USM Anywhere™

Configuring the AlienApp for G Suite

Role Availability Read-Only Analyst Manager

After you configure the connection between the AlienApp for G Suite for a deployed USM Anywhere Sensor and your Google G Suite environment, the predefined log collection jobs perform scheduled queries for eventsAny traffic or data exchange detected by AT&T Cybersecurity products through a sensor, or through external devices such as a firewall.. When USM Anywhere collects and analyzes the first of these events, the G Suite Audit and G Suite Drive dashboards are available in the Dashboard menu (according to the types of collected events).

Note: Currently, the AlienApp for G Suite supports the connection of one G Suite account per USM Anywhere Sensor. If you have more than one G Suite account that you want to monitor in USM Anywhere, you must configure each for a different sensor.

Set Up the Google Service Account

As a Google administrator, you must create a new project in your Google Developers console and create a service account in the API console to support server-to-server interactions. For more information about server-to-server authentication in Google, refer to https://developers.google.com/accounts/docs/OAuth2ServiceAccount.

As you complete the following setup tasks, you must collect these items to complete the integration with the AlienApp for G Suite:

  • Client identification (ID) for the service account
  • User email for the login that you use to create the account
  • Private key file, which is saved to your computer when you create the service account and the key

Important: You must have administrative privileges to configure G Suite for integration with the AlienApp for G Suite. Ask your Google administrator for these privileges.

First, create a service account. See the G Suite Administrator Help for instructions. Pay attention to these specifics:

  • In Step 2: Enable the APIs, enable the Admin SDK.
  • In Step 3: Create the service account, do the following:

    1. For key type, select P12 and click Create (item 8 in the article).

      A dialog box opens informing you that the private key has been saved to your computer. It also displays the password for the private key.

    2. Copy the password and store it in a secure location.
    3. Skip item 11–16 in the article and continue with the rest of this document.

Delegate domain-wide authority to the service account you just created. See the Google Identity Platform Guide for instructions. Pay attention to these specifics:

  • In the One or More API Scopes field (step 6), enter https://www.googleapis.com/auth/admin.reports.audit.readonly and click Authorize.

    Important: Adding the client and scopes in the G Suite console can be subject to a propagation time, which could be up to two hours. If you use the Check Connections tool for your G Suite platform in CloudMigrator, it may not be successful immediately.

Connecting the AlienApp for G Suite

After you create the new service account in G Suite and enable the Admin SDK, you must configure the connection within USM Anywhere.

Important: Adding the Client and Scopes in the G Suite console can be subject to a propagation time, which could be up to two hours. The AlienApp for G Suite connection configuration might not be successful immediately if these resources are not yet accessible.

To enable the AlienApp for G Suite

  1. In USM Anywhere, go to Data Sources > AlienApps.
  2. Click the Available Apps tab.
  3. Search for the AlienApp, and then click the tile.
  4. Click Configure API.
  5. If you have more than one deployed USM Anywhere Sensor, select the sensor that you want to use for the enabled AlienApp.

    AlienApps operate through a deployed sensor and use APIs to integrate with the connected third-party technology. Select the sensor that can access the integration endpoint. The HTTPS connections to the API will originate from this sensor, so it is important to make sure the sensor has network access to the AlienApp API endpoints.

  6. In the Service Client ID field, enter the unique ID for the Google service account you created.
  7. In the User Email field, enter the G Suite admin user email address.

    Note: The G Suite Admin user is the account you use to sign in to your Google Admin console. You cannot use the email address of the service account created for this integration.

  8. (Optional.) If using, click Choose File to upload the P12 private key file for the Google service account you created.

    Enter the Google service account credentials and add the private key file

  9. Click Save.