | Tipo de evento | 
|---|---|
| Actividad maliciosa | 
 
 
 
 
 
 
 
 
 
 
 | 
| Actividad de auditoría | 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 | 
| Protección de datos | 
 
 
 | 
| Chrome OS | 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 | 
Formatos de registro de Google Chrome admitidos
El analizador de Google Chrome admite registros en formato JSON.
Registros de ejemplo de Google Chrome admitidos
- JSON: - { "event": "badNavigationEvent", "time": "1622093983.104", "reason": "SOCIAL_ENGINEERING", "result": "EVENT_RESULT_WARNED", "device_name": "", "device_user": "", "profile_user": "sample@domain.io", "url": "https://test.domain.com/s/phishing.html", "device_id": "e9806c71-0f4e-4dfa-8c52-93c05420bb8f", "os_platform": "", "os_version": "", "browser_version": "109.0.5414.120", "user_agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36", "client_type": "CHROME_BROWSER_PROFILE" }
Referencia de asignación de campos
En esta sección se explica cómo asigna el analizador de Google SecOps los campos de registro de Chrome a los campos del modelo de datos unificado (UDM) de Google SecOps para los conjuntos de datos.
Referencia de asignación de campos: identificador de evento a tipo de evento
En la siguiente tabla se enumeran los CHROME_MANAGEMENT tipos de registros y sus tipos de eventos de UDM correspondientes.
| Event Identifier | Event Type | Security Category | 
|---|---|---|
| badNavigationEvent - SOCIAL_ENGINEERING | USER_RESOURCE_ACCESS | SOCIAL_ENGINEERING | 
| badNavigationEvent - SSL_ERROR | USER_RESOURCE_ACCESS | NETWORK_SUSPICIOUS | 
| badNavigationEvent - MALWARE | USER_RESOURCE_ACCESS | SOFTWARE_MALICIOUS | 
| badNavigationEvent - UNWANTED_SOFTWARE | USER_RESOURCE_ACCESS | SOFTWARE_PUA | 
| badNavigationEvent - THREAT_TYPE_UNSPECIFIED | USER_RESOURCE_ACCESS | SOFTWARE_MALICIOUS | 
| browserCrashEvent | STATUS_UPDATE |  | 
| browserExtensionInstallEvent | USER_RESOURCE_UPDATE_CONTENT |  | 
| Extension install - BROWSER_EXTENSION_INSTALL | USER_RESOURCE_UPDATE_CONTENT |  | 
| EXTENSION_REQUEST | USER_UNCATEGORIZED |  | 
| CHROME_OS_ADD_USER - CHROMEOS_AFFILIATED_USER_ADDED | USER_CREATION |  | 
| CHROME_OS_ADD_USER - CHROMEOS_UNAFFILIATED_USER_ADDED | USER_CREATION |  | 
| ChromeOS user added - CHROMEOS_UNAFFILIATED_USER_ADDED | USER_CREATION |  | 
| ChromeOS user removed - CHROMEOS_UNAFFILIATED_USER_REMOVED | USER_DELETION |  | 
| CHROME_OS_REMOVE_USER - CHROMEOS_AFFILIATED_USER_REMOVED | USER_DELETION |  | 
| CHROME_OS_REMOVE_USER - CHROMEOS_UNAFFILIATED_USER_REMOVED | USER_DELETION |  | 
| Login events | USER_LOGIN |  | 
| LOGIN_EVENT - CHROMEOS_UNAFFILIATED_LOGIN | USER_LOGIN |  | 
| loginEvent | USER_LOGIN |  | 
| ChromeOS login success | USER_LOGIN |  | 
| CHROME_OS_LOGIN_EVENT - CHROMEOS_AFFILIATED_LOGIN | USER_LOGIN |  | 
| CHROME_OS_LOGIN_EVENT - CHROMEOS_UNAFFILIATED_LOGIN | USER_LOGIN |  | 
| CHROME_OS_LOGIN_EVENT - CHROMEOS_GUEST_LOGIN | USER_LOGIN |  | 
| CHROME_OS_LOGIN_EVENT - CHROMEOS_KIOSK_SESSION_LOGIN | USER_LOGIN |  | 
| CHROME_OS_LOGIN_EVENT - CHROMEOS_GUEST_SESSION_LOGIN | USER_LOGIN |  | 
| CHROME_OS_LOGIN_EVENT - CHROMEOS_MANAGED_GUEST_SESSION_LOGIN | USER_LOGIN |  | 
| ChromeOS login failure - CHROMEOS_AFFILIATED_LOGIN | USER_LOGIN |  | 
| CHROME_OS_LOGIN_FAILURE_EVENT - CHROMEOS_AFFILIATED_LOGIN | USER_LOGIN |  | 
| CHROME_OS_LOGIN_FAILURE_EVENT - CHROMEOS_UNAFFILIATED_LOGIN | USER_LOGIN |  | 
| CHROME_OS_LOGIN_LOGOUT_EVENT - CHROMEOS_AFFILIATED_LOGIN | USER_LOGIN |  | 
| CHROME_OS_LOGOUT_EVENT - CHROMEOS_AFFILIATED_LOGOUT | USER_LOGOUT |  | 
| CHROME_OS_LOGOUT_EVENT - CHROMEOS_GUEST_LOGOUT | USER_LOGOUT |  | 
| CHROME_OS_LOGOUT_EVENT - CHROMEOS_MANAGED_GUEST_SESSION_LOGOUT | USER_LOGOUT |  | 
