Overview
What's the difference between putting an extension in Unenforced Mode and uninstalling the extension?
Unenforced Mode: The extension is deployed on the device(s) but there is no user impact. All Intervention details (Isolate, Block, Redirects) will be captured for review in the Conceal dashboard, but protection is not active.
Uninstall: This completely removes the extension from the browsers specified during uninstallation and all data associated with that extension is removed. This will require a re-install to get the extension back active on the device. This is only recommended if you intend to have the extension removed permanently, or if recommended by Conceal for specific troubleshooting situations.
This article focuses more on existing deployments, and selected devices/users - to control the deployment method for upcoming deployments for all devices and users please refer to Deploying in Unenforced Mode vs. Protected Mode
Unprotected Mode Procedure for Devices
- Log into the Conceal dashboard and click the Devices section on the left. If you'd like to select a group of devices to disable, or disable all devices - click the Actions button on the right hand side. Select the appropriate option.
- If you'd like to take action on just one device, locate the device you'd like to change the extension method. You can search by Identifier, HostID, UserID, or AssetID.
- Click the 3 blue dots on the far right. This allows you to choose Unenforced Mode on all Device and Profiles at once. If you want to only disable for a specific profile, go to Step 4.
You can also place Device & Profiles into Protected Mode in this same location. - On the device where you want to disable a specific profile, click View Profiles. This will show all profiles. Click the Extension Method box to change the deployment mode. You will get a prompt to confirm, you will then see the change reflected.
You can also put the profile back into Protection Mode by toggling the same setting.
Disable/Enable Procedure for Users
- Log into the Conceal dashboard and click the Users section on the left. If you'd like to select a group of users to change the extension method, or take action on all users - click the Actions button on the right hand side. Select the appropriate option.
- If you'd like to change the deployment mode for just one user, locate the User you wish to disable. Change the Extension Mode selection. You will get a prompt to confirm, you will then see the change reflected.
- You can also put the User back into Protection Mode by toggling the same setting.
Uninstall Procedure for Devices
The articles provided below have instructions on uninstalling for both Windows and Mac. If you are using an RMM/MDM for deployment, the uninstall instructions may differ based on the RMM, but you can typically use the uninstall commands provided in the documents. If you have access to the device, you can also uninstall through Programs if you have admin permissions.
Once an uninstall is confirmed completed, do not reinstall until you have contacted us and we have worked with you to resolve your issue. If you do not plan to re-install, you may delete the device from the dashboard. Refer to Uninstall Procedure for Devices above and follow the same steps but in the Users section.
NOTE: Once a user is deleted from the dashboard, all data related to that device is deleted and not recoverable
- Log into the Conceal dashboard and click the Devices section on the left. If you'd like to select a group of devices to delete or delete all devices - click the Actions button on the right hand side and select Delete All Devices.
- If you'd like to delete just one device, locate the device you'd like to delete -> Click the 3 blue dots -> Select Delete Device & Profiles.
Uninstall Procedure for Users
Similar for devices, the uninstall for Users can be done through an RMM/MDM and those instructions may vary. To manually remove the extension from the browser:
- In the browser you want to remove the extension go to Manage Extensions.
- chrome://extensions/ (Chrome)
- edge://extensions (Edge)
- about:addons (Firefox) - Locate the ConcealBrowse extension -> click Remove -> confirm removal.
Once an uninstall is confirmed completed, do not reinstall until you have contacted us and we have worked with you to resolve your issue. If you do not plan to re-install, you may delete the user from the dashboard. Refer to Uninstall Procedure for Devices above and follow the same steps but in the Users section.
NOTE: Once a user/device is deleted from the dashboard, all data related to that user is deleted and not recoverable.
*Never hesitate to contact your Customer Success Manager for any questions or concerns. You may also open a support ticket at support.conceal.io by scrolling to the bottom and clicking Submit a request.
Was this article helpful?
Articles in this section
- Deploying in Unenforced Mode vs. Protected Mode
- Placing ConcealBrowse in Unenforced Mode vs. Uninstalling
- Introducing ConcealBrowse to end users
- Possible ThreatLocker effects when deploying ConcealBrowse
- Download the deployment materials from the ConcealBrowse dashboard for Windows and Mac
- Troubleshooting MSI Deployment
- Walkthrough for existing users moving to device based installation
- Can I deploy and enforce ConcealBrowse to incognito/guest mode on browsers?
- Can I deploy ConcealBrowse to any operating system?
- Recommended Deployment Lifecycle for ConcealBrowse