Swift Security Docs
  • Introduction to Swift Security
  • Onboarding
    • Tenant Setup
    • Product Deployments
      • Browser Extension
      • LLM Guardrails
        • LLM Guardrails API Integration
      • VS Code IDE Extension
    • Directory Sync
      • Configuring Google Directory Sync
      • Configuring Microsoft Directory Sync
    • MDM
      • Extension Deployment Via Google Workspace
      • Extension deployment via google workspace + MDM at device level
      • Extension Deployment Via Microsoft Intune
        • Chromium Browsers in Windows
        • Edge Browsers in Windows
        • Firefox Browsers in Windows
      • Extension Deployment Via Kandji
        • Chromium Browsers in Mac
    • Infrastructure
      • SaaS Model
      • Hybrid deployment (coming soon)
  • SSO (Single Sign-On)
    • SSO Configurations identity provider - Google workspace
    • SSO Configurations identity provider - Microsoft Entra ID
  • Administrative Guide
    • Console Users
      • Role Creation
      • RBAC General Settings for Login Methods (for the Console)
      • User Creation
      • SSO login(okta)
    • Swift Detection Engines
      • Data Identifiers
        • Custom Data Identifiers
      • EDM Dictionaries
        • EDM Rule
        • EDM Profile
        • EDM Extension Policy
      • Data Rules
        • Custom Rules
      • Data Profiles
      • LLM Guardrail Scanners
        • Data Protection Scanner
        • Gibberish Scanner
        • Ban Substrings Scanner
        • Invisible Text Scanner
        • Code Scanner
        • Language Scanner
        • Sentiment Analysis Scanner
        • Jailbreak Scanner
        • Toxicity Scanner
        • Prompt Injection Scanner
        • Token Limit Scanner
        • Reading Time Scanner
        • Language Same Scanner
        • No Refusal Scanner
        • Factual Consistency Scanner
        • Bias Detection Scanner
        • URL Reachability Scanner
        • Nudity Scanner
        • Gender Scanner
        • Celebrity Scanner
        • Face Scanner
        • Race Scanner
        • Performance and Benchmark
    • Browser Extension
      • Extension Installation
      • Granular Policies
        • Control URL access
        • Protect company data
        • Protect against Threats (Coming Soon)
      • Extension Alerts
      • Extension Events
      • Extension Popups
      • Browser Extension Coverage
    • LLM Guardrails
      • LLM Guardrails Policies
      • LLM Guardrails Alert
      • LLM Guardrails Events
    • Regulation Laws
  • Assets
    • Applications
    • Users
    • Extensions
  • Integration
    • Notification
      • Jira
      • ServiceNow
      • Slack
      • Splunk
    • Forensic
    • Feature
      • Rules Glossary
        • United States
        • Canada
        • Latin America
        • European Union
        • Australia
        • APAC (Asia-Pacific)
        • EMEA Countries
        • Others
      • Data identifiers Glossary
        • United States
        • Canada
        • Latin America
        • European Union
        • Australia
        • APAC (Asia-Pacific)
        • EMEA Countries
        • Others
      • Supported MIME Types
      • Supported OCR Format
    • Manage unauthorized access from unmanaged browser
  • Settings
    • Manage Reasons
    • Audit Log
  • Release Notes
    • Version - 1.27
    • Version - 1.26
    • Version - 1.25
    • Version - 1.24
    • Version - 1.23
    • Version - 1.16
    • Version - 1.15
    • Version - 1.14
    • Version - 1.13
    • Version - 1.12
    • Version - 1.11
    • Version - 1.10
    • Version - 1.09
    • Version - 1.08
    • Version - 1.07
    • Version - 1.06
    • Version - 1.05
    • Version - 1.04
    • Version - 1.03
    • Version - 1.02
    • Version - 1.01
Powered by GitBook
On this page
  1. Administrative Guide
  2. Browser Extension
  3. Granular Policies

Protect company data

PreviousControl URL accessNextProtect against Threats (Coming Soon)

Last updated 1 month ago

Navigate to the Policies section and select "Extension" Click To "ADD NEW POLICY" for protect company data.

It can define various parameters including policy name, description, match criteria etc.. by clicking on "Add New Policy".

  • Add Policy Name

  • Description

  • Policy Severity

  • What type of policy do you want to create (I want to protect company data)

Match Criteria:

  • Select User( select All)

  • Or specific users or groups.

  • select Site URL (All sites as well as choose specific sites )

  • select User & Policy actions(Alert, Block, Mask, Warn , Allow)

  • Click on Next.

  • Data Protections (select profile)

Notification want as per organization Need(it is optional):

  • Want to Receive Notification on which Channel.

  • Select Frequency(Immediate, Every Hour, Evert Day)

  • Click to Create Policy.

After Policy Creation Enable the status.

Once this step is complete, visit ChatGPT. Make sure the extension is installed and you are logged in using your organization domain email ID. Ensure that ChatGPT is accessible. After creating the policy, reload ChatGPT or any other relevant sites once.

In the profile, I selected the custom rule test for regex and keyword only test'. Within this rule, we’ve used a custom identifier for regex only and another custom identifier for keyword only. When we tested on ChatGPT using a value that matches the regex-only identifier, it was successfully detected.

Now tested with the keyword-only value as well, since the rule includes both identifiers. It is also working.

So this is how it works.

Note:

  1. After creating a Custom Identifier, you must create a Custom Rule.

  2. Once the rule is created, you need to create a Profile and assign the rule to it.

  3. Finally, create a Policy and assign the profile to it — this is the last step for making the configuration active.

⚠️ Important Note on Deletion Flow

Make sure not to directly delete any Identifier, Rule, or Profile that is currently being used. Since all components are linked to each other, follow this proper order to avoid breaking the setup:

  1. First, delete or remove the Profile from the Policy.

  2. Then delete the Profile.

  3. Next, delete the Rule.

  4. Finally, delete the Identifier.

Deleting anything out of order may lead to broken configurations or unexpected behavior.

After detection, the user can go to the Alert page to view the .

After detection occurs, the user can go to the Alert page to view the triggered alert. Here is the guide .

Alert
Alert