| CHROME_OS_LOGOUT_EVENT - CHROMEOS_UNAFFILIATED_LOGOUT | USER_LOGOUT |  | 
| CHROME_OS_LOGOUT_EVENT - CHROMEOS_KIOSK_SESSION_LOGOUT | USER_LOGOUT |  | 
| CHROME_OS_LOGOUT_EVENT - CHROMEOS_GUEST_SESSION_LOGOUT | USER_LOGOUT |  | 
| ChromeOS logout - CHROMEOS_AFFILIATED_LOGOUT | USER_LOGOUT |  | 
| CHROME_OS_REPORTING_DATA_LOST | STATUS_UPDATE |  | 
| ChromeOS CRD client connected - CHROMEOS_CRD_CLIENT_CONNECTED | USER_LOGIN |  | 
| ChromeOS CRD client disconnected | USER_LOGOUT |  | 
| CHROME_OS_CRD_HOST_STARTED - CHROMEOS_CRD_HOST_STARTED | STATUS_STARTUP |  | 
| ChromeOS CRD host started - CHROMEOS_CRD_HOST_STARTED | STATUS_STARTUP |  | 
| ChromeOS CRD host stopped - CHROMEOS_CRD_HOST_ENDED | STATUS_STARTUP |  | 
| ChromeOS device boot state change - CHROME_OS_VERIFIED_MODE | SETTING_MODIFICATION |  | 
| ChromeOS device boot state change - CHROME_OS_DEV_MODE | SETTING_MODIFICATION |  | 
| DEVICE_BOOT_STATE_CHANGE - CHROME_OS_VERIFIED_MODE | SETTING_MODIFICATION |  | 
| ChromeOS lock success - CHROMEOS_AFFILIATED_LOCK_SUCCESS | USER_LOGOUT |  | 
| ChromeOS unlock success - CHROMEOS_AFFILIATED_UNLOCK_SUCCESS | USER_LOGIN |  | 
| ChromeOS unlock failure - CHROMEOS_AFFILIATED_LOGIN | USER_LOGIN |  | 
| ChromeOS USB device added - CHROMEOS_PERIPHERAL_ADDED | USER_RESOURCE_ACCESS |  | 
| ChromeOS USB device removed - CHROMEOS_PERIPHERAL_REMOVED | USER_RESOURCE_DELETION |  | 
| ChromeOS USB status change - CHROMEOS_PERIPHERAL_STATUS_UPDATED | USER_RESOURCE_UPDATE_CONTENT |  | 
| CHROMEOS_PERIPHERAL_STATUS_UPDATED - CHROMEOS_PERIPHERAL_STATUS_UPDATED | USER_RESOURCE_UPDATE_CONTENT |  | 
| Client Side Detection | USER_UNCATEGORIZED |  | 
| Content transfer | SCAN_FILE |  | 
| CONTENT_TRANSFER | SCAN_FILE |  | 
| contentTransferEvent | SCAN_FILE |  | 
| Content unscanned | SCAN_UNCATEGORIZED |  | 
| CONTENT_UNSCANNED | SCAN_UNCATEGORIZED |  | 
| dataAccessControlEvent | USER_RESOURCE_ACCESS |  | 
| dangerousDownloadEvent - Dangerous | SCAN_FILE | SOFTWARE_PUA | 
| dangerousDownloadEvent - DANGEROUS_HOST | SCAN_HOST |  | 
| dangerousDownloadEvent - UNCOMMON | SCAN_UNCATEGORIZED |  | 
| dangerousDownloadEvent - POTENTIALLY_UNWANTED | SCAN_UNCATEGORIZED | SOFTWARE_PUA | 
| dangerousDownloadEvent - UNKNOWN | SCAN_UNCATEGORIZED |  | 
| dangerousDownloadEvent - DANGEROUS_URL | SCAN_UNCATEGORIZED |  | 
| dangerousDownloadEvent - UNWANTED_SOFTWARE | SCAN_FILE | SOFTWARE_PUA | 
| dangerousDownloadEvent - DANGEROUS_FILE_TYPE | SCAN_FILE | SOFTWARE_MALICIOUS | 
| Desktop DLP Warnings | USER_UNCATEGORIZED |  | 
| DLP_EVENT | USER_UNCATEGORIZED |  | 
| interstitialEvent - Malware | NETWORK_HTTP | NETWORK_SUSPICIOUS | 
| IOS/OSX Warnings | SCAN_UNCATEGORIZED |  | 
| Malware transfer - MALWARE_TRANSFER_DANGEROUS | SCAN_FILE | SOFTWARE_MALICIOUS | 
| MALWARE_TRANSFER - MALWARE_TRANSFER_UNCOMMON | SCAN_FILE | SOFTWARE_MALICIOUS | 
| MALWARE_TRANSFER - MALWARE_TRANSFER_DANGEROUS | SCAN_FILE | SOFTWARE_MALICIOUS | 
| MALWARE_TRANSFER - MALWARE_TRANSFER_UNWANTED_SOFTWARE | SCAN_FILE | SOFTWARE_MALICIOUS | 
| MALWARE_TRANSFER - MALWARE_TRANSFER_UNKNOWN | SCAN_FILE | SOFTWARE_MALICIOUS | 
| MALWARE_TRANSFER - MALWARE_TRANSFER_DANGEROUS_HOST | SCAN_FILE | SOFTWARE_MALICIOUS | 
| malwareTransferEvent - DANGEROUS | SCAN_FILE | SOFTWARE_MALICIOUS | 
| malwareTransferEvent - UNSPECIFIED | SCAN_FILE | SOFTWARE_MALICIOUS | 
| Password breach | USER_RESOURCE_ACCESS |  | 
| PASSWORD_BREACH | USER_RESOURCE_ACCESS |  | 
| passwordBreachEvent - PASSWORD_ENTRY | USER_RESOURCE_ACCESS |  | 
| Password changed | USER_CHANGE_PASSWORD |  | 
| PASSWORD_CHANGED | USER_CHANGE_PASSWORD |  | 
| passwordChangedEvent | USER_CHANGE_PASSWORD |  | 
