{"id":19446,"date":"2022-06-27T08:30:03","date_gmt":"2022-06-27T16:30:03","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/06\/27\/news-13179\/"},"modified":"2022-06-27T08:30:03","modified_gmt":"2022-06-27T16:30:03","slug":"news-13179","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/06\/27\/news-13179\/","title":{"rendered":"Time for a mid-year browser security check"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2019\/11\/cso_browser_security_by_thinkstock_497418668_1200x800-100817200-large.3x2.jpg?auto=webp&amp;quality=85,70\"\/><\/p>\n<p><strong>Credit to Author: Susan Bradley| Date: Mon, 27 Jun 2022 09:24:00 -0700<\/strong><\/p>\n<p>We\u2019ve reached the mid-point of 2022 and when it comes to security, I feel like we\u2019re not making much headway. I still see people report they\u2019re getting scammed, ransomed, and attacked on a regular basis \u2014 and for many users the browser is becoming the most important part of whatever platform you use. So now is a good time to review your browsers, and any extensions you\u2019ve installed to beef up security.<\/p>\n<p>Note, I said <em>browsers<\/em> \u2014plural. While enterprises might want to standardize on only one browser for better control, for small businesses and individual users, I recommend installing more than one. (I often use three different browsers.)<\/p>\n<p>Why is this important? Because attackers (and trackers) go after browsers. In fact, it\u2019s good to think of your browser a separate operating system, and act accordingly to protect it. Though I focus mainly on Windows issues, these guidelines and recommendations apply to Mac OS, Ubunto, Mint, and others.<\/p>\n<p>Basically, every browser should be reviewed for additional protection against malicious sites and ads. On platforms such as macOS, you will need to focus on Chrome, Firefox, or WaterFox protections; if you\u2019ve standardized on Safari, you will need to use <a href=\"https:\/\/adguard.com\/en\/welcome.html\" rel=\"noopener nofollow\" target=\"_blank\">Adguard<\/a>.<\/p>\n<p>Even now, I see malicious banner ads in rotation. If you don\u2019t have endpoint protection or something similar, you can better protect yourself by deploying something like <a href=\"https:\/\/ublockorigin.com\/\" rel=\"noopener nofollow\" target=\"_blank\">uBlock Origin<\/a>, which blocks ads and unwanted content.<\/p>\n<p>Be aware that <a href=\"https:\/\/ublock.org\/\" rel=\"noopener nofollow\" target=\"_blank\">uBlock<\/a> and uBlock Origin are two different products, with the latter being a fork of the former. They\u2019re separately maintained. I recommend uBlock Origin, which you can install and deploy as a standalone extension. Once it\u2019s installed, you can then build whitelists of sites that you will allow and adjust other settings as needed. If you are new to ublock, you can leave the defaults alone, or review <a href=\"https:\/\/12bytes.org\/articles\/tech\/firefox\/ublock-origin-suggested-settings\/comment-page-1\/\" rel=\"noopener nofollow\" target=\"_blank\">these posts\u00a0for recommended settings<\/a>. You can also click on the extension icon in your browser and select \u201cFilter lists.\u201d<\/p>\n<p>By default, some filters are already enabled, though you can more seriously lock down your browser by enabling them all. Then, on another browser, leave the defaults alone for a more lenient approach to surfing.<\/p>\n<p>In a network setting, you can go through the same process and use PowerShell or Group policy to deploy the settings throughout your network. While I\u2019m specifically focused on Chrome, most major browsers <a href=\"https:\/\/github.com\/gorhill\/uBlock\/wiki\/Deploying-uBlock-Origin\" rel=\"noopener nofollow\" target=\"_blank\">work similarly<\/a>. To deploy using Group policy to Chrome, you need to download the <a href=\"https:\/\/support.google.com\/chrome\/a\/answer\/187202?hl=en\" rel=\"noopener nofollow\" target=\"_blank\">Google group policy ADMX templates<\/a> and place them in the central policy store. Edit your Google Chrome GPO and navigate to Computer Configuration. Then go to Policies&gt;Administrative Templates&gt;Google&gt;Google Chrome&gt;Extensions. Enable the \u201cConfigure the list of force-installs apps and extensions\u201d setting and ensure you link your group policy to an organizational unit that contains authenticated users or Domain computers as a security filtering. If you prefer to test this out before a full deployment, set up a specific security testing group.<\/p>\n<p>It\u2019s a good idea to test uBlock first rather than deploying it widely; you may find that you need to exclude a web site. Invariably you will need to whitelist a website using group policy tools. To do so, follow the guidance at\u00a0<a href=\"https:\/\/deployhappiness.com\/deploying-ublock-origin-for-chrome-and-configuring-a-whitelist\/\" rel=\"noopener nofollow\" target=\"_blank\">deployhappiness<\/a>.