Edge Collector
AIDR Microsoft Edge collector is a browser extension installed from the Chrome Web Store.
Requirements
To start monitoring employee AI usage using browser collectors, ensure you have:
- A customer account in one of the supported CrowdStrike clouds:
- US-1
- US-2
- EU-1
- AIDR for Workforce Falcon subscription
- AIDR Admin role explicitly assigned to your Falcon user account for the current customer
- Supported operating system:
- Windows
- macOS
- Admin privileges on the user machine(s), necessary for updating system-level configuration:
- Registry on Windows
- Configuration profile on macOS
Register browser collector
In the Falcon console, click Open menu (☰) and go to
-
On the Collectors page, click + Collector.
- Choose Browser as the collector type, then select Microsoft Edge and click Next.
-
On the Add a Collector screen:
- Collector Name - Enter a descriptive name for the collector to appear in dashboards and reports.
- Logging - Select whether to log incoming (prompt) data and model responses, or only metadata submitted to AIDR.
- Policy (optional) - Assign a policy to apply to incoming data and model responses.
-
You can select an existing policy available for this collector type or create policies on the
Policies page.The selected policy name appears under the dropdown. After you save the collector registration, this label becomes a link to the corresponding policy page.
-
You can also select
No Policy, Log Only. Without a policy, AIDR records activity for visibility and analysis without applying detection rules.
Use the assigned policy to determine which detections run on data sent to AIDR. Policies define rules for detecting malicious activity, sensitive data exposure, topic violations, and other risks in AI interactions.
-
In the Sites section, configure how policy rules apply to each AI provider domain.
The Sites section lists supported AI provider websites that the extension monitors. You can set each site to one of the following modes to apply or override the collector-level policy rules:
Use Policy(default) - Apply the collector's policy rules to this site. User prompts and AI system responses are sent to AIDR for analysis and logging. User prompts may be blocked or transformed. To review your collector policy rules, find the assigned policy on the Policies page in the AIDR console.Monitor Only- Apply the collector's policy rules to this site in report-only mode. User prompts and AI system responses are sent to AIDR for analysis and logging. The user experience isn't affected.Discovery- Skip sending AI traffic to AIDR. Only record that users visited the site.Disabled- Ignore this site entirely. No monitoring or logging is done.
-
Click Save to complete collector registration.
Start with one of the policies provided in AIDR by default.
No policy, Log Only- Record user activity.
- Skip risk detection.
Browser Monitor- Record user activity.
- Detect risks in AI traffic using pre-configured detectors and save event logs.
Browser Protect- Record user activity.
- Detect risks in AI traffic using pre-configured detectors and save event logs.
- Apply pre-configured policy actions to the user's input.
You can change your policy configuration or clone it and define a custom policy.
Regardless of the selected policy, browser collector output rules always run in Report Only Mode and won't modify AI responses shown to users.
This opens the collector details page, where you can:
- View installation instructions for the collector type on the Install tab.
- Update the collector name, logging preference, and policy assignment.
- Click the policy link to view the policy details.
- View the collector configuration activity logs.
To return to the collector details page later, select your collector from the list on the Collectors page.
Deploy collector
To deploy a browser collector, you must:
- Install the browser extension.
- Save AIDR collector configuration in the extension's Managed storage.
Managed storage
All deployment methods achieve the same result - populating the browser extension's Managed storage with the values it needs to connect to AIDR.
Edge reads managed storage configuration from OS-level settings:
- macOS - Configuration profiles
- Windows - Registry entries
Configuration fields
-
Required fields:
registrationIdentity- Encoded credentials the extension uses to authenticate with the AIDR service and obtain an authorization tokenurlTemplate- AIDR API base URL
You can find collector-specific values for
registrationIdentityandurlTemplateon the Install tab of the collector details page in the AIDR console. Configuration files and templates available on the Install tab are pre-populated with these values. -
Optional user identity fields that appear in AIDR event logs:
userId- User identifier (for example, email address). Appears in AIDR logs and findings.userFullName- User's display name. Appears in AIDR logs and findings.
note:Downloaded configuration files are pre-populated with values from the current session:
urlTemplate- Set to the AIDR API URL for your CrowdStrike cloud.registrationIdentity- Set to collector-specific credentials.userIdanduserFullName- Set to the current AIDR console user's information.
If you distribute the configuration file to other users, update the
userIdanduserFullNamefields to match the target user's identity. In production deployments, you typically set these values dynamically per user using variables in endpoint management tools or scripts.
To check extension managed storage in Edge:
- In your browser address bar, go to
edge://extensions. - Enable Developer mode.
- In the AIDR extension card, click service_worker.
- In the DevTools console for the background service worker, switch to the Application tab.
- Expand Extension storage and click Managed.
- Verify the storage keys are populated.