| Password reuse - PASSWORD_REUSED_UNAUTHORIZED_SITE | USER_RESOURCE_ACCESS | POLICY_VIOLATION, AUTH_VIOLATION | 
| Password reuse - PASSWORD_REUSED_PHISHING_URL | USER_UNCATEGORIZED | PHISHING | 
| PASSWORD_REUSE - PASSWORD_REUSED_UNAUTHORIZED_SITE | USER_RESOURCE_ACCESS | POLICY_VIOLATION, AUTH_VIOLATION | 
| passwordReuseEvent - Unauthorized site | USER_RESOURCE_ACCESS | POLICY_VIOLATION, AUTH_VIOLATION | 
| passwordReuseEvent - PASSWORD_REUSED_PHISHING_URL | USER_UNCATEGORIZED | PHISHING | 
| passwordReuseEvent - PASSWORD_REUSED_UNAUTHORIZED_SITE | USER_RESOURCE_ACCESS | POLICY_VIOLATION, AUTH_VIOLATION | 
| Permissions Blacklisting | RESOURCE_PERMISSIONS_CHANGE |  | 
| Sensitive data transfer | SCAN_FILE | DATA_EXFILTRATION | 
| SENSITIVE_DATA_TRANSFER | SCAN_FILE | DATA_EXFILTRATION | 
| sensitiveDataEvent - [test_user_5] warn | SCAN_FILE | DATA_EXFILTRATION | 
| sensitiveDataTransferEvent | SCAN_FILE | DATA_EXFILTRATION | 
| Unsafe site visit - UNSAFE_SITE_VISIT_SSL_ERROR | USER_RESOURCE_ACCESS | NETWORK_SUSPICIOUS | 
| UNSAFE_SITE_VISIT - UNSAFE_SITE_VISIT_MALWARE | USER_RESOURCE_ACCESS | SOFTWARE_MALICIOUS | 
| UNSAFE_SITE_VISIT - UNSAFE_SITE_VISIT_UNWANTED_SOFTWARE | USER_RESOURCE_ACCESS | SOFTWARE_SUSPICIOUS | 
| UNSAFE_SITE_VISIT - EVENT_REASON_UNSPECIFIED | USER_RESOURCE_ACCESS |  | 
| UNSAFE_SITE_VISIT - UNSAFE_SITE_VISIT_SOCIAL_ENGINEERING | USER_RESOURCE_ACCESS | SOCIAL_ENGINEERING | 
| UNSAFE_SITE_VISIT - UNSAFE_SITE_VISIT_SSL_ERROR | USER_RESOURCE_ACCESS | NETWORK_SUSPICIOUS | 
| unscannedFileEvent - FILE_PASSWORD_PROTECTED | SCAN_FILE |  | 
| unscannedFileEvent - FILE_TOO_LARGE | SCAN_FILE |  | 
| urlFilteringInterstitialEvent | USER_RESOURCE_ACCESS | POLICY_VIOLATION | 
| extensionTelemetryEvent | If the telemetry_event_signals.signal_namelog field value is equal to theCOOKIES_GET_ALL_INFO, COOKIES_GET_INFO, TABS_API_INFO, then theevent_typeset toUSER_RESOURCE_ACCESS.Else, if the telemetry_event_signals.signal_namelog field value is equal toREMOTE_HOST_CONTACTED_INFO, then if thetelemetry_event_signals.connection_protocollog field value is equal toHTTP_HTTPS, then theevent_typeis set toNETWORK_HTTP.Else, the event_typeUDM field is set toNETWORK_UNCATEGORIZED. | If the telemetry_event_signals.signal_namelog field value is equal toREMOTE_HOST_CONTACTED_INFO, then thesecurity categoryis set toNETWORK_SUSPICIOUS.Else, if the telemetry_event_signals.signal_namelog field value contain one of the following values, then thesecurity categoryUDM field is set toSOFTWARE_SUSPICIOUS.
 | 
Referencia de mapeado de campos: CHROME_MANAGEMENT
En la siguiente tabla se enumeran los campos de registro del tipo de registro CHROME_MANAGEMENT y sus campos de UDM correspondientes.
| Log field | UDM mapping | Logic | 
|---|---|---|
| id.customerId | about.resource.product_object_id | |
| event_detail | metadata.description | |
| time | metadata.event_timestamp | |
| events.parameters.name [TIMESTAMP] | metadata.event_timestamp | |
| event | metadata.product_event_type | |
| events.name | metadata.product_event_type | |
| id.uniqueQualifier | metadata.product_log_id | |
|  | metadata.product_name | The metadata.product_nameUDM field is set toChrome Management. | 
| id.applicationName |  | |
|  | metadata.vendor_name | The metadata.vendor_nameUDM field is set toGOOGLE. | 
| user_agent | network.http.user_agent | |
| userAgent | network.http.user_agent | |
| events.parameters.name [USER_AGENT] | network.http.user_agent | |
| events.parameters.name [SESSION_ID] | network.session_id | |
| client_type | principal.application | |
| clientType | principal.application | |
| events.parameters.name [CLIENT_TYPE] | principal.application | |
