Cloud Browser Application
  • 2 Minutes to read
  • Dark
    Light
  • PDF

Cloud Browser Application

  • Dark
    Light
  • PDF

Article summary

Cloud Browser Applications: A Key Component of Secure Workspace Solutions

Cloud browser applications facilitate web isolation, also known as Remote Browser Isolation (RBI), and are a key component of secure workspace solutions.

This documentation provides detailed instructions on managing cloud browser applications within the Splashtop Secure Workspace. This feature is essential for IT and security teams who need to control third-party access, remote work, network, endpoint, and identity security effectively.

Logging in and Navigating to Application Management

  1. Login to Secure Workspace: Begin by logging into the Splashtop Secure Workspace with your administrator credentials.
  2. Accessing Applications: In the navigation menu, click on Applications. Then, select Applications again in the submenu.

Adding and Managing Cloud Applications

  1. Initiate Addition: Click on the Add Applications button.
  2. Select Application Type: From the dropdown menu, choose Add Cloud Applications.
  3. General Settings:
    • Application Name: Fill in the name of the application.
    • Display Name: Enter the display name for the application.
    • Edge Location: Select the location where the cloud browser container will run.
    • Tags: Attach existing tags or create a new tag to categorize and manage the application.
      • To attach an existing tag, select it from the dropdown list.
      • To create a new tag, enter the tag name and click the "Save" button.
    • Resolution: Choose the desired resolution for the cloud browser display.

Configuring Application Initiation

  1. Launch Type Selection: In the Application Initiation section, you have two launch type options:
    • Application: Select this to access specific applications managed in your secure workspace via the cloud browser. Applications associated with the Cloud Browser can be either private or public applications.
    • URL: Choose this to set startup URLs for the cloud browser.

Setting Up Groups and Policies

  • Configure the application as either a private or public application in the Groups and Policy section.

Clipboard Access Control

  • In the Enable Clipboard Access section, you can either enable or disable clipboard access. Disabling clipboard access effectively prevents users from copying data directly through the clipboard.

Recording and Monitoring

  1. Recording: Enable this option if you wish to record the cloud browser application sessions as videos. These recordings can be reviewed later in the Monitoring/Recording section.
  2. Live Session Monitor: When enabled, this allows session activities to be monitored in real-time. Administrators can view all real-time cloud browser sessions in the Monitoring/Sessions section. Additionally, there is an option to terminate any active session if necessary.

URL Access Control

  • In the URL Access Control section, administrators can set up a URL blacklist or whitelist. This controls the web surfing activities of users on the cloud browser.

By following these steps, administrators can effectively manage cloud browser applications within the Splashtop Secure Workspace, securing third-party and privileged access, and ensuring a secure and efficient remote work environment.


Was this article helpful?