Enable Cloud Malware Protection for Google Drive
Table of Contents
Prerequisites
- The person performing the authentication must be a Google Super Admin and have an active Google user license.
- Chrome or Firefox is recommended with pop-up blockers/ad blockers disabled (only for the duration of authorization).
- Umbrella DLP Connector (also known as the SaaS API Connector) must be installed in the tenant by a Google Admin User. We recommend using a service account for the installation.
Limitation
- A tenant that fails to authenticate cannot be deleted.
Authorize a Tenant
- In the Umbrella dashboard, navigate to Admin > Authentication.
- In the Platforms section, click to expand Google.
![](https://files.readme.io/34ea8cc-Step2.jpg)
- In the Cloud Malware section, click Authorize New Tenant to add a Google tenant to your Umbrella environment.
![](https://files.readme.io/08c6afa-Step3.jpg)
- In the Google Authorization dialog box, check the checkbox to verify you meet the prerequisite, then click Next.
Note: The link to the SaaS API Connector brings you to the Umbrella DLP Connector site in the Google Workspace Marketplace. This is correct, despite the nomenclature difference.
![](https://files.readme.io/f901580-Step4.jpg)
- Add a Tenant Name and then click Next.
![](https://files.readme.io/c8acaf1-Step5.jpg)
- Select a Response Action for Umbrella to apply to Google files found with malware and then click Next.
- Choose Monitor to cause Umbrella to log files detected with malware. You will be able to manually quarantine these files from the Cloud Malware report.
- Choose Quarantine to:
- Move the file into a folder named Cisco_Quarantine_Malware in the root path of the admin who authorized the tenant, remove all collaborators, and change the file owner to the Google admin.
- Replace the file in its original location with a text file named filename.ppt_Cisco_Quarantined.txt explaining to the original file owner that the file is identified as malware and for more information to contact their organization administrator.
![](https://files.readme.io/75649a0-Step6.jpg)
![](https://files.readme.io/e1026de-Step6.jpg)
- Add a gmail Email Address and then click Done.
![](https://files.readme.io/bdd511e-Step7.jpg)
![](https://files.readme.io/df37865-Step7.jpg)
The new tenant appears in the Cloud Malware section.
![](https://files.readme.io/9fc10cf-Step8.jpg)
Edit a Tenant
You can change the Response Action you have selected for a tenant.
- Navigate to Admin > Authentication.
- In the Platforms section, click Google.
- In the Cloud Malware section, from the Edit column click Edit.
![](https://files.readme.io/2020e69-EditStep3.jpg)
- Select a Response Action for Umbrella to apply to Google files found with malware and then click Next.
- Choose Monitor to cause Umbrella to log files detected with malware. You will be able to manually quarantine these files from the Cloud Malware report.
- Choose Quarantine to:
- Move the file into a folder named Cisco_Quarantine_Malware in the root path of the admin who authorized the tenant, remove all collaborators, and change the file owner to the Google admin.
- Replace the file in its original location with a text file named filename.ppt_Cisco_Quarantined.txt explaining to the original file owner that the file is identified as malware and for more information to contact their organization administrator.
![](https://files.readme.io/0b937f4-Step6.jpg)
- Click Done.
![](https://files.readme.io/2817536-EditStep5.jpg)
The new Response Action is displayed.
![](https://files.readme.io/dcd1555-EditStep6.jpg)
Revoke Authorization
You can revoke any authorized tenant.
- From the Action column, click Revoke.
![](https://files.readme.io/5be3fc5-RevokeStep1.jpg)
- Click Revoke. The selected tenant is no longer authorized.
![](https://files.readme.io/3b6641d-RevokeStep2.jpg)
Enable Cloud Malware Protection for Webex Teams Tenants < Enable Cloud Malware Protection for Google Drive Tenants > Manage SaaS API Data Loss Prevention
Updated 3 months ago