![]()
Note: For this event to be reported, Password Manager must be enabled.Ī successful user sign in to a domain with the URL specified in the Reporting Connector settings. The URL visited by the user is considered to be deceptive or malicious. The user has entered a password into a URL that’s outside of the list of allowed enterprise login URLs. The user resets their password for the first-signed-in user account. The content uploaded or downloaded by the user is considered to be malicious, dangerous, or unwanted. From the drop-down list, select an option.Ĭhrome Threat event descriptions Event value.Open the log events as described above in Open Chrome log event data. #Chrome workspaces how to#Note: Chrome content transfer, content unscanned, and sensitive data transfer events are available only for customers who have purchased BeyondCorp Enterprise.įor more information about BeyondCorp and how to set it up, go to Protect Chrome users with BeyondCorp Threat and Data Protection. The value is platform-specific.įilter data by threat or data protection events #Chrome workspaces mac os x#For example, Mozilla/5.0 (Macintosh Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/.0 Safari/537.36. The user agent string of the browser used to access the content. For example, if there are multiple URL's involved in the breach, there could be multiple rows. The URL that generated the event. In the case of Password breach, this is one record per URL.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |