Enterprise Browser Extension

Enterprise Browser Extension installs Netzilo's browser extension to protect data delivered through web applications. It provides real-time protection against web-based threats and unauthorized data access while maintaining a seamless browsing experience.

Overview

The browser extension offers an additional layer of security for users browsing the internet. It monitors and controls access to web applications, ensuring that data remains protected even during online interactions. Unlike full browser solutions, the extension works with existing browsers, making deployment easier and less disruptive.

Configuration

Initial Setup

browser-extension-setup

The browser extension can be deployed across multiple browsers and configured with domain-specific security policies.

Domain Settings

domain-settings

Customize DLP controls for specific domains. Various security controls are available, such as:

  • Restricting file downloads based on domains
  • Redacting and masking sensitive information
  • Adding watermarks
  • Blocking URLs
  • Preventing AI prompt injections

You can instantly activate required features from the configuration panel.

Security Features

Restrict Downloads

restrict-downloads

Control file downloads from matching web domains:

Download Control Options:

  • Block all downloads
  • Allow specific file types
  • Scan before download
  • Redirect to secure storage
  • Log download attempts

File Type Management:

  • Whitelist safe extensions
  • Block executable files
  • Scan archives
  • Check file signatures
  • Validate MIME types

Block URLs

block-urls

Define URL patterns that should be blocked from being accessed:

Blocking Methods:

  • Pattern matching
  • Regular expressions
  • Category filtering
  • Reputation scoring
  • Real-time threat feeds

Response Actions:

  • Display block page
  • Redirect to safe site
  • Log attempt
  • Alert administrators
  • Educate users

Restrict Content

restrict-content

Define data restriction options and access levels for sensitive content.

Redact Data

redact-data

Automatically detect and mask sensitive data patterns before displaying:

Detectable Patterns:

  • Social Security Numbers
  • Credit card numbers
  • Bank account numbers
  • Email addresses
  • Phone numbers
  • API keys
  • Passwords
  • Personal identifiers

Redaction Methods:

  • Complete masking (●●●●)
  • Partial masking (●●●●1234)
  • Replacement text ([REDACTED])
  • Blur effect
  • Removal

Add Watermark

add-watermark

Add watermarks to websites while visiting:

Watermark Options:

  • User identification
  • Timestamp
  • IP address
  • Classification level
  • Custom text

Display Settings:

  • Opacity level
  • Position (center/corners)
  • Rotation angle
  • Font size
  • Color scheme

Restrict Clipboard

restrict-clipboard

Control copy and paste operations from matching web domains:

Clipboard Controls:

  • Block all copy operations
  • Prevent paste into forms
  • One-way clipboard
  • Sanitize clipboard content
  • Log clipboard usage

Restrict Printing

Prevent browser from printing sensitive data from matching domains:

Print Controls:

  • Block print function
  • Add watermark to prints
  • Convert to secure PDF
  • Log print attempts
  • Require approval

Restrict Uploading Source Code

Detect and block source code upload attempts:

Detection Methods:

  • Syntax analysis
  • File extension checking
  • Content pattern matching
  • Entropy analysis
  • Language detection

Protected Code Types:

  • Programming languages
  • Configuration files
  • Script files
  • Database queries
  • Infrastructure code

Restrict Viewing Source Code

Detect and redact source code snippets in pages:

Code Protection:

  • GitHub/GitLab repositories
  • Code sharing sites
  • Documentation pages
  • Stack Overflow
  • Developer forums

Restrict Viewing Classified Content

classified-content

Block access to content based on organization's data classification labels:

Classification Levels:

  • Public
  • Internal
  • Confidential
  • Secret
  • Top Secret

Enforcement Actions:

  • Block access
  • Require authentication
  • Add watermark
  • Enable audit logging
  • Time-based access

Advanced Features

Prevent LLM Prompt Injections

ai-protection

Intercept and secure AI conversations against injection attacks:

Protection Capabilities:

  • Prompt sanitization
  • Injection detection
  • Context validation
  • Output filtering
  • Token limiting

Supported Platforms:

  • ChatGPT
  • Claude
  • Bard
  • Copilot
  • Custom AI tools

Make Session Cookies Temporary

Mark session cookies for deletion when browser closes:

Cookie Management:

  • Session-only cookies
  • Automatic cleanup
  • Selective persistence
  • Cross-domain control
  • Tracking prevention

Show Gray Border

Draw a gray border around protected web content:

Visual Indicators:

  • Border color/style
  • Protection status
  • Security level
  • Domain indication
  • User alerts

Allow Exceptions

allow-exceptions

Define exceptions for restrictions for certain users:

Exception Types:

  • User-based
  • Group-based
  • Time-based
  • Location-based
  • Device-based

Management:

  • Temporary exceptions
  • Approval workflow
  • Audit logging
  • Automatic expiry
  • Review reminders

Posture Checks

posture-check

Apply additional posture check controls to the browser extension:

  1. Navigate to Posture Check tab
  2. Select Browse or New Posture Check
  3. Configure compliance requirements
  4. Set evaluation logic (All/Any)

Common Posture Checks:

  • OS version requirements
  • Antivirus status
  • Firewall configuration
  • Patch level
  • Certificate validation

Deployment

Browser Support

Supported Browsers:

  • Google Chrome
  • Microsoft Edge
  • Mozilla Firefox
  • Safari
  • Brave
  • Opera

Deployment Methods:

  • Group Policy
  • Chrome Web Store
  • Microsoft Store
  • Manual installation
  • Enterprise distribution

Installation Process

Automated Deployment:

  1. Configure extension package
  2. Set default policies
  3. Deploy via management tool
  4. Verify installation
  5. Monitor adoption

Manual Installation:

  1. Download extension package
  2. Open browser extensions page
  3. Enable developer mode
  4. Load unpacked extension
  5. Configure settings

Use Cases

Data Loss Prevention

Financial Services:

  • Prevent account number leaks
  • Block unauthorized transfers
  • Protect trading information
  • Secure customer data
  • Audit compliance

Healthcare:

  • Protect patient information
  • HIPAA compliance
  • Secure medical records
  • Prevent PHI exposure
  • Audit access

Intellectual Property Protection

Technology Companies:

  • Prevent code leaks
  • Protect algorithms
  • Secure documentation
  • Block unauthorized sharing
  • Track access

Manufacturing:

  • Protect designs
  • Secure specifications
  • Prevent formula leaks
  • Control documentation
  • Monitor access

Compliance

Regulatory Requirements:

  • GDPR compliance
  • CCPA requirements
  • SOX compliance
  • PCI DSS standards
  • Industry regulations

Best Practices

Configuration

  1. Start restrictive: Begin with maximum protection
  2. Test thoroughly: Validate with pilot groups
  3. Document exceptions: Track all policy exceptions
  4. Regular reviews: Audit settings quarterly
  5. User feedback: Collect and act on user input

Monitoring

  1. Real-time alerts: Configure immediate notifications
  2. Regular reports: Schedule compliance reports
  3. Trend analysis: Monitor usage patterns
  4. Incident response: Have clear procedures
  5. Audit trails: Maintain comprehensive logs

User Experience

  1. Clear communication: Explain security measures
  2. Visual indicators: Use borders and watermarks
  3. Performance optimization: Minimize browsing impact
  4. Help resources: Provide user documentation
  5. Feedback mechanism: Enable user reporting

Troubleshooting

Common Issues

Extension Not Loading

  • Check browser compatibility
  • Verify installation method
  • Review permissions
  • Check policy conflicts
  • Validate signature

Performance Impact

  • Optimize rule sets
  • Review regex patterns
  • Check network latency
  • Adjust scanning depth
  • Update extension version

False Positives

  • Refine detection patterns
  • Update whitelists
  • Review exceptions
  • Adjust sensitivity
  • User training

Policy Not Applying

  • Check domain matching
  • Verify user groups
  • Review precedence
  • Test conditions
  • Check sync status

Diagnostic Tools

  • Extension console logs
  • Network inspection
  • Policy evaluation
  • Performance profiler
  • Debug mode

Maintenance

Regular Updates

  • Extension version updates
  • Policy refinements
  • Pattern updates
  • Whitelist maintenance
  • Exception reviews

Performance Monitoring

  • Page load times
  • Memory usage
  • CPU utilization
  • Network impact
  • User experience metrics