| device_id | principal.asset.product_object_id | |
| deviceId | principal.asset.product_object_id | |
| events.parameters.name [DEVICE_ID] | principal.asset.product_object_id | |
| device_name | principal.hostname | |
| deviceName | principal.hostname | |
| events.parameters.name [DEVICE_NAME] | principal.hostname | |
| os_plarform | principal.platform | The principal.platformUDM field is set to one of the following values:
 Else, if the os_plarformlog field value is not empty andosVersionlog field value is not empty, then theos_plarform osVersionlog field is mapped to theprincipal.platform_versionUDM field. | 
| os_plarform | principal.asset.platform_software.platform | The principal.asset.platform_software.platformUDM field is set to one of the following values:
 | 
| os_platform | principal.platform | The principal.platformUDM field is set to one of the following values:
 Else, if the os_platformlog field value is not empty andosVersionlog field value is not empty, then theos_platform osVersionlog field is mapped to theprincipal.platform_versionUDM field. | 
| os_platform | principal.asset.platform_software.platform | The principal.asset.platform_software.platformUDM field is set to one of the following values:
 | 
| osPlatform | principal.platform | The principal.platformUDM field is set to one of the following values:
 Else, if the osPlatformlog field value is not empty andosVersionlog field value is not empty, then theosPlatform osVersionlog field is mapped to theprincipal.platform_versionUDM field. | 
| osPlatform | principal.asset.platform_software.platform | The principal.asset.platform_software.platformUDM field is set to one of the following values:
 | 
| events.parameters.name [DEVICE_PLATFORM] | principal.platform | The os_platformandos_versionis extracted from theevents.parameters.name [DEVICE_PLATFORM]log field using Grok pattern.The principal.platformUDM field is set to one of the following values:
 Else, if the os_platformlog field value is not empty andosVersionlog field value is not empty, then theos_platform osVersionlog field is mapped to theprincipal.platform_versionUDM field. | 
| events.parameters.name [DEVICE_PLATFORM] | principal.asset.platform_software.platform | The os_platformis extracted from theevents.parameters.name [DEVICE_PLATFORM]log field using Grok pattern.The principal.asset.platform_software.platformUDM field is set to one of the following values:
 | 
| os_version | principal.platform_version | |
| osVersion | principal.platform_version | |
| events.parameters.name [DEVICE_PLATFORM] | principal.platform_version | The Versionis extracted from theevents.parameters.name [DEVICE_PLATFORM]log field using Grok pattern. | 
| device_id | principal.resource.id | |
| deviceId | principal.resource.id | |
| events.parameters.name [DEVICE_ID] | principal.resource.id | |
| directory_device_id | principal.resource.product_object_id | |
| events.parameters.name [DIRECTORY_DEVICE_ID] | principal.resource.product_object_id | |
|  | principal.resource.resource_subtype | If the eventlog field value is equal toCHROMEOS_PERIPHERAL_STATUS_UPDATED, then theprincipal.resource.resource_subtypeUDM field is set toUSB.Else, if the events.namelog field value is equal toCHROMEOS_PERIPHERAL_STATUS_UPDATED, then theprincipal.resource.resource_subtypeUDM field is set toUSB. | 
|  | principal.resource.resource_type | If the device_idlog field value is not empty, then theprincipal.resource.resource_typeUDM field is set toDEVICE. | 
| actor.email | principal.user.email_addresses | |
| actor.profileId | principal.user.userid | |
| result | security_result.action_details | |
