google/chrome-enterprise-security-events Dashboards
The ChromeOS Data Controls dashboard provides comprehensive data control rule monitoring through flow-based visualizations. This dashboard enables tracking of rule trigger patterns, analysis of user-rule interactions, and monitoring of data movement between sources and destinations.
The ChromeOS Overview dashboard presents detailed user access monitoring through login-focused visualizations. This dashboard enables tracking of company, guest, and non-company user logons, monitoring of peripheral and remote desktop connections, and analysis of device access patterns.
The Event Information dashboard provides detailed Chrome event analysis through temporal visualizations. This dashboard enables monitoring of browser crash events, tracking of security event patterns over time, and analysis of event severity trends across the Chrome environment.
The Extension Monitoring dashboard presents Chrome extension management through installation-focused visualizations. This dashboard enables tracking of blocklisted extensions, monitoring of recent installations, and analysis of extension deployment patterns over 30-day periods.
The Security Overview dashboard provides comprehensive security monitoring through multi-dimensional visualizations. This dashboard enables tracking of platform-specific security events, analysis of potential credential and malware threats, and monitoring of browser version-related security patterns across the environment.
ChromeOS Data Controls
The ChromeOS Data Controls dashboard provides comprehensive data control rule monitoring through flow-based visualizations. This dashboard enables tracking of rule trigger patterns, analysis of user-rule interactions, and monitoring of data movement between sources and destinations.
| Widget | Description | Type |
|---|---|---|
Displays and groups a list of trigger types by vendor.
| Pie Chart | |
Displays a list of top Chrome users triggering data control rules
by username.
| Table | |
Displays a flow chart of device users who have triggered rules.
| Sankey | |
Displays a flowchart of events from source to destination.
| Sankey | |
Displays a table of triggered rules and associated data
(timestamp, device user, triggered rule, etc.)
| Table | |
Displays a chart of triggered rules via data access control events
by vendor.
| Pie Chart |
ChromeOS Overview
The ChromeOS Overview dashboard presents detailed user access monitoring through login-focused visualizations. This dashboard enables tracking of company, guest, and non-company user logons, monitoring of peripheral and remote desktop connections, and analysis of device access patterns.
| Widget | Description | Type |
|---|---|---|
Displays a list of Google Chrome logons including user name and
device name.
| Table | |
Displays a table of recent non-company Chrome logins with
timestamp and device name.
| Table | |
Displays a table of connected peripherals and associated data
(timestamp, device name, device user, etc.)
| Table | |
Displays a list of Chrome guest account logons by device.
| Single Value | |
Displays a list of non-company user Chrome logons.
| Single Value | |
| Displays a note regarding Google Chrome remote desktop usage. | Note | |
Displays a table of host connections started and related data
(timestamp, device name, and device user).
| Table | |
Note | ||
Displays the number of Chrome user logons.
| Single Value | |
Displays a table of connected clients and associated data
(timestamp, device name, device user).
| Table | |
Displays a table of recent Chrome guest account logons with
timestamp and device name data.
| Table | |
Note |
Event Information
The Event Information dashboard provides detailed Chrome event analysis through temporal visualizations. This dashboard enables monitoring of browser crash events, tracking of security event patterns over time, and analysis of event severity trends across the Chrome environment.
| Widget | Description | Type |
|---|---|---|
Displays a table of events and their associated data (timestamp,
device ID, device user, client type, etc.)
| Table | |
Displays a table of Chrome browser crash events and associated
data (device ID, device user, browser version, etc.)
| Table | |
Displays a chart of severity events by reason and limits results
to the first 10 entries.
| Time Chart | |
Displays a chart of Google security events and limits results to
the first 10 entries.
| Time Chart |
Extension Monitoring
The Extension Monitoring dashboard presents Chrome extension management through installation-focused visualizations. This dashboard enables tracking of blocklisted extensions, monitoring of recent installations, and analysis of extension deployment patterns over 30-day periods.
| Widget | Description | Type |
|---|---|---|
Displays a table of recent block listed extension installations
and associated data (extension ID, extension name, device ID,
device user, etc.)
| Table | |
Displays a table of a users least installed extensions over the
last 30 days.
| Table | |
Displays a list of recent Chrome browser extensions installed,
organized by device ID and user profile.
| Table | |
| Extension Blocklist can be added in the Files tab with the file name chrome_extensions_blocklist.csv and column header extension_id. The query is matching the unique ID of the extension from the Chrome web store. The ID can be found in the URL of the extension in the Chrome web store. Eg: kchfmpdcejfkipopnolndinkeoipnoia for User-Agent Switcher | Note |
Security Overview
The Security Overview dashboard provides comprehensive security monitoring through multi-dimensional visualizations. This dashboard enables tracking of platform-specific security events, analysis of potential credential and malware threats, and monitoring of browser version-related security patterns across the environment.
| Widget | Description | Type |
|---|---|---|
Displays a pie chart of security event counts by OS platform.
| Pie Chart | |
Displays a table of URLs via Chrome that may have credential
leaks, including bad navigation events or password reuse events
and limits results to the first 10 entries.
| Table | |
Displays the number of unique device IDs.
| Single Value | |
Displays a chart of Google security events by reason.
| Bar Chart | |
Note | ||
Displays a table of problematic host names and limits results to
the first 10 entries.
| Table | |
Displays a list of unique trigger types by vendor.
| Single Value | |
Displays a list of unique users with security events.
| Single Value | |
Note | ||
Displays a table of the top 10 Google security events.
| Table | |
Displays a list of vendor security events by trigger type.
| Table | |
Displays a table of events by device user.
| Table | |
Note | ||
Displays a flow chart of device users to devices using Google
data.
| Sankey | |
Displays a table of device data such as device name, device ID,
Device user, etc.
| Table | |
Displays a table of the top 10 Google security events by event
type.
| Table | |
Displays a list of security events by Chrome user profile and
limits the results to the first 10 entries.
| Table | |
Displays unique OSs with security events.
| Single Value | |
Displays a pie chart of Google Chrome browser versions.
| Pie Chart | |
Note | ||
Displays a table of the top 10 OS platforms with security events.
| Table | |
Displays a table of potential malware websites by URL and limits
results to the first 10 entries.
| Table | |
Displays a table of the top 10 device users and their events.
| Table | |
Note |