Home

Intune - iOS Mail Profile with Azure MFA

%3CLINGO-SUB%20id%3D%22lingo-sub-207222%22%20slang%3D%22en-US%22%3EIntune%20-%20iOS%20Mail%20Profile%20with%20Azure%20MFA%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-207222%22%20slang%3D%22en-US%22%3E%3CP%3EHaving%20issues%20setting%20up%20a%20Device%20Configuration%20Profile%20with%20intune.%20I%20created%20a%20Profile%20to%20deploy%20a%20Mail%20Profile%20for%20iOS%20devices%20to%20connect%20to%20Office%20365%20mailbox.%20The%20profile%20deploys%20properly%20but%20when%20the%20profile%20deploys%2C%20I%20am%20asked%20to%20enter%20my%20credentials%20but%20they%20do%20not%20work.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThe%20iOS%20Mail%20Profile%20is%20never%20able%20to%20verify%20the%20exchange%20account.%20After%20entering%20the%20password%20it%20says%20%22Unable%20to%20verify%20account%20information%22.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWe%20do%20have%20MFA%20enabled%20and%20our%20domain%20is%20federated%20with%20ADFS.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EDoes%20intune%20iOS%20Mail%20Profile%20configuration%20work%20with%20Azure%20MFA%3F%20What%20could%20possibly%20be%20the%20issue%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-207222%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EIntune%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3Emfa%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-312449%22%20slang%3D%22en-US%22%3ERe%3A%20Intune%20-%20iOS%20Mail%20Profile%20with%20Azure%20MFA%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-312449%22%20slang%3D%22en-US%22%3E%3CP%3EThat%20is%20the%20Intune%20configuration%2C%20which%20I%20don't%20have%20access%20to.%20The%20Office%20365%20MDM%20configuration%20uses%20the%20same%20back-end%20infrastructure%20(and%20the%20Intune%20Company%20Portal%20app)%2C%20but%20the%20configuration%20is%20done%20here%3A%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fprotection.office.com%2F%3Frfr%3DAdminCenter%23%2Fdevicev2%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fprotection.office.com%2F%3Frfr%3DAdminCenter%23%2Fdevicev2%3C%2FA%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-312428%22%20slang%3D%22en-US%22%3ERe%3A%20Intune%20-%20iOS%20Mail%20Profile%20with%20Azure%20MFA%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-312428%22%20slang%3D%22en-US%22%3E%3CP%3EIt's%20a%20setting%20in%20the%20device%20configuration%20profiles.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fportal.azure.com%2F%23blade%2FMicrosoft_Intune_DeviceSettings%2FDeviceConfigMainMenuViewModel%2FdeviceConfiguration%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fportal.azure.com%2F%23blade%2FMicrosoft_Intune_DeviceSettings%2FDeviceConfigMainMenuViewModel%2FdeviceConfiguration%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-312418%22%20slang%3D%22en-US%22%3ERe%3A%20Intune%20-%20iOS%20Mail%20Profile%20with%20Azure%20MFA%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-312418%22%20slang%3D%22en-US%22%3E%3CP%3EIs%20there%20a%20way%20to%20enable%20oauth%20for%20Office%20365%20MDM%3F%20My%20deployment%20is%20configured%20through%20Office%20365%20MDM%2C%20and%20I%20don't%20see%20an%20option%20to%20enable%20oauth.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-312306%22%20slang%3D%22en-US%22%3ERe%3A%20Intune%20-%20iOS%20Mail%20Profile%20with%20Azure%20MFA%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-312306%22%20slang%3D%22en-US%22%3E%3CP%3EI%20was%20able%20to%20get%20an%20in%20tune%20deployed%20iOS%20mail%20profile%20to%20successfully%20support%20Office%20365%20multi-factor%20authentication%20through%20the%20built%20in%20iOS%20mail%20app.%20%26nbsp%3BTo%20do%20so%2C%20you%20must%20enable%20oauth%20within%20the%20intune%20mail%20profile.%20Previous%20commenters%20have%20mentioned%20iOS%2012%20as%20a%20requirement.%20%26nbsp%3BThe%20above%20was%20tested%20and%20successful%20on%20iOS%2012.1.1%20and%2012.1.2%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-265889%22%20slang%3D%22en-US%22%3ERe%3A%20Intune%20-%20iOS%20Mail%20Profile%20with%20Azure%20MFA%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-265889%22%20slang%3D%22en-US%22%3EGot%20it%20thanks%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-265885%22%20slang%3D%22en-US%22%3ERe%3A%20Intune%20-%20iOS%20Mail%20Profile%20with%20Azure%20MFA%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-265885%22%20slang%3D%22en-US%22%3E%3CP%3EWhen%20I%20say%20fell%20back%20I%20mean%20we%20reconfigured%20the%20conditional%20access%20policy%20via%20the%20gui%20to%20the%20previous%20config.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-265884%22%20slang%3D%22en-US%22%3ERe%3A%20Intune%20-%20iOS%20Mail%20Profile%20with%20Azure%20MFA%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-265884%22%20slang%3D%22en-US%22%3E%3CP%3ERobert%20when%20you%20say%20you%20fell%20back%20what%20was%20the%20mechanism%20you%20used%3F%20Powershell%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThanks%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-265880%22%20slang%3D%22en-US%22%3ERe%3A%20Intune%20-%20iOS%20Mail%20Profile%20with%20Azure%20MFA%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-265880%22%20slang%3D%22en-US%22%3E%3CP%3EThank%20you%20I%20will%20review%20that.