Manage browser add-ons

Usage of browser add-ons has gone haywire with browsers becoming an integral part of businesses. IT administrators have little to no control over the installation and usage of add-ons.

Blacklist extensions based on permissions

Extensions are capable of tracking users's entire browsing activity with permissions. These permissions are similar to those used by mobile apps to access various aspects of the mobile to render its functionality. For example, the permission called "web request" allows the extension to access their entire browsing history. Extensions which have the permission enabled, become the gateway to enterprise data. Restrict users from providing such permissions to extensions using Browser Security Plus's Add-on Management feature

How to disable Chrome extensions based on the permissions they use.

  • Navigate to policies and click on Add-on Management.
  • Click on Search Permissions corresponding to Blacklist Permissions.
  • Select the permissions you want to blacklist.
  • Save and publish the policy.
  • Deploy the policy to computers that you want to apply the changes to.

Blacklisting and whitelisting plug-ins in Internet Explorer.

Plug-ins required for rendering webpages in Internet Explorer, need to be kept up-to-date in order to ensure security. An out-of-date plug-in acts as a loophole that hackers exploit to inject computers with malware. But manually ensuring that the plug-ins stay updated, is an impossible task. Similarly, plug-ins that are not signed by their developers can not be trusted in an enterprise. Browser Security Plus detects such plug-ins. IT administrators can blacklist such plug-ins using Add-on Management.

 

how to disable plug-ins in Internet Explorer

  • Navigate to policies and click on Add-on Management.
  • Click on the Internet Explorer tab.
  • Select the plug-ins that you want to blacklist from the Blacklist Plug-ins drop down list.
  • Save and publish the policy.
  • Deploy the policy to computers that you want to apply the changes to.

Blacklisting and whitelisting extensions in Google Chrome

Users make use of a plethora of extensions to simplify regular day-to-day work. He could use a certain number of extensions in the browser logged in with his personal account. When enterprises allow users to access personal sites in corporate network, the chances that he logs into the browser with his personal account is pretty high. When he does, the extensions he uses on his personal sites would now be able to access enterprise sites. This could lead to loss in enterprise data. This issue could be avoided by blacklisting installation of chrome extensions and whitelisting only those that are trusted.

How to disable Chrome extensions

  • Navigate to policies and click on Add-on Management.
  • Check No corresponding to Allow users to install extensions checkbox.
  • Select the extensions that you want to whitelist from the Whitelist extensions drop down list.
  • Save and publish the policy.
  • Deploy the policy to computers that you want to apply the changes to.

Silent distribution of chrome extensions:

Browser extensions enhance users's browsing experience and increases productivity. Availability of extensions that manages account passwords, day-to-day tasks, e-mails makes our lives easier and businesses better. Such extensions are a heaven sent to the users while it's nothing more than trouble to you as an IT administrator. Managing these extensions, making sure only trusted extensions from the Chrome webstore are being used by users, ensuring that the extensions don't steal enterprise data. The list is never ending.

To simplify things, Browser Security Plus offers an Extension Repository which enables you to silently distribute extensions to users. This pushes the ball to your court handing you control over the situation. Distribute those extensions that you trust and you believe to be absolutely necessary to the users through Extension Repository, while restricting the download of any new extensions. This ensures the presence of only trusted extensions in your network.