System paths
JAMF, Intune, and Self-Service apply extension configuration through OS-level settings. You can verify these settings at the following OS and browser-specific locations:
-
macOS - Managed preference plist files
Configuration profileplutil -p /Library/Managed\ Preferences/<user>/com.microsoft.Edge.extensions.folndgmoekgkipoolphnkclopeopkecc.plistExample configuration{
...
"registrationIdentity" => "eyJzIj...YiOjF9"
"urlTemplate" => "https://api.crowdstrike.com/aidr/aiguard"
"userFullName" => "<user-full-name>"
"userId" => "<user-id>"
} -
Windows - Registry keys
Registry keysGet-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Edge\3rdparty\extensions\folndgmoekgkipoolphnkclopeopkecc\policy"Example configurationurlTemplate : https://api.crowdstrike.com/aidr/aiguard
registrationIdentity : eyJzIj...I6MX0=
userId : <user-id>
userFullName : <user-full-name>
...
Select Install option
On the collector details page, switch to the Install tab, which provides instructions, links, and templates for common deployment methods.
- JAMF - Use Apple-native Configuration Profiles to enforce extension deployment and system-level settings on macOS.
- Microsoft Intune - Deploy extensions and configuration profiles across Windows and macOS managed endpoints.
- Chrome Enterprise (Google Chrome only) - Use Chrome Enterprise to enroll browsers into the Google Admin console for centralized cloud-based policy management.
- Self-Service - Install the extension and apply a configuration profile on a single machine to quickly evaluate and test the collector.
Self-Service (testing)
Select the Self-Service option to quickly evaluate the collector on your own machine before deploying it at scale. This option:
- Introduces the key browser collector deployment steps
- Requires no management tools
- Lets you perform both installation and configuration steps manually on your machine
- Describes the extension deployment statuses and functionality, also applicable to production deployments using enterprise management tools
Self-service deployment is intended for testing and evaluation purposes. It isn't a supported option for production deployments.
The first time you select this option, you must acknowledge these limitations in a confirmation dialog before proceeding.
Install extension
The AIDR collector for Google Chrome and Microsoft Edge is a Chrome extension in the Chrome Web Store.
- Use the
Get the AIDR Extensionlink to open the extension page in Chrome Web Store. - Click Add to Edge to install the extension in your browser.
After the extension is installed, you can manage it on the edge://extensions page.
Configure extension
-
Return to the Install tab and download the configuration file for your operating system:
- macOS - AIDR Chrome Profile (
.mobileconfig) - Windows - AIDR Windows registry file (
.reg)
This file contains the collector instance configuration, including credentials to authenticate the extension with the AIDR service.
- macOS - AIDR Chrome Profile (
-
Apply the configuration:
-
macOS
-
Double-click the downloaded configuration profile (
.mobileconfig), then activate it in System Settings > General > Device Management > Profiles. If a previous profile for this extension exists, remove it first.The exact path may vary depending on your macOS version.
-
-
Windows - Double-click the registry file (
.reg) to merge it into the Registry and confirm the prompts.warning:The registry file modifies the Windows Registry under the extension-specific key path. This doesn't affect other settings, but as a precaution, you can make a registry backup before applying the file. If you're unsure how to back up the Registry, contact your IT or system administrator.
-
-
Fully close and restart your browser for the settings to take effect.
Uninstall collector
When you're done testing, remove the browser extension and its system configuration.
-
Remove the browser extension in your browser's extension manager, the same way you would remove any other Chrome or Edge extension.
-
Remove the system configuration:
-
macOS - Remove the configuration profile in System Settings > General > Device Management > Profiles. The exact path may vary depending on your macOS version.
-
Windows - Delete the registry key for the browser you used.
warning:This modifies the Windows Registry. You can make a registry backup before proceeding. If you're unsure how to back up the Registry, contact your IT or system administrator.
Run the following command in a PowerShell session as Administrator:
Remove the registry key for ChromeRemove-Item -Path "HKLM:\Software\Policies\Google\Chrome\3rdparty\extensions\folndgmoekgkipoolphnkclopeopkecc" -RecurseRemove the registry key for EdgeRemove-Item -Path "HKLM:\SOFTWARE\Policies\Microsoft\Edge\3rdparty\extensions\folndgmoekgkipoolphnkclopeopkecc" -Recurse
-
Verify deployment status
Verify that the extension is properly configured and connected to AIDR on a user's machine.
Extension status page
To open the extension status page:
- If you have pinned the extension to the browser toolbar, click its icon (CrowdStrike AIDR).
- If you haven't pinned the extension, click the puzzle piece icon (Extensions) in the toolbar and select it from the list.
