Recommended Deployment Lifecycle for ConcealBrowse Recommended Deployment Lifecycle for ConcealBrowse

Recommended Deployment Lifecycle for ConcealBrowse

Description

This guide outlines how to get your organization started with ConcealBrowse as an administrator, using best practices and leading you through different options for your setup. Below some of these steps will be related articles for you to reference for more detailed assistance.

Procedure

Step 1: Install, setup, get familiar

  1. You should have received a welcome email from Customer Success including your username and temporary password. Make sure to use this upon first login to set up your new password and to access to the Conceal dashboard.
  2. Install the extension from the Chrome store on a few devices within your organization, we recommend trying on different devices and with a few employees to start.
  3. Have these employees get familiar with the product and usage, collect any feedback.
  1.  

Step 2: Choose your deployment method

There are many different ways to deploy the ConcealBrowse extension throughout your organization. Some require user endpoint interaction from the user, the differences are explained below and you can find related articles below.

Does not require endpoint interaction(Recommended if possible):

- Silent Installation through RMM: You can deploy using your RMM solution, which we recommend policy deployments over scripting where possible as it is much more modern and user friendly.

- PowerShell script deployment: You can decide if you want to use our PowerShell script to deploy to Chrome and Edge on Windows 10+. We do recommend this version as a last resort as it requires more upkeep than the other deployment methods offered.

Requires endpoint interaction:

- Manual user installation: This means you will add your users directly in the dashboard as referenced in Step 1. You can incorporate one of our 4 supported single sign on (SSO) options and have the users login using SSO once the installation is installed. If you are not using SSO, you can have the users login to the extension with the same username and password used for the dashboard.

- Deployment using a Remote Monitoring and Management (RMM) tool and one of our 4 supported SSO options: You can deploy the extension directly onto your endpoints and incorporate SSO with Conceal, and the users can login to the extension using SSO.

 

  1. If you are using a deployment tool: There are multiple methods available to deploy the ConcealBrowse extension to employees within your organization. Decide which deployment tool you'd like to use. You can search our knowledge base for different deployment articles.
    NOTE: Unless you are using silent installation method, employees are still required to manually log into the extension in order for ConcealBrowse to be authenticated. 
  2. Deploy to a pilot group consisting of employees such as IT, security, and power users. Do thorough testing with this smaller group in order to be able to communicate the process to your internal team once deploying larger. 
  3. Create an internal communication plan for deploying to a larger group. Gather feedback from the small group deployment and decide the best practices to follow within your organization on the larger deployment process.
  4. Communicate the process to the next group of employees planned to get the extension. Provide best practices and answer any questions to ensure your employees are familiar with the upcoming deployment process.
  5. Deploy to a wider audience, depending on your comfort level and organization size, you can start with another smaller group, or decide to deploy to the rest of your organization.
  6. Follow up with employees on deployment if necessary to ensure success. You can view a report of employees and the version they are running on the Conceal dashboard.

This article can be helpful to help end users get started with ConcealBrowse: Getting started with ConcealBrowse as an end user

 

Step 3: Choose your authentication method - if applicable

  1. We have 4 authentication options for getting your employees authenticated. If you are using Azure AD, Okta, or Auth0 for single sign-on in your organization you may integrate that with ConcealBrowse. Otherwise, you can opt to use the non SSO option.

 

Step 4: Work with Customer Success for ongoing support

  1. Your Customer Success Manager should be scheduling regular checkins to support your onboarding process and customer experience.
  2. You can always reach directly out to your Customer Success Manager, but we do also suggest entering a ticket in order to get that into the standard ticket queue.
  3. We recommend sending this resource to your employees to help them get started: Getting started with ConcealBrowse as an end user

 

Optional steps:

  1. Set up Policies: You have the option to set up allowed or blocked policies in your dashboard.
  2. Integrate Plugins: Conceal offers multiple pre-process and post-process plugins to integrate within your organization. These currently include NOIP, EnforceTLS, Cisco Umbrella, Google Safe Browsing, Elasticsearch, Splunk, and Syslog.
  3. Utilize reports: Conceal offers reports to quickly view information about employees, scanned URLs, isolated sessions, and more.

 

 

Was this article helpful?

0 out of 0 found this helpful