| events.parameters.name [EVENT_RESULT] | security_result.action_details | |
| event_result | security_result.action_details | |
|  | security_result.action | The security_result.actionUDM field is set to one of the following values:
 | 
| reason | security_result.category_details | |
| events.parameters.name [EVENT_REASON] | security_result.category_details | |
| events.parameters.name [EVENT_REASON] | security_result.summary | |
| events.parameters.name [LOGIN_FAILURE_REASON] | security_result.description | |
| events.parameters.name [REMOVE_USER_REASON] | security_result.description | If the events.namelog field value is equal toCHROME_OS_REMOVE_USER, then theevents.parameters.namethe log field is mapped to thesecurity_result.descriptionUDM field. | 
| triggered_rules | security_result.rule_name | |
| events.type | security_result.category_details | |
| events.parameters.name [PRODUCT_NAME] | target.application | If the events.namelog field value contains one of the following values, then theevents.parameters.name [PRODUCT_NAME]log field is mapped to thetarget.resource.nameUDM field:
 | 
| content_name | target.file.full_path | |
| contentName | target.file.full_path | |
| events.parameters.name [CONTENT_NAME] | target.file.full_path | |
| content_type | target.file.mime_type | |
| contentType | target.file.mime_type | |
| events.parameters.name [CONTENT_TYPE] | target.file.mime_type | |
| content_hash | target.file.sha256 | |
| events.parameters.name [CONTENT_HASH] | target.file.sha256 | |
| content_size | target.file.size | |
| contentSize | target.file.size | |
| events.parameters.name [CONTENT_SIZE] | target.file.size | |
|  | target.file.file_type | The fileTypeis extracted from thecontent_namelog field usign Grok pattern, Thentarget.file.file_typeUDM field is set to one of the following values:
 | 
| extension_id | target.resource.product_object_id | |
| events.parameters.name [APP_ID] | target.resource.product_object_id | |
| extension_name | target.resource.name | If the eventlog field value is equal tobadNavigationEventor theevents.namelog field value is equal tobadNavigationEvent, then theextension_namelog field is mapped to thetarget.resource.nameUDM field. | 
| telemetry_event_signals.signal_name | target.resource.name | If the eventlog field value is equal toextensionTelemetryEvent, then thetelemetry_event_signals.signal_namelog field is mapped to thetarget.resource.nameUDM field. | 
| events.parameters.name [APP_NAME] | target.resource.name | |
| url | target.url | |
| events.parameters.name [URL] | target.url | |
| telemetry_event_signals.url | target.url | If the telemetry_event_signals.urllog field value matches the regular expression pattern the[http:\/\/ or https:\/\/].*, then thetelemetry_event_signals.urllog field is mapped to thetarget.urlUDM field. | 
| device_user  | target.user.userid | |
| deviceUser | principal.user.userid | If the eventlog field value is equal topasswordChangedEvent, then thedeviceUserlog field is mapped to theprincipal.user.useridUDM field.Else, the deviceUserlog field is mapped to theprincipal.user.user_display_nameUDM field. | 
| events.parameters.name [DEVICE_USER] | If the eventlog field value is equal topasswordChangedEvent, then theevents.parameters.name [DEVICE_USER]log field is mapped to theprincipal.user.useridUDM field.Else, the events.parameters.name [DEVICE_USER]log field is mapped to theprincipal.user.user_display_nameUDM field. | |
| scan_id | about.labels [scan_id] | |
| events.parameters.name [CONNECTION_TYPE] | about.labels [connection_type] | |
| etag | about.labels [etag] | |
| kind | about.labels [kind] | |
| actor.key | principal.user.attribute.labels [actor_key] | |
