Review browser extensions

If you have deployed the Trelica browser extension to your employees' devices, you can use the Browser Extensions report (available from the Reports list) to view a list of any other browser extensions that individuals have added to Chrome, Firefox or Edge. The report identifies the people that have added extensions to their browsers and the risk level.

The Browser Extensions report is useful if you want to check for unauthorized or high-risk browser extensions on your employees' devices. To see who has installed each browser extension, click the number in the "Users" column. 

Browser Extension report.png

The Browser Extensions report does not include any browser extensions that have been added to Safari.

Browser extension access risk

The level of access risk associated with each browser extension is calculated based on the permissions  requested by that browser extension.

To view the list of permissions requested by a browser extension and the associated risk, click the access risk score. Scores are based on the risk scoring defined by CRXcavator. (Note that in Trelica, scores for URL patterns containing wildcards have been increased to "Critical".)

Browser Extension report access risk details.png

To view a more detailed analysis of the risk posed by a browser extension added to Chrome or Edge, click the Source icon to open the assessment by CRXcavator.

Was this article helpful?

0 out of 0 found this helpful

Comments

0 comments

Please sign in to leave a comment.