Home » Understanding Browser Security
 

Understanding Browser Security

Browser Scanning & Data Collection

Browser scans are conducted following agent onboarding and agent version upgrades. Subsequent scans are not automatic, but can be scheduled on a daily, weekly, or monthly basis, according to organizational needs. Web activity data collected during these scans will be retained for a period of 30 days from the scan's completion.

Pre-Requisites

The Browser Security extension is mandatory on all managed browsers within endpoints to provide comprehensive visibility into web applications and activity. Below are the functionalities that necessitate the presence of this extension:

  • Download Filter
  • Web Filter
  • Browser Router
  • Web activity tracking

Conversely, the following features do not require the Browser Security extension:

  • Add-on Management
  • Threat Prevention
  • Data Leakage Prevention
  • Browser Customization
  • Java Manager
  • Browser Lockdown
  • Web Isolation
  • Browser Restriction

Policy Deployment & Enforcement in Agent

  • To Computers

    Upon associating a policy with any computer and subsequent deployment, the policy will be applied immediately to the designated machines. Similarly, the removal of a policy will take effect immediately.

  • To Groups

    Upon association and deployment of a policy to a custom group, it is immediately applied to all currently online agent machines within that group. For large custom groups (exceeding 100 machines), the policy is initially applied to a subset of 100 machines, with the remaining machines receiving the policy during the subsequent refresh cycle.

Browser Security Policy Conflict Precedence

In instances where multiple policies of the same feature (e.g., Web Filter) are deployed to a single endpoint, the most recently deployed policy will be enforced. For example, if two Web Filter policies are deployed, one blocking access to google.com and the other permitting access, the policy deployed most recently will determine the effective access control.

Was this article helpful?

Thank you for your feedback!

Sorry about that!

By clicking "Submit", you agree to processing of personal data according to thePrivacy Policy.
Back to Top