AI Usage Discovery
A lightweight PowerShell tool for MSPs to discover employee AI usage across ChatGPT, Claude, Gemini, Perplexity, and 70+ other AI apps.
The Problem
MSPs need visibility into Shadow AI usage across client environments. Employees are using AI tools like ChatGPT, Claude, and Copilot without IT awareness, creating security blind spots and potential data leak risks. Traditional monitoring tools don't catch this emerging threat vector.
How It Works
- 1
Install from PowerShell Gallery
Run Install-Module -Name PeachSecurity.AIUsageDiscovery -Scope CurrentUser to install the module.
- 2
Run a Scan
Execute Get-AIUsageDiscovery to scan browser history for AI tool usage.
- 3
Export Reports
Use -ExportJson, -ExportCsv, or -ExportMarkdown flags to generate professional reports for QBRs.
- 4
Scan All Users
Add -AllUsers flag (requires elevation) to scan all users on a system for comprehensive coverage.
Installation & Usage
Install-Module -Name PeachSecurity.AIUsageDiscovery -Scope CurrentUser # Run your first scan Get-AIUsageDiscovery # If sqlite3 not found on Windows, use: Get-AIUsageDiscovery -InstallSQLite # Export reports for QBR Get-AIUsageDiscovery -ExportJson -ExportCsv -ExportMarkdown -OutputPath "./Reports"
About This Tool
PeachSecurity.AIUsageDiscovery is a free, open-source PowerShell module that scans browser history locally to detect Shadow AI usage across your client environments. It supports Chrome, Edge, Firefox, and Safari, scanning for 70+ AI tools including ChatGPT, Claude, Microsoft Copilot, GitHub Copilot, Midjourney, and more. Perfect for MSP pre-sales discovery, QBR reporting, and compliance assessments.
Want to influence what we build next?
Visit the Voting BoardGet Next Week's Free Tool
Join MSPs getting free tools delivered to their inbox every Friday.