Skip to main content

Web Browsing Security

Introduction

The Web Browsing module provides DNS-level security and browser extension-based protection. Block malicious websites, enforce acceptable use policies, and protect employees from web-based threats.

Key Features

DNS Filtering

Block malicious and unwanted content at the DNS level

Browser Extension

Deploy browser extensions for enhanced protection

Custom Policies

Create custom allow/block rules

Reporting

Analytics on browsing activity and blocked threats

Why Web Browsing Security?

The Web Threat Landscape

  • Phishing Sites - Fake pages stealing credentials
  • Malware Downloads - Drive-by downloads
  • Typosquatting - Impersonation domains
  • Data Exfiltration - Unauthorized data transfers

DNS-Level Protection

DNS filtering provides:

  • Early Interception - Block before connection
  • All Devices - Protects any DNS-using device
  • No Performance Impact - Minimal latency
  • Encrypted DNS - Supports DoH/DoT

Module Components

DNS Filtering

Block threats and unwanted content:

  • Malware domains
  • Phishing sites
  • Content categories
  • Custom blocklists

Learn more about DNS Filtering →

Browser Extension

Enhanced browser security:

  • Real-time page analysis
  • Password protection
  • Safe browsing enforcement
  • User alerts

Learn more about Browser Extension →

Getting Started

  1. Configure DNS

    Set up DNS filtering with your preferred deployment method.

  2. Define Policies

    Create blocking policies for your organization.

  3. Deploy Extension

    Roll out browser extension to endpoints.

  4. Monitor Activity

    Review reports and fine-tune policies.

Deployment Options

MethodUse Case
Device AgentEndpoints with Bastion agent
Browser ExtensionBrowser-level protection
Network DNSRouter/firewall level
MDM ProfileManaged devices (iOS, Android)

Best Practices

Layer Defenses

Use both DNS filtering and browser extension for comprehensive protection.

Start Permissive

Begin with blocking only threats. Add content categories gradually.

Monitor Before Blocking

Use monitor mode to understand traffic before enforcing blocks.

Communicate Policies

Let employees know what's blocked and why. Provide request process.

Next Steps