

There is no facility for the enterprise to log or collect security-related events There is no differentiation between Internet sites and Intranet sitesĮxternal peripheral and sensitive API protection

Users can override certificate warnings unless the site implements HSTSīuilt-in authentication schemes cannot be disabled for cleartext channels RecommendationĬhrome does not support configuration to disable cryptographic cipher suites See How the browser can best satisfy the security recommendations for more details about how each of the security recommendations is met. Rows marked represent a more significant risk. Explanatory text indicates that there is something related to that recommendation that the risk owners should be aware of. This browser has been assessed against each of the 12 security recommendations, and that assessment is shown in the table below. A list of allowed trusted apps and extensions can be configured in Group Policy

To support these scenarios, the following architectural choices are recommended: accessing other Internet services and web resource.accessing enterprise cloud services sourced from the Digital Marketplace.accessing Intranet services hosted on an enterprise-provided OFFICIAL network.Usage scenarioĬhrome Browser will be used to access a variety of web services including: This guidance is applicable to both modes of use.
DETECT SAFE BROWSING WINDOWS WINDOWS 8.1
This guidance was tested on 64-bit Windows 8.1 Enterprise edition running Chrome for Business versions 33 and 39.Ĭhrome Browser can be run as a normal Windows desktop application or as a Windows app (Chrome calls this “Windows 8 mode”). Select a domain to view the list of devices that have attempted to access URLs in that domain and the list of URLs.This ALPHA guidance builds on the End User Devices Platform Security Guidance and is applicable to devices running Google Chrome Browser on a supported and well configured version of Windows.
DETECT SAFE BROWSING WINDOWS CODE
Malicious - websites that host malware and exploit code.Phishing - websites that contain spoofed web forms and other phishing mechanisms designed to trick users into divulging credentials and other sensitive information.Web protection categorizes malicious and unwanted websites as: It can take up to 12 hours before a block is reflected in the cards or the domain list.
