New Feature: Verified Stolen Credential Detection

Ready to help

Install the browser extension

Overview

Deploy the Push browser extension to prevent, detect, and block identity attacks in the browser.

The browser agent provides contextual telemetry on all your workforce identities, whether they’re managed by your identity provider or not.

The browser extension allows you to detect identity attack techniques, such as phishing tools, and enforce security controls, including:

Over time, the extension also provides a full accounting of the cloud apps and accounts your employees are actively using by observing logins that match your configured monitored domains and helping to harden your identity security posture by surfacing and fixing risks such as:

  • Reused passwords

  • Shared account credentials

  • Leaked passwords

  • Weak passwords

  • Lack of password manager use

  • No MFA

What data is collected?

Once installed, the extension sits in the background of your employees’ browsers and collects the following information:

  • Browser name

  • Browser version

  • Device OS

  • Push browser extension version

  • The extension enrollment method (via a managed deployment or self-enrollment)

  • When the extension last checked in

Push only monitors logins that match the company email domains you specify on the Settings page of the Push admin console. You can enable monitoring of all domains used by your employees to access work apps (including personal accounts) if you choose. Ensure you have consent before using this feature. Learn more.

When employees log into SaaS applications using their work account, the extension collects:

  • The URL of the platform

  • The account username

  • The login method

    • If a password is used, Push generates a shortened salted hash of the password, which is stored locally in the browser and never sent anywhere.

  • Their MFA registration status and MFA method, for supported apps

Using the shortened salted hash of the password, Push can then perform password comparisons and analysis, such as blocking SSO passwords from being entered on websites that do not belong to the identity provider, or surfacing leaked and shared account credentials. All comparisons are done locally in the browser, not server-side.

If the extension observes an employee visiting an OAuth consent screen for an Microsoft 365 or Google Workspace app integration, it also collects basic telemetry about the integration that Push uses to research the integration, such as establishing whether it has a verified publisher. The data the extension collects in this case is:

  • The platform the app was observed on

  • The app identifier

  • The grant type requested

  • The reply URL

  • The scopes requested

If Push observes employee logins for apps it doesn’t recognize as work apps, it collects the URL of the platform and the login method (password or social login).

The extension will also collect data based on your configured security controls, such as when employees visit a blocked URL.

Learn more and see examples of the data collected by the extension in this related help article.

Verify your monitored domains

Push only monitors logins that match the company email domains you specify on the Settings page of the Push admin console. You can enable monitoring of all domains used by your employees to access work apps (including personal accounts) if you choose. Ensure you have consent before using this feature. Learn more.

If your employees prefer to keep their work and personal browsing activity completely separate, they can create a separate browser profile for personal browsing and install the Push browser extension only in their work profile.

In addition, the extension will never send passwords anywhere. All password security checks are performed locally in the browser.

If you need to restrict the extension from running on specific websites, you can configure an ignore list in the Advanced tab of the Settings page. Learn more.

Customize extension behavior

In addition to configuring which domains you want to monitor, the behavior of the Push browser extension can be customized in the following ways:

  • Check for leaked passwords: The extension can connect to an external API, Have I Been Pwned, to identify passwords exposed in a data breach. This setting is enabled by default. You can configure it by going to Settings > Password checks. Learn more.

  • Define custom words to flag: The extension can check passwords against a list of custom terms you define, such as company names that are often used in weak passwords. You can configure the list of custom words by going to Settings > Password checks. Learn more.

The extension also powers Push’s security controls, including in-browser banners and password guidance, SSO password protection, phishing tool detection, and more.

Learn more about security controls.

Installation options

There are three ways to install the extension and enroll employee browsers:

  • Managed: Perform a managed installation to deploy the extension to employee machines using device management software. This is the recommended method.

  • Email: Allow employees to self-enroll by sending them a link to install the extension via email.

  • ChatOps: Allow employees to self-enroll by sending them a link to install the extension via ChatOps.

Managed browser enrollment screen - docs - showing Arc

Managed installation

Perform a managed installation of the Push browser extension to add the extension to your employees’ browsers without any action required from them.

Enrolling an employee’s browser in Push via a managed deployment is a two-step process:

  • First, you install the Push browser extension.

