Limit Software Installation
Block users or groups from installing unapproved software.
Techniques Addressed by Mitigation
Only install browser extensions from trusted sources that can be verified. Browser extensions for some browsers can be controlled through Group Policy. Change settings to prevent the browser from installing extensions without sufficient permissions.
Restrict software installation to trusted repositories only and be cautious of orphaned software packages.