Google Workspace
This is a combined document for enabling the Dropzone AI Data Source and Alert Source for Google Workspace.
The Dropzone AI platform integrates with Google Workspace APIs for ingesting alerts such as phishing reports and enriching investigations with data from Google Workspace such as directory information. This document describes how to set up API credentials and install them into the Dropzone platform.
Integration Overview
To enable these integrations you will perform the following actions:
Enable domain-wide delegation in Google Workspace
Create a Google Workspace admin role
Select integration parameters, such as which alert types to sync
The Dropzone platform has a dedicated service account for your organization. This service account uses domain-wide delegation to gain access to specific API scopes within your organization.
Enable Domain-Wide Delegation
To grant access to the Google service account used by your Dropzone platform, do the following:
Navigate to your Dropzone AI tenant home page e.g. https://mycompany.dropzone.app
In the bottom left hand corner, navigate to Settings > Integrations

Click "Available"

In the Search bar, search Google Workspace, then click "Configure"

Record the "CLIENT ID" field which will be used in the Google Admin interface

Next, enable the Dropzone AI application domain-wide delegation access to your Google Workspace environment.
As a full Google Workspace admin, do the following:
Navigate to your admin workspace
In the sidebar, navigate to Security > Access and Data Control > API Controls
At the bottom, click Manage Domain Wide Delegation
Click "Add New" API Client
Enter the Client ID in the pop up
This is the ~21 digit number you recorded from the Dropzone UI earlier
Grant access to the following scopes by copy/pasting them into the "OAuth Scopes" line one-by-one
https://www.googleapis.com/auth/apps.alerts
https://www.googleapis.com/auth/gmail.readonly
https://www.googleapis.com/auth/admin.directory.user.readonly
https://www.googleapis.com/auth/admin.reports.audit.readonly
https://www.googleapis.com/auth/admin.reports.usage.readonly
https://www.googleapis.com/auth/admin.directory.group.readonly
Click "Authorize" to finish
Choose or Create a Google Workspace Admin Account
Dropzone uses the Google Workspace Admin API to find information from your environment using a user within your org that has an Admin Role with necessary privileges.
Note that Dropzone may request more permissions in the future as we add features.
To create and associate the new role, do the following:
Go to Account > Admin Roles > Create New Role

Name the role something memorable, such as "Dropzone AI Role." Input a description, such as "Dropzone AI integrations," then click "Continue"

You'll now be on the "Select Privileges" page
On this page enable the following:
Admin console privileges
Organizational Units > Read
Users > Read
Google Vault > Manage Audits
Gmail > Email log search
Gmail > Access Admin Quarantine
Gmail > Access Restricted Quarantines
Security Center > "This user has full ..." > Audit and Investigation > View
Security Center > "This user has full ..." > Audit and Investigation > View sensitive content
Security Center > Activity Rules > View
Security Center > Activity Rules > Manage
Alert Center > Full access
DLP > View DLP rule
DLP > Manage DLP rule
Reports
Admin API privileges
Organizational Units > Read
Users > Read
Groups > Read
Reports

Once done, click "Continue"
There are two sections of this user interface, the "Admin Console Privileges" at top and "Admin API Privileges" further down the page; make sure you configure all the permissions from both sections.
Assign the new role to a Google Workspace user:
Go to https://admin.google.com
In the sidebar, navigate to Account > Admin Roles
Hover over the role you created and click "Assign Admin"

Click "Assign Members" to add the role to the user you want for the Dropzone integration
Pick an existing admin or an account you created specifically for the Dropzone integration

Enable The Dropzone Data Source Integration
The Data source integration allows Dropzone AI to interact with Google Workspace to gather information for use in investigation analysis and interactive chat.
You'll need the following information:
Admin Email
The email address of the admin in the new Dropzone AI role
Customer ID
Your Google Workspace customer id
The Customer ID can be found can be found at admin.google.com > Account > Account Settings (https://admin.google.com/ac/accountsettings) or in the output of gam info domain
. It's typically a ~9 character string starting with C
.
To enable the Data Source integration, do the following:
Navigate to your Dropzone AI tenant home page e.g. https://mycompany.dropzone.app
In the bottom left hand corner, navigate to Settings > Integrations

Click "Available"

In the Search bar, search Google Workspace, then click "Configure"

Under the Data Source heading, input the "Admin Email" and "Customer ID"

Click "Test & Save" to finish
If you have any errors engage your Dropzone AI support representative.
Enable The Dropzone Alert Source Integration
The Alert source integration allows Dropzone AI to pull alerts from Exchange Online and Microsoft Defender for investigation. Dropzone can investigate phishing emails via multiple mechanisms. An overview of them is shown below.
Google Workspace Phishing Alerts
Dropzone processes Google Workspace phishing alerts. [Google phishing alerts may take up to 4 hours to appear](https://support.google.com/a/answer/9104586 after users click the "Report Phishing" button in Gmail)
None - this is a built-in Google Workspace capability
Leave "Enable mailbox-based phishing analysis" unchecked
Dedicated phishing mailbox
Dropzone polls a dedicated Google Workspace account for phishing emails to analyze
You must instruct your employees to forward suspected emails to a dedicated email box, or have a third-party reporting tool (typically a Gmail add-on) that creates the emails in the target mailbox
Check "Enable mailbox-based phishing analysis" and fill out "Phishing Processing via Mailbox" section
To enable the Alert Source integration, you'll need the following information:
Admin Email
The email address of the admin in the new Dropzone AI role
Customer ID
Your Google Workspace customer id
The Customer ID can be found can be found at admin.google.com > Account > Account Settings (https://admin.google.com/ac/accountsettings) or in the output of gam info domain
. It's typically a ~9 character string starting with C
.
To enable the Alert Source integration, do the following:
Navigate to your Dropzone AI tenant home page e.g. https://mycompany.dropzone.app
In the bottom left hand corner, navigate to Settings > Integrations

Click "Available"

In the Search bar, search Google Workspace, then click "Configure"

Under the Alert Source heading, input the "Admin Email" and "Customer ID"

If you wish, you may input Google Workspace alert types to exclude from Dropzone's investigation. To do so, under the "Alert types to exclude" section, click "Add Item," then input the alert types

If you wish to utilize Google Workspace Phishing Alerts, you do not need to perform any extra steps, and may proceed to inputting your desired poll interval and lookback.
If you want to process phishing emails from a dedicated mailbox, do the following:
In the "Phishing Account Email Address" section, enter the email address of your dedicated phishing account
If you wish for only some of the messages in this phishing account to be processed, input a Gmail filter
For example, some third-party tools may modify the subject to include "Phishing Alert," in which case you can use a Gmail filter like
subject:"Phishing Alert"
to limit processing to these messages
If you use a third-party tool that includes the original email as an attachment then check the "Prefer RFC822 message attachment, when present" button

Once you are done selecting your Phishing Ingest Mechanism, input your desired poll interval and lookback

Click "Test & Save" to finish
You should begin ingesting alerts immediately.
If you have any errors engage your Dropzone AI support representative.
Last updated
Was this helpful?