<\/p>\n<p>As they note:<\/p>\n<p><em>In your Chrome GPO, navigate to Computer ConfigurationPreferencesWindows SettingsRegistry and create a new registry preference. Leave the Action type at Update. In the preference, set the following:<\/em><\/p>\n<p><em>Hive: HKEY_LOCAL_MACHINE<\/em><\/p>\n<p><em>Key Path: SoftwarePoliciesGoogleChrome3rdpartyextensionscjpalhdlnbpafiamejdnhcphjbkeiagmpolicy<\/em><\/p>\n<p><em>Value name:adminSettings<\/em><\/p>\n<p><em>Value type: REG_SZ<\/em><\/p>\n<p><em>Value data: {&#8220;autoUpdate&#8221;:true,&#8221;netWhitelist&#8221;:&#8221;about-schemenbehind-the-scenenchrome-extension-schemenchrome-schemenlocalhostnloopconversation.about-schemenopera-schemenWHITELISTWEBSITE.com&#8221;}<\/em><\/p>\n<p><em>This value data has the default exclusions plus WHITELISTWEBSITE.com as an allowed website. Be sure to change the last value (WHITELISTWEBSITE.com) to the website that should be whitelisted. Websites should always be preceded with a n . If you had to add a second website, the value data would look like:<\/em><\/p>\n<p><em>{\u201cautoUpdate\u201d:true,\u201dnetWhitelist\u201d:\u201dabout-schemenbehind-the-scenenchrome-extension-schemenchrome-schemenlocalhostnloopconversation.about-schemenopera-schemenWHITELISTWEBSITE.comnSECONDWEBSITE.com\u201d}<\/em><\/p>\n<p>These changes will be active after a GPU update and after a new Chrome browser sessions starts. If you\u2019d rather deploy the solution using PowerShell, you can do so in a <a href=\"https:\/\/4sysops.com\/archives\/chrome-manage-extensions-with-powershell\/\" rel=\"noopener nofollow\" target=\"_blank\">similar fashion<\/a> to group policy.<\/p>\n<p>You may have to be a bit more adventurous with Chrome, Firefox, or Waterfox on the Mac platform. If you are in an enterprise with macOS workstations, you may need to use your remote tools or type up instructions telling your users how to manually deploy the protections if you don\u2019t have management tools in place for your Apple hardware.<\/p>\n<p>You can also add third party external websites that include filter lists. <a href=\"https:\/\/github.com\/gorhill\/uBlock\/wiki\/Dashboard:-Filter-lists\" rel=\"noopener nofollow\" target=\"_blank\">Sample external lists<\/a> include the following:<\/p>\n<p>https:\/\/easylist.to\/*<br \/>https:\/\/*.fanboy.co.nz\/*<br \/>https:\/\/filterlists.com\/*<br \/>https:\/\/forums.lanik.us\/*<br \/>https:\/\/github.com\/*<br \/>https:\/\/*.github.io\/<br \/>https:\/\/*.letsblock.it\/*<\/p>\n<p>Note that the likelihood of page breakage increases with more filter lists added. So always test in a sample setting before deploying across your network. \u00a0<\/p>\n<p>Attackers know that the browser is one of the ways they can gain access to computers and networks and steal saved user names and passwords. If you \u00a0ensure your browser is as secure as it can be, perhaps the second half of 2022 won\u2019t be quite as fraught with danger as the first part of the year has been.<\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3664854\/time-for-a-mid-year-browser-security-check.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2019\/11\/cso_browser_security_by_thinkstock_497418668_1200x800-100817200-large.3x2.jpg?auto=webp&amp;quality=85,70\"\/><\/p>\n<p><strong>Credit to Author: Susan Bradley| Date: Mon, 27 Jun 2022 09:24:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>We\u2019ve reached the mid-point of 2022 and when it comes to security, I feel like we\u2019re not making much headway. I still see people report they\u2019re getting scammed, ransomed, and attacked on a regular basis \u2014 and for many users the browser is becoming the most important part of whatever platform you use. So now is a good time to review your browsers, and any extensions you\u2019ve installed to beef up security.<\/p>\n<p>Note, I said <em>browsers<\/em> \u2014plural. While enterprises might want to standardize on only one browser for better control, for small businesses and individual users, I recommend installing more than one. (I often use three different browsers.)<\/p>\n<p>Why is this important? Because attackers (and trackers) go after browsers. In fact, it\u2019s good to think of your browser a separate operating system, and act accordingly to protect it. Though I focus mainly on Windows issues, these guidelines and recommendations apply to Mac OS, Ubunto, Mint, and others.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3664854\/time-for-a-mid-year-browser-security-check.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[12014,714],"class_list":["post-19446","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-browsers","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19446","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19446"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19446\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19446"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19446"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19446"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}