Skip to content

Configuring the extension

carbureted edited this page Jul 6, 2021 · 4 revisions

Configuring the extension locally

Once installed in your browser, find the debug button at the top of the Phishcatch extension popup UI. Clicking this will take you to a screen that will allow you to make arbitrary local config changes.

Deploying configuration settings via enterprise management

The PhishCatch extension is designed to be centrally managed using an enterprise management platform such as Windows Group Policy or Jamf Pro configuration profiles.

While only three configurations are considered truly essential, there are a variety of configuration options designed to ease deployment, reduce alert noise, and maximize deployment effectiveness.

Examples of deployment profiles can be found in the policy-templates folder.

Mandatory configuration settings

enterprise_domains

Configure sites authorized to use enterprise credentials. Passwords entered into sites on this list will be hashed and stored locally, and compared to passwords entered on any sites not on this list to determine if they are being reused.

Windows (GPO)

SOFTWARE\Policies\Google\Chrome\3rdparty\extensions\jgegnlkclgfifjphjmijnkmicfgckmah\policy\enterprise_domains\00 (REG_SZ) = mydomain.com
SOFTWARE\Policies\Google\Chrome\3rdparty\extensions\jgegnlkclgfifjphjmijnkmicfgckmah\policy\enterprise_domains\01 (REG_SZ) = subdomain.mydomain.com

macOS

<dict>
  <key>enterprise_domains</key>
  <array>
    <string>mydomain.com</string>
    <string>subdomain.mydomain.com</string>
  </array>
</dict>

Configurations required for remote alerts

phishcatch_server

The URL of the PhishCatch server. The extension will need to be able to reach this server in order to trigger webhooks.

Windows (GPO)

SOFTWARE\Policies\Google\Chrome\3rdparty\extensions\jgegnlkclgfifjphjmijnkmicfgckmah\policy\phishcatch_server (REG_SZ) = https://phishcatch.mydomain.com

macOS

<dict>
  <key>phishcatch_server</key>
  <string>https://phishcatch.mydomain.com</string>
</dict>

psk

The preshared key configured on the PhishCatch server. This key must match between the extension config and the value set on the server, otherwise webhooks will not be triggered.

Windows (GPO)

SOFTWARE\Policies\Google\Chrome\3rdparty\extensions\jgegnlkclgfifjphjmijnkmicfgckmah\policy\psk (REG_SZ) = MYPSK123

macOS

<dict>
  <key>psk</key>
  <string>MYPSK123</string>
</dict>

Optional configuration settings

data_expiry

The number of days that hashed passwords are cached locally. The default setting is 90.

Windows (GPO)

SOFTWARE\Policies\Google\Chrome\3rdparty\extensions\jgegnlkclgfifjphjmijnkmicfgckmah\policy\data_expiry (REG_DWORD, decimal) = 90

macOS

<dict>
  <key>data_expiry</key>
  <integer>90</integer>
</dict>

display_reuse_alerts

Enable or disable password reuse alert toast notifications on the endpoint. It is recommended to set this to false during testing and rollout to reduce the impact to end users. The default setting is true.

Windows (GPO)

SOFTWARE\Policies\Google\Chrome\3rdparty\extensions\jgegnlkclgfifjphjmijnkmicfgckmah\policy\display_reuse_alerts (REG_DWORD) = 0x1 | 0x0

macOS

<dict>
  <key>display_reuse_alerts</key>
  <true/> | <false/>
</dict>

enable_debug_gui

Enable or disable access to the debug GUI on the endpoint. The debug GUI shows the current config, currently cached data (usernames, password hashes, etc.), and allows for manual config override. The default setting is true.

Windows (GPO)

SOFTWARE\Policies\Google\Chrome\3rdparty\extensions\jgegnlkclgfifjphjmijnkmicfgckmah\policy\enable_debug_gui (REG_DWORD) = 0x1 | 0x0

macOS

<dict>
  <key>enable_debug_gui</key>
  <true/> | <false/>
</dict>

enable_manual_password_entry

Allows the user to manually populate password hashes in the PhishCatch GUI, in addition to capturing them from corporate domains. The default setting is false.

Windows (GPO)

SOFTWARE\Policies\Google\Chrome\3rdparty\extensions\jgegnlkclgfifjphjmijnkmicfgckmah\policy\enable_manual_password_entry (REG_DWORD) = 0x1 | 0x0

macOS

<dict>
  <key>enable_manual_password_entry</key>
  <true/> | <false/>
</dict>

faq_link

Enables a FAQ button in the PhishCatch GUI that links to an arbitrary URL. If not present, no button will be displayed.

Windows (GPO)

SOFTWARE\Policies\Google\Chrome\3rdparty\extensions\jgegnlkclgfifjphjmijnkmicfgckmah\policy\faq_link (REG_SZ) = https://wiki.mydomain.com/PhishCatch

macOS

<dict>
  <key>faq_link</key>
  <string>https://wiki.mydomain.com/PhishCatch</string>
</dict>

ignored_domains

Configure sites that should be ignored. Usernames and passwords entered into sites on this list will NOT be hashed, stored, compared, or generate alerts. If not present, no domains will be ignored.

Windows (GPO)

SOFTWARE\Policies\Google\Chrome\3rdparty\extensions\jgegnlkclgfifjphjmijnkmicfgckmah\policy\ignored_domains\00 (REG_SZ) = ignored.mydomain.com
SOFTWARE\Policies\Google\Chrome\3rdparty\extensions\jgegnlkclgfifjphjmijnkmicfgckmah\policy\ignored_domains\01 (REG_SZ) = *.ignoreme.local

macOS

<dict>
  <key>ignored_domains</key>
  <array>
    <string>ignored.mydomain.com</string>
    <string>*.ignoreme.local</string>
  </array>
</dict>

pbkdf2_iterations

The number of PBKDF2 iterations used when hashing passwords. The more iterations used, the more difficult the hash will be to reverse, but will also require additional processing resources on the endpoint. The default setting is 100000.

Windows (GPO)

SOFTWARE\Policies\Google\Chrome\3rdparty\extensions\jgegnlkclgfifjphjmijnkmicfgckmah\policy\pbkdf2_iterations (REG_DWORD, decimal) = 100000

macOS

<dict>
  <key>pbkdf2_iterations</key>
  <integer>100000</integer>
</dict>

repo_link

Enables a "Source Code" button in the PhishCatch GUI that links to an arbitrary URL. If not present, no button will be displayed.

Windows (GPO)

SOFTWARE\Policies\Google\Chrome\3rdparty\extensions\jgegnlkclgfifjphjmijnkmicfgckmah\policy\repo_link (REG_SZ) = https://github.com/palantir/phishcatch

macOS

<dict>
  <key>repo_link</key>
  <string>https://github.com/palantir/phishcatch</string>
</dict>

url_sanitization_level

Determines the verbosity of the URLs sent in reuse alert webhooks. Options are:

  • host: Alerts redact all URL parameters other than the hostname (e.g. example.com/foo?token=bar becomes example.com)
  • path: Alerts include the hostname and path (e.g. example.com/foo?token=bar becomes example.com/foo)
  • none: No sanitization is performed, potentially logging sensitive auth tokens (e.g. example.com/foo?token=bar remains example.com/foo?token=bar)

The default setting is host.

Windows (GPO)

SOFTWARE\Policies\Google\Chrome\3rdparty\extensions\jgegnlkclgfifjphjmijnkmicfgckmah\policy\url_sanitization_level (REG_SZ) = host

macOS

<dict>
  <key>url_sanitization_level</key>
  <string>host</string>
</dict>