Skip to content

Commit d1ccab2

Browse files
committed
rename screenshots
1 parent 9a7dbf4 commit d1ccab2

10 files changed

+11
-11
lines changed

defender-for-cloud-apps/protect-google-workspace.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -90,11 +90,11 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
9090

9191
1. In the **New project** page, name your project as follows: **Defender for Cloud Apps** and select **Create**.
9292

93-
:::image type="content" source="media/connect-google-workspace/3.jpg" alt-text="Screenshot that shows where to name your project inside of your Google Workspace." lightbox="media/connect-google-workspace/3.jpg":::
93+
:::image type="content" source="media/connect-google-workspace/name-your-project.jpg" alt-text="Screenshot that shows where to name your project inside of your Google Workspace." lightbox="media/connect-google-workspace/name-your-project.jpg":::
9494

9595
1. After the project is created, select the created project from the top ribbon. Copy the **Project number**, you'll need it later.
9696

97-
:::image type="content" source="media/connect-google-workspace/2.jpg" alt-text="Screenshot that shows where to copy the project number inside of your Google Workspace." lightbox="media/connect-google-workspace/2.jpg":::
97+
:::image type="content" source="media/connect-google-workspace/copy-project-number.jpg" alt-text="Screenshot that shows where to copy the project number inside of your Google Workspace." lightbox="media/connect-google-workspace/copy-project-number.jpg":::
9898

9999
1. In the navigation menu, go to **APIs & Services** > **Library**.
100100
Enable the following APIs (use the search bar if the API isn't listed):
@@ -105,38 +105,38 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
105105
1. In the navigation menu, go to **APIs & Services** > **Credentials** and do the following steps:
106106

107107
1. Select **CREATE CREDENTIALS**.
108-
109-
:::image type="content" source="media/connect-google-workspace/6.jpg" alt-text="Screenshot that shows where to select create credentials inside of your Google Workspace." lightbox="media/connect-google-workspace/6.jpg":::
108+
109+
:::image type="content" source="media/connect-google-workspace/select-create-credentials.jpg" alt-text="Screenshot that shows where to select create credentials inside of your Google Workspace." lightbox="media/connect-google-workspace/select-create-credentials.jpg":::
110110

111111
1. Select **Service Account**.
112112

113113
1. **Service account details**: Provide the name as *Defender for Cloud Apps* and description as *API connector from Defender for Cloud Apps to a Google workspace account*.
114114

115-
:::image type="content" source="media/connect-google-workspace/10.jpg" alt-text="Screenshot that shows where to provide service account details inside of your Google Workspace." lightbox="media/connect-google-workspace/10.jpg":::
115+
:::image type="content" source="media/connect-google-workspace/enter-service-account-details.jpg" alt-text="Screenshot that shows where to provide service account details inside of your Google Workspace." lightbox="media/connect-google-workspace/enter-service-account-details.jpg":::
116116

117117
1. Select **CREATE AND CONTINUE**.
118118

119119
1. Under **Grant this service account access to project**, for **Role** select **Project > Editor**, and then select **Done**.
120120

121-
:::image type="content" source="media/connect-google-workspace/11.jpg" alt-text="Screenshot that shows where to grant this service account access to project inside of your Google Workspace." lightbox="media/connect-google-workspace/11.jpg":::
121+
:::image type="content" source="media/connect-google-workspace/grant-service-account-access.jpg" alt-text="Screenshot that shows where to grant this service account access to project inside of your Google Workspace." lightbox="media/connect-google-workspace/grant-service-account-access.jpg":::
122122

123123
1. In the navigation menu, return to **APIs & Services** > **Credentials**.
124124

125125
1. Under **Service Accounts**, locate and edit the service account you created earlier by selecting the pencil icon.
126126

127-
:::image type="content" source="media/connect-google-workspace/12.jpg" alt-text="Screenshot that shows where to select the service account inside of your Google Workspace." lightbox="media/connect-google-workspace/12.jpg":::
127+
:::image type="content" source="media/connect-google-workspace/edit-service-account.jpg" alt-text="Screenshot that shows where to select the service account inside of your Google Workspace." lightbox="media/connect-google-workspace/edit-service-account.jpg":::
128128

129129
1. Copy the email address. You'll need it later.
130130

131131
1. Navigate to **KEYS** from the top ribbon.
132132

133-
:::image type="content" source="media/connect-google-workspace/13.jpg" alt-text="Screenshot that shows where to navigate to keys inside of your Google Workspace." lightbox="media/connect-google-workspace/13.jpg":::
133+
:::image type="content" source="media/connect-google-workspace/keys-tab.jpg" alt-text="Screenshot that shows where to navigate to keys inside of your Google Workspace." lightbox="media/connect-google-workspace/keys-tab.jpg":::
134134

135135
1. From the **ADD KEY** menu, select **Create new key**.
136136

137137
1. Select **P12**, and then select **CREATE**. Save the downloaded file and the password required to use the file.
138138

139-
:::image type="content" source="media/connect-google-workspace/14.jpg" alt-text="Screenshot that shows where to create a key inside of your Google Workspace." lightbox="media/connect-google-workspace/14.jpg":::
139+
:::image type="content" source="media/connect-google-workspace/create-private-key.jpg" alt-text="Screenshot that shows where to create a key inside of your Google Workspace." lightbox="media/connect-google-workspace/create-private-key.jpg":::
140140

141141
1. In the navigation menu, go to **IAM & Admin** > **Service accounts**. Copy the **Client ID** assigned to the service account you created - you'll need it later.
142142

@@ -147,7 +147,7 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
147147

148148
1. Under **Domain wide delegation**, select **MANAGE DOMAIN WIDE DELEGATION**.
149149

150-
:::image type="content" source="media/connect-google-workspace/17.jpg" alt-text="Screenshot that shows where to manage domain wide delegation inside of your Google Workspace." lightbox="media/connect-google-workspace/17.jpg":::
150+
:::image type="content" source="media/connect-google-workspace/manage-domain-wide-delegation.jpg" alt-text="Screenshot that shows where to manage domain wide delegation inside of your Google Workspace." lightbox="media/connect-google-workspace/manage-domain-wide-delegation.jpg":::
151151

152152

153153
1. Select **Add new**.
@@ -161,7 +161,7 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
161161

162162
1. Select **AUTHORIZE**.
163163

164-
![Google Workspace authorize new client ID.](media/connect-google-workspace/google-workspace-authorize-new-client-id.png)
164+
:::image type="content" source="media/connect-google-workspace/authorize-new-client-id.jpg" alt-text="Screenshot that shows where to authorize a new client ID inside of your Google Workspace." lightbox="media/connect-google-workspace/authorize-new-client-id.jpg":::
165165

166166
>[!IMPORTANT]
167167
> In order for the Google connector to function correctly, enable **Google Drive** for the Super Admin user that will be used for the connector.

0 commit comments

Comments
 (0)