What is the Nexthink Browser Extension and Should We Be Concerned?

0
38
Asked By CuriousUser42 On

I've noticed that the End User Computing (EUC) department has installed the Nexthink Browser Extension on all employees' laptops. I'm curious if anyone here has experience with it. What exactly does this extension do? The website claims that all the data collected is anonymized and only about performance regarding specific business applications is monitored. However, I'm skeptical about whether the data is truly anonymized. Should we be concerned about this monitoring?

4 Answers

Answered By SkepticalViewer On

I don't really understand the concern about being worried. Did you think that before installing this software, your work computer was completely private?

CuriousUser42 -

No. I’m just trying to figure out what it actually monitors.

Answered By TechSavvyJoe On

The Nexthink Browser Extension is designed to assist with IT Help Desk interactions. It enables Nexthink technicians to quickly troubleshoot and gather information from user endpoints. If your company has deployed this extension, it typically means they also use Nexthink Collector, which is part of standard operating procedures for Nexthink.

HelpfulPete -

Cheers.

Answered By ParanoidTechie On

Honestly, I think the idea of 'anonymous data' is misleading. All data generates traces, and with enough context, it can be traced back to individuals. I treat my work computer as if it's always being monitored; I don’t do any personal stuff on it and keep the mic and camera covered just in case.

CuriousUser42 -

Cheers, I understand that. We also have Splunk monitoring tools across our fleet, so I know they can track quite a bit already. I’m just puzzled about the need for this browser extension.

Answered By DataWatcher88 On

The Nexthink extension is a user experience and monitoring tool. It collects a substantial amount of data regarding what users do on their devices. How this data is utilized may vary by company, but it can include running remote scripts, retrieving logs, and collecting application crash data, among other things.

Related Questions

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.