Views:

Understand how Google Cloud Identity data is used in associated apps after you grant access permissions.

Note
Note
This feature is not available in all regions.
Associated App
Description
Email Asset Inventory
Email Asset Inventory uses Google Cloud Identity data to manage Email Sensors on protected email accounts.
Mobile Security
Mobile Security uses Google Cloud Identity data to enable end users to authenticate with Google Cloud Identity during mobile device enrollment.
Phishing Simulation Assessment
Phishing Simulation Assessment uses Google Cloud Identity data to add recipients to phishing simulations and identify employees who require additional security awareness education.
Attack Surface Risk Management
Attack Surface Risk Management uses Google Cloud Identity data for the following purposes:
  • Gain deeper insight regarding the apps and devices your users access, and the behaviors that contribute to users' risk analysis.
  • Perform policy enforcement actions in Google Cloud Identity, such as disabling user accounts and forcing password reset.
Search
Observed Attack Techniques
Workbench
Observed Attack Techniques, Search, and Workbench use Google Cloud Identity data to perform policy enforcement actions, such as disabling user accounts and forcing password reset, through the Response Management app.
User Accounts
User Accounts uses Google Cloud Identity data to create user accounts using the distribution list email addresses and member names.
Zero Trust Secure Access
Zero Trust Secure Access uses Google Cloud Identity data for the following purposes:
  • Sync users and user groups to provide granular access control over specified users or groups.
  • Perform policy enforcement actions in Google Cloud Identity, such as disabling user accounts and forcing password reset.
    Note
    Note
    If you use Private Access and Internet Access only, the least permission required is Read directory data. If you use the full features of Zero Trust Secure Access, grant the Read directory data and perform account management actions permission.
  • Sync your published Microsoft Purview Information Protection-encrypted sensitivity labels with user data to create data loss prevention rules for Internet Access.