| actor.callerType | principal.user.attribute.labels [actor_callerType] | |
| events.parameters.name [EVIDENCE_LOCKER_FILEPATH] | security_result.about.labels [evidence_locker_filepath] | |
| federated_origin | security_result.about.labels [federated_origin] | |
| is_federated | security_result.about.labels [is_federated] | |
| destination | security_result.about.labels [trigger_destination] | |
| events.parameters.name [TRIGGER_DESTINATION] | security_result.about.labels [trigger_destination] | |
| source | security_result.about.labels [trigger_source] | |
| events.parameters.name [TRIGGER_SOURCE] | security_result.about.labels [trigger_source] | |
| trigger_type | security_result.about.labels [trigger_type] | |
| trigger_type | additional.fields [trigger_type] | |
| triggerType | security_result.about.labels [trigger_type] | |
| triggerType | additional.fields [trigger_type] | |
| events.parameters.name  [TRIGGER_TYPE] | security_result.about.labels [trigger_type] | |
| trigger_user | security_result.about.labels [trigger_user] | |
| events.parameters.name [TRIGGER_USER] | security_result.about.labels [trigger_user] | |
| events.parameters.name [MALWARE_CATEGORY] | security_result.threat_name | |
| events.parameters.name [MALWARE_FAMILY] | security_result.detection_fields [malware_family] | |
| events.parameters.name [VENDOR_ID] | src.labels [vendor_id] | |
| events.parameters.name [VENDOR_NAME] | src.labels [vendor_name] | |
| events.parameters.name [VIRTUAL_DEVICE_ID] | src.labels [virtual_device_id] | |
| events.parameters.name [VIRTUAL_DEVICE_ID] | additional.fields [virtual_device_id] | |
| events.parameters.name [NEW_BOOT_MODE] | target.asset.attribute.labels [new_boot_mode] | |
| events.parameters.name [PREVIOUS_BOOT_MODE] | target.asset.attribute.labels [previous_boot_mode] | |
| id.time | target.asset.attribute.labels [timestamp] | |
| events.parameters.name [PRODUCT_ID] | target.labels [product_id] | If the events.namelog field value contains one of the following values, then theevents.parameters.name [PRODUCT_ID]log field is mapped to thetarget.resource.product_object_idUDM field:
 Else, the events.parameters.name [PRODUCT_ID]log field is mapped to thetarget.labelsUDM field. | 
|  | extensions.auth.mechanism | If the events.namelog field value contains one of the following values, then theextensions.auth.mechanismUDM field is set toUSERNAME_PASSWORD:
 | 
| events.parameters.name [UNLOCK_TYPE] | target.labels [unlock_type] | |
| extension_description | target.resource.attribute.labels [extension_description] | |
| extension_action | target.resource.attribute.labels [extension_action] | |
| extension_version | target.resource.attribute.labels [extension_version] | If the eventlog field value is not equal toextensionTelemetryEvent, then theextension_versionlog field is mapped to thetarget.resource.attribute.labels[extension_version]UDM field. | 
| extension_source | target.resource.attribute.labels[extension_source] | If the eventlog field value is not equal toextensionTelemetryEvent, then theextension_sourcelog field is mapped to thetarget.resource.attribute.labels[extension_source]UDM field. | 
| browser_version | target.resource.attributes.labels [browser_version] | |
| browserVersion | target.resource.attributes.labels [browser_version] | |
| events.parameters.name [BROWSER_VERSION] | target.resource.attributes.labels [browser_version] | |
| profile_user | target.user.email_addresses | If the eventlog field value contain one of the following values and theprofile_userlog field value matches the regular expression pattern^.+@.+$, then theprofile_userlog field is mapped to thetarget.user.email_addressesUDM field.
