Browser Configuration

Proactively fight vulnerabilities by securing your browser

The alarming numbers!

According to a report issued by Skybox Security, the second half of 2017 witnessed a huge spike in the number of Common Vulnerabilities and Exposures (CVEs) published. A total of 14,646 new CVEs were published, representing a 127-percent jump over the previous year. A report generated in June 2018 shows that 8,502 CVEs have been published by National Vulnerability Database (NVD) which has already been exceeding figures for all of 2016, thus putting 2018 on track to exceed the record-breaking stats of 2017. In order to deal with the alarming vulnerability influx, organizations will need a complete endpoint security software like Desktop Central.

An IT admin wakes up to such alarming numbers and is expected to scour for a patching solution. Desktop Central's Patch Management is an IT admin's saviour for handling vulnerabilities and the corresponding patching solution.

Criticality of browser security

Browser-based vulnerabilities are on the rise. Web browsers statistics tend to affect the exploitation of browsers, meaning, most commonly used browsers are considered to be the most insecure ones. Skybox Research Lab study reports show that 4 out of 10 vulnerable products are web browsers. Browser attacks such as man-in-the-browser and crypto jacking can fly under the radar, thus making their detection tough. The reason web threats are specifically designed to leverage browser-based vulnerabilities is because:

  • Browsers are used inevitably in any organization and are the most vulnerable endpoints
  • Web browsers are a data-rich tool that if compromised can provide sensitive credentials to the attackers
  • A browser is the only medium of interaction with websites that are hosts to malevolent programs, thus making malware injection easy

Combat browser-based vulnerabilities with Desktop Central

Since web browsers don't come packed with high level of embedded security, you will have to customize the security level to keep intruders at bay. Desktop Central makes the process of securing web browsers as easy as pie by categorizing the browser settings into 5 different divisions. 

  1. General settings : Restrict the scope of browser usage in your network by defining the default browser and search engine. By providing home page(s), end users can save time as they do not have to open web pages manually every time they launch a browser.
  2. Proxy settings : Configure proxy settings to mask your IP address from prying eyes.
  3. Restrictions : Impose Microsoft Edge specific restrictions that would help you in safeguarding your systems when cookies and extensions become vulnerable.
  4. Security settings : Specify trusted sites and restricted sites to allow communications selectively and to restrict users' access to certain websites respectively.
  5. Advanced settings : Shield sensitive information by clearing password cache and automatically combat compatibility issues by providing the list of legacy sites that need to be rendered by Internet Explorer.

Once all of the aforementioned settings have been configured, create the browser configuration and deploy it by defining the targets and the execution settings.