The extension status page shows:
- CrowdStrike AIDR - Extension vendor and name
- Version - Semantic version number (for example,
0.6.6). The first two digits indicate major and minor feature releases. The last digit indicates a patch with improvements or bug fixes. - Device - Unique identifier for this extension instance. Appears in AIDR logs and findings. Re-installing the extension generates a new device ID. Collector instances are listed on the collector details page under the Devices tab.
- UserId - Identifier assigned to the
userIdfield in the extension managed storage. If nouserIdis configured, this field isn't displayed. - One of the status values in the top right, indicating the current state of the extension.
Status progression flow
- Deployment
- Not configured (error)
- Configuration check
- Configured
- Invalid configuration (error)
- Registration
- Error - registration (error)
- Pending approval (action required)
- Site monitoring
- Error - logging (error)
- Ready
- Active
Unsuccessful deployment
Not configured
The extension has no configuration in its managed storage.
-
Verify that the configuration profile or registry changes were properly applied to the system.
JAMF, Intune, and Self-Service apply extension configuration through OS-level settings.
You can verify settings made by these or similar tools at the following OS and browser-specific locations:
-
macOS - Managed preference plist files
Configuration profileplutil -p /Library/Managed\ Preferences/<user>/com.microsoft.Edge.extensions.folndgmoekgkipoolphnkclopeopkecc.plistExample configuration{
...
"registrationIdentity" => "eyJzIj...YiOjF9"
"urlTemplate" => "https://api.crowdstrike.com/aidr/aiguard"
"userFullName" => "<user-full-name>"
"userId" => "<user-id>"
} -
Windows - Registry keys
Registry keysGet-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Edge\3rdparty\extensions\folndgmoekgkipoolphnkclopeopkecc\policy"Example configurationurlTemplate : https://api.crowdstrike.com/aidr/aiguard
registrationIdentity : eyJzIj...I6MX0=
userId : <user-id>
userFullName : <user-full-name>
...
Next steps:
- If you don't see the expected values provided on the collector details page in the AIDR console, verify the system configuration process and repeat it if necessary.
-
-
Verify the extension managed storage has been updated.
- In your browser address bar, go to
edge://extensions. - Enable Developer mode.
- In the AIDR extension card, click service_worker.
- In the DevTools console for the background service worker, switch to the Application tab.
- Expand Extension storage and click Managed.
- Verify the storage keys are populated.
-
Required fields:
registrationIdentity- Encoded credentials the extension uses to authenticate with the AIDR service and obtain an authorization tokenurlTemplate- AIDR API base URL
You can find collector-specific values for
registrationIdentityandurlTemplateon the Install tab of the collector details page in the AIDR console. Configuration files and templates available on the Install tab are pre-populated with these values. -
Optional user identity fields that appear in AIDR event logs:
userId- User identifier (for example, email address). Appears in AIDR logs and findings.userFullName- User's display name. Appears in AIDR logs and findings.
note:Downloaded configuration files are pre-populated with values from the current session:
urlTemplate- Set to the AIDR API URL for your CrowdStrike cloud.registrationIdentity- Set to collector-specific credentials.userIdanduserFullName- Set to the current AIDR console user's information.
If you distribute the configuration file to other users, update the
userIdanduserFullNamefields to match the target user's identity. In production deployments, you typically set these values dynamically per user using variables in endpoint management tools or scripts.
Next steps:
- If the extension managed storage isn't populated, ensure that the browser is fully closed and restarted.
- In your browser address bar, go to
Invalid configuration
The configuration exists but is malformed due to invalid format or missing value for registrationIdentity or urlTemplate.
Next steps:
- Re-download and re-apply the configuration.
Error - registration
Device registration failed due to network issues or invalid credentials provided in:
registrationIdentityurlTemplate
Next steps:
- Check network connectivity to the AIDR service.
- Re-download and re-apply the configuration.
Successful registration
Pending approval
The extension instance is registered but awaiting admin activation in the AIDR console.
By default, devices are auto-approved and activated. If auto-approval isn't enabled or this extension instance has been disabled, it remains in this state until activated.
Next steps:
- On the collector details page, under Devices, find the extension instance by its ID in the list of devices.
Open the menu (
⋮) in the device row and select Activate.
Error - logging
The extension is registered but can't send monitoring data from a provider site to the AIDR service. Connectivity issues are the most common cause.
Next steps:
- Check network connectivity to the AIDR service.
Successful deployment
After successful installation and configuration, the status should progress to:
Configured
The extension has valid configuration but hasn't obtained an access token yet. This normal transitional state occurs during extension startup. It progresses to Ready automatically within minutes if the configuration values are valid.
Invalid configuration values result in Unsuccessful deployment.
Ready
The extension is configured, authenticated, and ready to monitor supported AI sites. No activity has been detected yet.
Active
The extension is operational and monitors AI interactions when the user interacts with a supported provider site.
