Netskope Global Technical Success (GTS)
Block VPN and Proxy Extension Installation in Chrome Browser
Netskope Cloud Version - 121
Objective
This article helps administrators block the installation of unauthorized VPN and Proxy extensions in Chrome browser to protect network integrity.The goal is to protect network security and enforce browsing policies.
Prerequisite
Netskope SWG license is required
Context
VPN and Proxy extensions can be used to bypass network monitoring and violate corporate internet usage policies. For organizations that need to enforce strict browsing guidelines, blocking these extensions is essential. This document details how administrators can prevent VPN and Proxy extension installation in Chrome and Edge.
Procedure
To block the installation and functionality of VPN/proxy extensions, implement the following two policies:
1.Custom URL Category Policy:
Create a policy that uses a custom URL category with a regex pattern to match VPN/proxy installation traffic and set the action to “Block”
2.Predefined Category Policy:
Configure a policy with the predefined "Web Proxies/Anonymizers" category, setting the action to "Block."
Step 1: Configure a URL list with Regex
Path: Netskope Tenant UI >>> Profiles >>> URL List >>> New URL List
- Include the following regex in the URL list.
^chromewebstore\.google\.com/.*(?i)vpn.*
^chromewebstore\.google\.com/.*(?i)proxy.*
^www.google-analytics\.com/.*(?i)chromewebstore.*
Step 2: Configuring Custom URL Category and Real-Time Policy
- Set up a Custom URL Category .
Path: Netskope Tenant UI >>> Profiles >>> Custom Categories >>> New Category
- Configure a Real-Time Protection Policy.
Step 3: Configure a Real-Time Protection Policy to block “Web Proxies/Anonymizers" category
Verification
The user tries to install 'VPN' or 'Proxy’ Chrome extensions.
The user tries to open any extension, but the traffic is blocked, and the UI displays 'Item not available.'
The Skope IT Alert logs show that the traffic is being blocked by the policy.
Terms and Conditions
- All documented information undergoes testing and verification to ensure accuracy.
- In the future, it is possible that the application's functionality may be altered by the vendor. If any such changes are brought to our attention, we will promptly update the documentation to reflect them.
Notes
- This article is authored by Netskope Global Technical Success (GTS).
- For any further inquiries related to this article, please contact Netskope GTS by submitting a support case with 'Case Type – How To Questions'.