Credential Risk Detection is available to organizations on a Dashlane Business Plus plan. Admins of Dashlane Business plans can trial the feature until March 17, 2025.
Upgrade to Dashlane Business Plus
Estimated time to complete: 20 minutes
Admins can use the master data management (MDM) tool Jamf to set up Credential Risk Detection for company-managed Google Chrome and Microsoft Edge desktop browsers on macOS.
Note: You can't use Jamf on Windows or Intune on macOS.
More about Credential Risk Detection
What is Jamf?
Looking to set up Risk detection on Windows using Intune?
Although Credential Risk Detection is most beneficial when rolled out to your entire organization, you can start with a smaller group (or just yourself) during setup and extend it to more employees anytime. To add more employees, update the groups included in your Credential Risk Detection policy.
Process overview
Prerequisites
Make sure you have the appropriate access needed to set up Credential Risk Detection:
- Admin access to a Dashlane Business Plus account
- Admin access to Jamf on macOS
- Permission to deploy policies to devices using Jamf
Set up Credential Risk Detection on macOS using Jamf
Setting up Credential Risk Detection involves three main steps:
- Configure the Risk Detection policy
- Confirm the policy was applied correctly
- Deploy the Dashlane Extension
- Turn on Risk Detection
If you prefer, watch the macOS + Jamf step-by-step video
Review insights and take action
After Credential Risk Detection is turned on, any at-risk passwords entered by employees in company-managed desktop browsers will be logged in the Activity Log and displayed on the Insights tab on the Risk Detection page.
When you identify an employee with risky password practices, you can invite them to your Dashlane plan. With Dashlane, they can use the Password Generator to create strong, secure passwords and store their credentials safely in an encrypted vault.
More about Risk Detection insights
1: Configure the Risk Detection policy
Don't skip this step, even if you've already deployed the Dashlane extension.
What if the extension has already been deployed?
You must deploy the Credential Risk Detection policies before you deploy the Dashlane extension. This order ensures the extension installs silently. If you don't deploy the policies to your targeted machines, your employees will be asked to log in to Dashlane on every login screen. If you deploy the extension before the policies, employees might create a personal account before the policies are applied.
What is a silent deployment?
A "silent deployment" of the Dashlane browser extension means installing the extension on employees' work devices without any visible prompts or interaction needed from the employee. Admins must configure the managed device policy before they deploy Credential Risk Detection to avoid inadvertently notifying employees about Dashlane.
Note: If you're deploying to both Chrome and Edge, you must complete these steps for both browsers.
In the Dashlane Admin Console, start the setup:
- Open the Dashlane Admin Console
- In the menu, select Risk Detection. On the Risk Detection page, select Start setup.
- Select the Jamf tab and the browsers you're deploying to.
- Next to the Preference Domain field, select the Copy value button.
In Jamf, add the new policy:
- Open Jamf and go to the Computers section. Select Configuration Profiles and then New.
- Enter a name for the Configuration Profile. For example, "Dashlane Credential Risk Detection."
- Select the Category you want to add the profile to.
- Under Options, select Application & Custom Settings. Then select Upload and Add.
- For the Preference Domain, paste the value copied from the Admin Console.
In the Dashlane Admin Console, copy the PLIST value:
- On the Risk Detection page, in step 1, select Copy value next to the Property List (PLIST) field.
In Jamf, complete the policy:
- Paste the copied value into the Property List field
- Select Add and then Save.
After performing these steps, the deployment might take up to eight hours, but it's usually faster.
2: Confirm the policy was applied correctly
To ensure Risk Detection's proactive threat monitoring doesn't alert or disrupt employees, you must wait for the policy to take effect in your MDM before deploying the Dashlane extension to enrolled devices and activating the feature.
In Jamf, check the policy was applied:
- Using a device that was part of the deployment targets, go to the Mac System Settings, General, and Device Management, and then find the policy you created.
- After opening that policy, confirm the Risk Detection value is there.
In the Dashlane Admin Console, confirm the policy was applied:
- On the Risk Detection page, in step 2, select the confirmation checkbox.
- Select Continue.
3: Deploy the Dashlane extension
You can skip this step if you've previously deployed the extension.
You must deploy the Credential Risk Detection policies before you deploy the Dashlane extension. This order ensures the extension installs silently. If you don't deploy the policies to your targeted machines, your employees will be asked to log in to Dashlane on every login screen. If you deploy the extension before the policies, employees might create a personal account before the policies are applied.
Return to step 1 to deploy the policy
What if the extension has already been deployed?
Although Credential Risk Detection is most beneficial when rolled out to your entire organization, you can start with a smaller group (or just yourself) by restricting the policy. You can extend Risk Detection to more of your employees at anytime.
In Jamf, force-install the extension on enrolled devices:
- Select the Scope tab, and then select All computers or Specific computers.
- If you select Specific computers, select Add next to the devices you want to include in the deployment, then select Done.
- Select Save.
In the Dashlane Admin Console:
- On the Risk Detection page, go back to step 3 and select Continue.
4: Turn on Risk Detection
Activate Risk Detection to get insights on risky password behavior across company devices. The associated activity logs detail the employee and the website accessed but don't include the password itself.
In the Dashlane Admin Console:
- On the Risk Detection page, go to step 4 and select Turn on.
After Credential Risk Detection is turned on, any at-risk passwords entered by employees in company-managed desktop browsers will be logged in the Activity Log and displayed on the Insights tab on the Risk Detection page.
When you identify an employee with risky password practices, you can invite them to your Dashlane plan. With Dashlane, they can use the Password Generator to create strong, secure passwords and store their credentials safely in an encrypted vault.
More about Risk Detection insights
Watch the macOS + Jamf setup video
You can watch a step-by-step video of the macOS + Jamf setup. Turn on the sound to hear the voiceover.
If you have any issues turning on this feature, please contact our Support team.
Contact an agent through the Admin Console
Chat with our bot
Common questions
The Dashlane extension has already been deployed to all members. How can I turn on Credential Risk Detection?
If the extension has already been deployed and you want to turn on Credential Risk Detection for existing employees, you can skip steps 2 and 3 in the setup guide. You can turn on the feature after deploying the Credential Risk Detection policies.
What is Jamf?
Jamf is a comprehensive device management solution enabling organizations to manage and secure Apple devices, including iOS devices like iPhones and iPads, Mac computers and macOS devices, and Apple TVs.