You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-vulnerability-management/tvm-browser-extensions.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ ms.date: 02/23/2025
26
26
27
27
This browser extension is a small software application that adds functionality to a web browser for use with Microsoft Defender Vulnerability Management. This extension provides your security team with visibility into installed browser extensions to help ensure the safe usage of extensions in your organization.
28
28
29
-
The **Browser extensions** page displays a list of the browser extensions installed across different browsers in your organization. Browser extension details are collected across all the users that exist on a specific browser. For each installed extension, per browser, you can see the devices it's installed on, the users who installed it and if it's turned on or off on a device.
29
+
The **Browser extensions** page displays a list of the browser extensions installed across different browsers in your organization. Browser extension details are collected across all the users that exist on a specific browser. For each installed extension, per browser, you can see the devices it's installed on, the users who installed it, and whether it's turned on or off on a device.
30
30
31
31
The information available helps your security team learn about the installed extensions, and use that information to make decisions on how you want to manage extensions.
32
32
@@ -37,9 +37,9 @@ The information available helps your security team learn about the installed ext
37
37
2. Select the **Browser extensions** tab.
38
38
39
39
> [!NOTE]
40
-
> Browser extension assessment is only available on Windows devices. Only extensions that exist in Edge, Chrome, and Firefox, appear in browser extension list.
40
+
> Browser extension assessment is only available on Windows devices. Only extensions that exist in Microsoft Edge, Chrome, and Firefox, appear in browser extension list.
41
41
42
-
The **Browser extensions** page opens with a list of the browser extensions installed across your organization, including details on the extension name, browser, the number of devices the extension is installed on, and the number that have it turned on.
42
+
The **Browser extensions** page opens with a list of the browser extensions installed across your organization, including details on the extension name, browser, the number of devices the extension is installed on, and the number of devices with the extensions turned on.
43
43
44
44
:::image type="content" source="/defender/media/defender-vulnerability-management/browser_extensions.png" alt-text="Screenshot of the Browser extensions page" lightbox="/defender/media/defender-vulnerability-management/browser_extensions.png":::
45
45
@@ -51,7 +51,7 @@ Select a browser extension to open its flyout pane, where you can learn more abo
51
51
52
52
:::image type="content" source="/defender/media/defender-vulnerability-management/browser_extensions_details.png" alt-text="Screenshot of the Browser extensions details pane" lightbox="/defender/media/defender-vulnerability-management/browser_extensions_details.png":::
53
53
54
-
Where applicable, there will be a link available on this page to access the extension in the store it was installed from.
54
+
Where applicable, there's a link available on this page to access the extension in the store it was installed from.
55
55
56
56
### Browser extension permissions
57
57
@@ -64,7 +64,7 @@ Select the **Permissions** tab, from the browser extension flyout pane, to see i
64
64
The permission risk level generated is based on the type of access the permission is requesting. You can use this information to help make an informed decision on whether you want to allow or block this extension.
65
65
66
66
> [!NOTE]
67
-
> Risk is subjective, and it's up to each organization to determine the types of risk they are willing to take on.
67
+
> Risk is subjective, and it's up to each organization to determine the types of risk they're willing to take on.
68
68
69
69
Select a permission to see a further flyout with more information.
0 commit comments