 | 
| profile_user | principal.user.email_addresses | If the eventlog field value does not contain one of the following values and theprofile_userlog field value matches the regular expression pattern^.+@.+$and theactor.emaillog field value is not equal to theprofile_user, then theprofile_userlog field is mapped to theprincipal.user.email_addressesUDM field.
 | 
| profile_user | target.user.attribute.labels[profile_user_name] | If the eventlog field value contain one of the following values and theprofile_userlog field value does not match the regular expression pattern^.+@.+$, then theprofile_userlog field is mapped to thetarget.user.attribute.labels.profile_user_nameUDM field.
 | 
| profile_user | principal.user.attribute.labels[profile_user_name] | If the eventlog field value does not contain one of the following values and theprofile_userlog field value does not match the regular expression pattern^.+@.+$or theactor.emaillog field value is equal to theprofile_user, then theprofile_userlog field is mapped to theprincipal.user.attribute.labels.profile_user_nameUDM field.
 | 
| events.parameters.name [PROFILE_USER_NAME] | target.user.email_addresses | If the eventlog field value contain one of the following values and theevents.parameters.name [PROFILE_USER_NAME]log field value matches the regular expression pattern^.+@.+$, then theevents.parameters.name [PROFILE_USER_NAME]log field is mapped to thetarget.user.email_addressesUDM field.
 | 
| events.parameters.name [PROFILE_USER_NAME] | principal.user.email_addresses | If the eventlog field value does not contain one of the following values and theevents.parameters.name [PROFILE_USER_NAME]log field value matches the regular expression pattern^.+@.+$and theactor.emaillog field value is not equal to theevents.parameters.name [PROFILE_USER_NAME], then theevents.parameters.name [PROFILE_USER_NAME]log field is mapped to theprincipal.user.email_addressesUDM field.
 | 
| events.parameters.name [PROFILE_USER_NAME] | target.user.attribute.labels[profile_user_name] | If the eventlog field value contain one of the following values and theevents.parameters.name [PROFILE_USER_NAME]log field value does not match the regular expression pattern^.+@.+$, then theevents.parameters.name [PROFILE_USER_NAME]log field is mapped to thetarget.user.attribute.labels.profile_user_nameUDM field.
 | 
| events.parameters.name [PROFILE_USER_NAME] | principal.user.attribute.labels[profile_user_name] | If the eventlog field value does not contain one of the following values and theevents.parameters.name [PROFILE_USER_NAME]log field value does not match the regular expression pattern^.+@.+$or theactor.emaillog field value is equal to theevents.parameters.name [PROFILE_USER_NAME], then theevents.parameters.name [PROFILE_USER_NAME]log field is mapped to theprincipal.user.attribute.labels.profile_user_nameUDM field.