  • Next, the extension waits for user login activity to help identify the user of the browser and complete enrollment. If you are using the automatic licensing option, Push will also license the identified user and add them as an enrolled employee on the Push platform.

Supported browsers:

  • Google Chrome

  • Microsoft Edge

  • Firefox

  • Brave

  • Arc

Deployment options:

Self-enrollment via email

Send instructions to employees via email to install the extension and complete enrollment of their browser in a single step. This process takes about a minute.

Prerequisites: You must complete an integration with your identity provider first in order to sync in employee records and assign licenses to add those users to Push — or add those users manually. Then you’ll be able to send them email self-enrollment links for the browser extension.

Supported browsers:

  • Google Chrome

  • Microsoft Edge

  • Safari

  • Firefox

  • Opera

  • Brave

  • Arc

Send enrollment emails:

1. Log into the Push admin console.

2. Go to the Browsers page in the left sidebar and then select Enrollment options > Email as the enrollment option.

3. You’ll be taken to a view of all your employees with a license in Push. Select who you’ll send an email enrollment link to. You can also preview the enrollment email on this page by clicking on Preview email.

Email enrollment - select employee - docs - Install the browser extension

4. Emails will be sent immediately. To complete installation of the extension, employees should click on the Secure your browser link in the email on each browser they use for work.

Email enrollment - employee docs - 20230127

5. The link will take them to the extension installation page for their browser where they can install the extension, completing enrollment of their browser in Push.

Employee extension install page - employee docs - 20221209

6. After they install the extension, they’ll see a confirmation message.

Employee extension installed screen - employee docs - 20230127

Self-enrollment via ChatOps

Send instructions to employees via ChatOps to install the extension and complete enrollment of their browser in a single step. This process takes about a minute.

Prerequisites: You must set up ChatOps by integrating with your Slack or Microsoft Teams workspace before you can send ChatOps enrollment messages. See: Configure ChatOps. You must also complete an integration with your identity provider first in order to sync in employee records and assign licenses to add those users to Push — or add users manually. Then you’ll be able to send them ChatOps self-enrollment links for the browser extension.

Supported browsers:

  • Google Chrome

  • Microsoft Edge

  • Safari

  • Firefox

  • Opera

  • Brave

  • Arc

Send ChatOps enrollment messages:

1. Log into the Push admin console.

2. Go to the ChatOps page and use the toggle to enable the topic for Browser enrollment.

3. Go to the Employees page to activate ChatOps for all or some of your employees.

Chat messages will be sent as soon as you configure both the topic and the employee chat settings. See an example message in the ChatOps documentation on browser enrollment.

Version updates

The Push browser extension automatically updates when new versions are released. You do not need to take any action to apply these updates.

Removing the extension

You can temporarily disable the browser extension without needing to uninstall it if you need to do some troubleshooting. On the Settings page, select Advanced and add an ignore list of websites that the extension should not monitor. You can also disable the extension on all sites by entering an * (asterisk or star character) in the ignore list. Learn more.

If you want to remove the browser extension, you have two options:

  • For self-enrolled extensions completed via email or chat by the employee, the employee will need to manually delete the extension from their browser. Removing the extension this way does not delete their activity data from the Push admin console. If you wish to delete their activity data, you can revoke their account license. This will remove all their data from the Push platform, including data collected via API integrations and the browser extension. Note: If you delete your team on the Settings page of the admin console, this will cause all these browser extensions to unenroll and delete themselves.

  • For extensions installed via a managed deployment, you can use your device management software to remove the extension. Depending on the software, this method may remove the extension without deleting it on the Push side. In that case, the browser will still be associated with the employee record and will still appear in the admin console. It will expire and be removed after 90 days, which is the usual inactivity period for browsers. Note: If you delete your team on the Settings page of the admin console, this will also cause all these browser extensions to unenroll. You will need to remove the extension from your managed policy in order to delete the extension from managed browsers.

You can also unenroll a given browser profile for an employee by going to the Browsers page and finding the browser profile for a given employee that you want to remove. Select the trash icon for that browser profile under the Action column in the table to unenroll the extension from that profile.

Note that deleting a company domain from your Settings page will not remove or unenroll the extension. The domain setting only controls what data the extension monitors.

The Delete everything feature also deletes all your data.

Delete everything - docs - Install the browser extension