Why a browser surface
Most AI usage inside an enterprise happens outside the apps your team built:- An employee pastes a customer record into ChatGPT to summarise it.
- A PM uploads a roadmap slide deck to Gemini for rewording.
- A support agent drops a full email thread into Claude to draft a reply.
Creating a Browser integration
The Browsers surface is provisioned as an Integration in the platform.- Go to Integrations → Add Integration.
- Pick Browsers from the provider catalog.
- Give the integration an Integration Name (for example
sales-fleet,contractors). - Optionally attach Tags that will later be usable to scope policies (for example
sales, external). - Save & Close.
Where → Applications when you author a policy.
How to integrate
There is no code change to make on any application — the Browser surface is installed once on the user’s browser and covers every supported AI web app from that moment on.1. Deploy the extension
The TrustGate browser extension is Chromium-based — it runs on Chrome, Edge, Brave, Arc, and any other Chromium-derived browser. It is distributed through enterprise browser management: force-install it through Google Admin Console, Microsoft Intune, or any MDM that supportsExtensionInstallForcelist. The extension appears on every managed browser at next sync and cannot be disabled by the user.
Firefox and Safari are not supported today.
Detailed policy snippets for each management channel are in the Setup Guide button on the Browsers integration page.
2. What the user sees
Once installed, the extension is quiet by default:- A small status badge in the toolbar shows it is connected.
- On
Mask, an inline notice tells the user the input was modified and why. - On
Block, the submit action is cancelled and a dismissable banner explains the reason and the policy.
Block to Log from the browser.
3. Provider catalog & updates
The list of covered AI applications (ChatGPT, Claude, Gemini, Copilot, Mistral Le Chat, …) is maintained centrally and pushed to the extension together with policy updates. A newly supported app is covered automatically on the next policy sync — no re-install.4. Verify
Open any covered AI app, try to submit a prompt that your policies target, and confirm the expected behavior in Runtime → Logs: the event should appear with the application and decision attached.What it sees
The extension inspects what the user is about to send to a supported web AI application:- Typed prompts in the chat input box.
- Pasted content — plaintext, rich text, or structured data.
- File uploads attached to the chat (documents, images, spreadsheets).
- Selected context from page-level integrations (for example right-click “Ask ChatGPT”).
How enforcement works
Every policy that selectsWhere → Browser translates its action to a concrete browser behavior:
| Action | In the browser |
|---|---|
Log | User experience is unchanged; a decision event is recorded against the user, device, and application. |
Mask | The input field, pasted buffer, or uploaded file is rewritten in place before the user submits — for example PII redacted, secrets stripped, confidential identifiers replaced with placeholders. The user sees a notice explaining that the content was modified. |
Block | The submit action is cancelled. The user is shown the reason (for example “Sending source code to external LLMs is not allowed”) and the event is logged. |
Block is a hard stop — the sensitive content never leaves the machine.
Available filters
When authoring a policy withWhere → Browser, Add filter offers:
| Filter | Narrows by |
|---|---|
| Applications | The specific web AI application the policy applies to (for example ChatGPT, Claude, Gemini, Copilot). |
Block PII everywhere.
Identity and audit
Every browser event is stamped with:- The user identity from SSO (email, group membership).
- The device identity the extension is installed on.
- The application the prompt was headed for.
- The evidence snippet that matched the policy (masked when the policy is
MaskorBlock).
Best for
- Shadow AI and copy-paste exfiltration — the biggest leak channel in most enterprises.
- Populations you cannot force behind a gateway: sales, finance, support, execs, contractors.
- Organizations already using a managed browser where rolling out extensions is straightforward.
Layering with other surfaces
The Browser surface pairs naturally with the Gateway and Endpoint surfaces. A typical deployment uses:- Gateway for owned apps and agents (hard
Block). - Browser for anything a user types into a web AI app (hard
Blockat the tab). - Endpoint for desktop apps, IDE plugins, and CLIs that bypass both.
Block PII) gives you coverage across every way a prompt can leave your perimeter.
Related
- Enforcement surfaces overview — how Browser compares to Gateway, API, and Endpoint.
- Policies — authoring
Where / When / Thenfor Browser. - Security capabilities — detectors shared with every other surface.