 | 
|  | target.resource.resource_type | If the events.namelog field value is equal toDEVICE_BOOT_STATE_CHANGE, then thetarget.resource.resource_typeUDM field is set toSETTING. | 
| url_category | target.labels [url_category] | |
| browser_channel | target.resource.attribute.labels [browser_channel] | |
| report_id | target.labels [report_id] | |
| clickedThrough | target.labels [clickedThrough] | |
| threat_type | security_result.detection_fields [threatType] | |
| triggered_rule_info.action | security_result.action | If the triggered_rule_info.actionlog field value contains one of the following values, then thetriggered_rule_info.actionlog field is mapped to thesecurity_result.actionUDM field:
 Else, the triggered_rule_info.actionlog field is mapped to thesecurity_result.rule_labels [triggeredRuleInfo_action]UDM field. | 
| triggered_rule_info.rule_id | security_result.rule_id | |
| triggered_rule_info.rule_name | security_result.rule_name | |
| triggered_rule_info.url_category | security_result.category_details | |
| transfer_method | additional.fields [transfer_method] | |
| extension_name | target.resource_ancestors.name | If the eventlog field value isequaltoextensionTelemetryEvent, then theextension_namelog field is mapped to thetarget.resource_ancestors.nameUDM field. | 
| extension_id | target.resource_ancestors.product_object_id | If the eventlog field value isequaltoextensionTelemetryEvent, then theextension_idlog field is mapped to thetarget.resource_ancestors.product_object_idUDM field. | 
| extension_version | target.resource_ancestors.attribute.labels[extension_version] | If the eventlog field value is equal toextensionTelemetryEvent, then theextension_versionlog field is mapped to thetarget.resource_ancestors.attribute.labels[extension_version]UDM field. | 
| extension_source | target.resource_ancestors.attribute.labels[extension_source] | If the eventlog field value is equal toextensionTelemetryEvent, then theextension_sourcelog field is mapped to thetarget.resource_ancestors.attribute.labels[extension_source]UDM field. | 
| profile_identifier | additional.fields[profile_identifier] | |
| extension_files_info.file_name | target.resource_ancestors.file.names | |
| extension_files_info.file_hash.hash | target.resource_ancestors.attribute.labels[file_hash] | |
| telemetry_event_signals.count | target.resource.attribute.labels[count] | |
| telemetry_event_signals.tabs_api_method | target.resource.attribute.labels[tabs_api_method] | |
|  | target.hostname | If the telemetry_event_signals.urllog field value does not match the regular expression pattern the[http:\/\/ or https:\/\/].*, then thetelemetry_event_signals.urllog field is mapped to thetarget.hostnameUDM field. | 
| telemetry_event_signals.destination | target.resource.attribute.labels[destination] | |
| telemetry_event_signals.source | target.resource.attribute.labels[source] | |
| telemetry_event_signals.domain | target.domain.name | |
| telemetry_event_signals.cookie_name | target.resource.attribute.labels[cookie_name] | |
| telemetry_event_signals.cookie_path | target.resource.attribute.labels[cookie_path] | |
| telemetry_event_signals.cookie_is_secure | target.resource.attribute.labels[cookie_is_secure] | |
| telemetry_event_signals.cookie_store_id | target.resource.attribute.labels[cookie_store_id] | |
| telemetry_event_signals.cookie_is_session | target.resource.attribute.labels[cookie_is_session] | |
| telemetry_event_signals.connection_protocol | network.application_protocol | If the telemetry_event_signals.connection_protocollog field value is equal toHTTP_HTTPS, then thenetwork.application_protocolUDM field is set toHTTPElse, If the telemetry_event_signals.connection_protocollog field value is equal toUNSPECIFIED, then thenetwork.application_protocolUDM field is set toUNKNOWN_APPLICATION_PROTOCOLElse, the telemetry_event_signals.connection_protocollog field is mapped to thetarget.resource.attribute.labelsUDM field. | 
| telemetry_event_signals.contacted_by | target.resource.attribute.labels[contacted_by] | |
| local_ips | principal.ip | If the event log field value is equal to extensionTelemetryEvent, then thelocal_ipslog field is mapped to theprincipal.ipUDM field. | 
| remote_ip | target.ip | If the event log field value is equal to extensionTelemetryEvent, then theremote_iplog field is mapped to thetarget.ipUDM field. | 
| device_fqdn | principal.asset.attribute.labels | If the event log field value is equal to extensionTelemetryEvent, then thedevice_fqdnlog field is mapped to theprincipal.asset.attribute.labelsUDM field. | 
| network_name | principal.network.carrier_name | If the event log field value is equal to extensionTelemetryEvent, then thenetwork_namelog field is mapped to theprincipal.network.carrier_nameUDM field. | 
Siguientes pasos
Para ver blogs de la comunidad sobre los registros de Chrome, consulta los siguientes enlaces:
¿Necesitas más ayuda? Recibe respuestas de los miembros de la comunidad y de los profesionales de Google SecOps.