Verify data flow
A properly deployed collector captures user input and AI service responses on supported provider sites and sends them to AIDR.
AIDR evaluates the data against your collector policy rules and logs the results.
If the collector's Logging is set to Log with prompt data, the logs include the user input and AI response.
Provider website
Visit a supported provider site (for example, ChatGPT or Claude ) and start interacting with the chat application.
Browser UI
Depending on the collector policy, the AIDR collector can visibly alter the end-user experience in the standard browser UI:
- If
No Policy, Log Onlyis assigned, or all policy rule actions are set toAlertandReport, the AIDR collector produces no visible effects. - If your policy rules include blocking or data-transforming actions, you may see blocked or redacted prompts when a rule matches. Responses may also appear unexpected when sensitive values were removed before reaching the AI system.
Next steps:
If you don't see AIDR policies applied to the user input:
-
Check Input Rules for the policy assigned to your collector.
tip:To identify your extension instance:
- Match the extension
urlTemplatevalue and the AIDR cloud domain. - Switch to the correct customer account in the Falcon console (CID).
- Select the correct collector on the Collectors page in the AIDR console.
- Match the device ID on the extension status page with the registered device listed on the collector details page under Devices.
- Match the extension
Extension DevTools
Use the extension DevTools to confirm that it's active and sending data to AIDR:
- In your browser address bar, go to
edge://extensions. - Enable Developer mode.
- In the AIDR extension card, click service_worker to open its developer tools.
- In DevTools, switch to the Network tab.
- Check for outbound requests to and responses from the AIDR APIs while interacting with a supported AI provider.
You may see the following request names:
-
check- Authenticating with the AIDR service and obtaining an authorization token -
guard_chat_completions- Sending user input or AI system response to AIDR for analysisClick a request row to inspect the collector payload under the Payload tab and AIDR API responses under the Preview and Response tabs.
tip:See AIDR APIs documentation to better understand the content of the payloads and responses.
-
Next steps:
If you don't observe network traffic to AIDR APIs from the correctly configured extension, possible causes include:
- Changes on the provider site - Contact AIDR support .
- Your machine policies blocking extension functionality - Contact your IT or system administrator.
AIDR console
In the AIDR console, review detailed event logs saved by your collector, visualize them in a Sankey dashboard, and view associated metrics.
Data appears in AIDR only when users visit and interact with AI provider sites. Installing the extension alone doesn't create data flow.
View detailed logs
Click Findings in the top menu to review events processed by AIDR. Identify your collector logs by attributes associated with the collector and provider, for example:
- COLLECTOR TYPE - (for example,
Edge) - APPLICATION NAME - Provider service name (for example,
ChatGPT) - COLLECTOR NAME - Name you gave to your collector
- TIME - Time of the request
These columns show AIDR processing results:
- STATUS - Policy decision:
Allowed- No risks were detected, and the user prompt or AI system response is allowed by AIDR.Reported- Risks were detected and logged, but the user prompt or AI system response is allowed by AIDR.Blocked- Risks were detected, and AIDR responded with a blocked result. Blocking actions set in policy rules are automatically enforced in Browser, MCP, and (depending on configuration) Gateway collectors.Alerted- A blocked result was logged but not enforced in Report Only mode .Transformed- Sensitive data or malicious references were detected and redacted or defanged. The user prompt or AI system response was allowed with the transformed data.
- FINDINGS - Detector(s) that identified risks.
If AIDR detected no risks and allowed the request,
No detectionsis displayed.
Expand each event log to see additional details, including:
-
User prompt or AI response data - If the collector's Logging is set to
Log with prompt data, the event logs contain:- Guard Input - Original prompt or response submitted to AIDR
- Guard Output - Processed response, present only if the data was transformed; otherwise,
null
-
Metadata associated with the request, including:
- User - Username saved in the extension managed storage
- AIGuard Config
- policy - Policy assigned to the collector
- Findings - Detailed detections report
- Extra Info
- app_name - Provider website application name
- user_name - User's full name saved in the extension managed storage
- site_url - Provider website location
Use the reload icon to refresh the event log table.
Learn more about the Findings page in the Logs & Findings documentation .
Visualize your data
Click Visibility in the top menu to explore patterns in AIDR-processed AI data flows and associated metrics.
In the interactive Sankey diagram, you can visualize relationships between entities captured in event logs. Select up to three attributes from the event metadata. For example, connect User Name - Application Name - Status to see which users visited which AI providers and the AIDR outcomes.
Learn more about visualizing AI flows, supported metadata attributes, and metrics dashboards in the Data Flows & Dashboards documentation .
Devices
The Devices tab displays browser instances enrolled with the AIDR browser collector. Monitor device activity, manage enrollment, and revoke tokens for specific devices on this page.