Quickstart admin guide for ConcealBrowse Quickstart admin guide for ConcealBrowse

Quickstart admin guide for ConcealBrowse

Introduction:

Conceal’s mission is to defend organizations against web-based threats. ConcealBrowse is a private, lightweight, and easy to deploy AI-powered browser extension that detects, prevents, and shields users from ever-evolving phishing, credential theft and other sophisticated social engineering attacks. By securing the most vulnerable part of any organization, the human using a web-browser, ConcealBrowse dramatically reduces the risk of destructive and costly cyber-attacks. 

 

1. Getting Started:

Our innovative secure-browser extension, ConcealBrowse, is powered by AI and uses the latest technology to detect, prevent and shield users from ever-evolving web-based threats. It blocks access to malicious sites and selectively leverages isolation technology to minimize disruption to business-critical workflows. Built on a modern cloud architecture, it is lightweight and easy to deploy for almost immediate time to value. Designed with privacy in mind, it does not upload sensitive browsing history and includes helpful, customizable warning pages alert and help educate users on web risks.

 

By securing the web-browser, ConcealBrowse helps stop cyber-attacks before they begin, dramatically reducing the risk of successful ransomware and other destructive and costly cyber-attacks. The goal of this quick start guide is to show you how to easily configure and deploy ConcealBrowse so you can realize thes security outcomes within the shortest amount of time.

 

2. Installation:

Our suggested and most commonly used method of deploying ConcealBrowse is with our MSI alongside your RMM/MDM solution. This results in deployment to all supported browsers and automatic device registration.

 

Applies to:

  • Google Chrome version 101 and newer
  • Microsoft Edge version 77 and newer
  • Mozilla Firefox 113.0 or newer
  • Brave browser
  • Microsoft Windows 10+

If you have a preferred RMM solution, please contact Conceal support as there may be an integration available.

 

Deployment Instructions

  1. Gather the CompanyID and SiteID required to place into your RMM/MDM by logging into the Conceal dashboard in the Devices section. Clicking Register New Device will generate the IDs.
    Company and Site IDs.png
  2. Download the MSI by clicking the Download Extension button at the top of your screen or from our MSI Deployment support article

  3. Upload the MSI into your RMM/MDM and enter the CompanyID and SiteID (can be done via msiexec commands)

    A close-up of a business card

Description automatically generated

  4. Deploy to target group of devices, devices should begin registering within minutes onto the Conceal dashboard however, some deployment solutions do take longer. It is sometimes necessary to close and restart the browser for it to complete registration.

3. User Registration (if applicable):

There is no need to register end user-accounts if you are using device-based deployment through the MSI. However, if you choose to add more administrators to your account you will need to register them.

  1. Navigate to your Conceal dashboard and click Users from the left-hand menu
  2. In the Users section, click Add User in the top of the screen
  3. In the Add User panel, enter the Administrator’s First Name, Last Name and Email address. Be sure to select Admin from the Select User Role and then click Add User.

The new admin(s) will receive a welcome email and will have access to the Conceal dashboard.

 

4. Basic Features:

  • Extension leverages real-time analysis via our Sherpa AI engine for risk scoring of visited sites
  • Compatible with Chrome, Edge, Firefox and Brave browsers across all operating systems
  • Administrators can easily pinpoint URLs that triggered an isolated session and identify the corresponding user/device/browser responsible
  • Connectivity to different pre and post processing tools through the Plugins tab
  • Investigation of URLs via the Isolation tab, allowing admins to safely launch suspicious URLs in Conceal's environment.
  • Customization of pre-isolation warning page through the Policy – Extensions tab, allowing administrators to customize text displayed, conveying trust and familiarity to the end-user.
  • Multitenancy (enabled by request) to support segregation of departments for enterprises and organizations for Managed Service Providers.
  • Conceal's feedback mechanism allows users to send allow or block requests to administrators directly from the extension app to land in the Conceal dashboard for administrators to see.

5. Feedback:

  • An end user can submit feedback and request for an administrator to allow or block a website through Conceal's extension app or the context menu. Refer to End User Guide for submitting feedback for more details.
    Feedback1.png
  • The administrator can see any feedback in the Conceal dashboard at https://dashboard.conceal.io/feedback. The administrator has the ability to open the site in isolation for testing, mark as reviewed, approve - Quickly add an "allow" policy for this site, deny quickly add a "block" policy for this site, view the website information collected by Conceal the intervention process, delete the site record from the Feedback tab. Once a request is deleted, it will be removed from the end user queue as well.
    Feedback2.png

6. Troubleshooting:

  • Ensure that you have entered your Site ID and Company ID just as shown in the examples above. If these are not correct, device registration will fail, and the product will default to asking users to authenticate which will not be possible due to lack of user credentials. Site ID and Company ID can be found in the Devices section of the dashboard by clicking Register New Device.
    Company and Site IDs.png
  • If you are using cloned machines, verify these machines have been properly sysprepped before deploying Conceal to avoid deployment issues. ConcealBrowse should be installed after the new clone is created in all cases.

  • If Conceal is putting an internal site into isolation and you’d like to add the site to the Conceal allow list, you can do so in the Conceal dashboard in the Policy section by clicking Add Website Policy and creating an allow rule.
    Screenshot 2023-12-18 at 2.24.58 PM.png

7. Additional Resources:

Additional information regarding ConcealBrowse can be found on our support site that hosts several articles on more advanced features within ConcealBrowse. https://support.conceal.io/hc/en-us

 

We also encourage you to engage with our community forum to ask questions and discuss ways to leverage the security capabilities offered by ConcealBrowse. https://support.conceal.io/hc/en-us/community/topics/6399646877979-ConcealBrowse

 

Conclusion:

Again, thank you for choosing ConcealBrowse to protect your endpoints against web based threats. If you have any questions, or need any assistance, please reach out to us at support@conceal.io.

 

 

Appendix:

 

*Never hesitate to contact your Customer Success Manager for any questions or concerns. You may also open a support ticket at support.conceal.io by scrolling to the bottom and clicking Submit a request.