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-265873%22%20slang%3D%22en-US%22%3ERe%3A%20Intune%20-%20iOS%20Mail%20Profile%20with%20Azure%20MFA%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-265873%22%20slang%3D%22en-US%22%3E%3CP%3EI%20followed%20this%20blog%20by%20the%20Great%20Paul%20Cunningham%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fpractical365.com%2Fsecurity%2Fazure-active-directory-conditional-access-enforce-multi-factor-authentication%2F%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fpractical365.com%2Fsecurity%2Fazure-active-directory-conditional-access-enforce-multi-factor-authentication%2F%3C%2FA%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3Eat%20the%20bottom%2C%20there%20is%20an%20addendum%2C%20need%20to%20also%20consider%20this%3A%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fpractical365.com%2Fblog%2Fazure-active-directory-conditional-access-device-state%2F%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fpractical365.com%2Fblog%2Fazure-active-directory-conditional-access-device-state%2F%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-265871%22%20slang%3D%22en-US%22%3ERe%3A%20Intune%20-%20iOS%20Mail%20Profile%20with%20Azure%20MFA%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-265871%22%20slang%3D%22en-US%22%3ERobert%20can%20provide%20more%20information%20on%20how%20you%20setup%20conditional%20access%20for%20mfa%20based%20on%20Intune%20policy%20compliance%3F%20We%20also%20had%20to%20fall%20back%20however%20our%20many%20of%20our%20intune%20clients%20are%20getting%20hung%20up%20and%20need%20to%20be%20re-enrolled.%3CBR%20%2F%3E%3CBR%20%2F%3EThanks%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-262814%22%20slang%3D%22en-US%22%3ERe%3A%20Intune%20-%20iOS%20Mail%20Profile%20with%20Azure%20MFA%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-262814%22%20slang%3D%22en-US%22%3E%3CP%3EOur%20experience%20-%20Users%20updated%20to%20iOS%2012%20and%20latest%20version%20of%20comp%20portal%20available.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIntune%20profiles%20to%20add%20mail%20to%20default%20app%26nbsp%3Band%20comp%20portal%20were%20installed%20on%20all%20devices%20and%20in%20use%20for%20the%20past%206%20mos.%26nbsp%3B%20I%20did%20not%20make%20the%20users%20delete%20the%20policy%20and%20re-enroll.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20go%20to%20the%20portal%20and%20Enforce%20MFA%20on%20selected%20users.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EUsers%20proactively%20go%20to%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FMFASetup%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Faka.ms%2FMFASetup%3C%2FA%3E%26nbsp%3Band%20enroll%20authenticator%20with%20push%20notification.%20Setup%20is%20successful.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EUsers%20open%20mail%20app%20on%20LTE%20or%20away%20from%20known%20good%20IP's%20and%20it%20fails%20to%20connect%20to%20server.%20NO%20popup%20Approval%20from%20Authenticator.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EUsers%20open%20outlook%20app%20for%20testing%20and%20are%20prompted%20for%20MFA%20immediately%20in%20authenticator.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-262679%22%20slang%3D%22en-US%22%3ERe%3A%20Intune%20-%20iOS%20Mail%20Profile%20with%20Azure%20MFA%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-262679%22%20slang%3D%22en-US%22%3EVery%20strange.%20We%20upgraded%20our%20IT%20phones%20to%20iOS12.%20Then%20downloaded%20the%20portal.%20Was%20able%20to%20authenticate%20and%20the%20mail%20profile%20deployed%20to%20our%20devices.%20On%20deployment%2C%20I%20received%20a%20prompt%20that%20I%20needed%20to%20update%20my%20password%20settings.%20Clicked%20it%2C%20jump%20to%20the%20mail%20setting%20to%20where%20the%20action%20button%20was%20update%20your%20password.%20Click%20it%2C%20and%20was%20directly%20over%20the%20oAuth%20to%20authenticate%20and%20verify%20my%20identity%20with%20MFA.%20Mail%20successful.%20Accounts%20do%20not%20have%20conditional%20access%20but%20MFA%20is%20enabled.%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-262640%22%20slang%3D%22en-US%22%3ERe%3A%20Intune%20-%20iOS%20Mail%20Profile%20with%20Azure%20MFA%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-262640%22%20slang%3D%22en-US%22%3EWe%20are%20Office%20365%20only%2C%20no%20Azure%20AD%2C%20so%20conditional%20access%20isn't%20an%20option%20for%20us.%20Until%20MDM%20deployment%20works%20properly%20with%20MFA%2C%20it%20is%20very%20difficult%20to%20use%20both%20together.%20Hopefully%20it%20is%20supported%20soon...%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-262508%22%20slang%3D%22en-US%22%3ERe%3A%20Intune%20-%20iOS%20Mail%20Profile%20with%20Azure%20MFA%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-262508%22%20slang%3D%22en-US%22%3E%3CP%3Ewe%20tried%20applying%20Intune%20Company%20Portal%20deployment%20also%20Today%20after%20updating%20all%20IT%20dept%20phones%20to%20iOS%2012.%20Can%20confirm%20it%20still%20does%20not%20work.%20We%20fell%20back%20to%20conditional%20access%20for%20mfa%20based%20on%26nbsp%3B%20Intune%20policy%20compliance%20instead%2C%20which%20is%20easier%20on%20the%20phone%20users%20anyways.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-261628%22%20slang%3D%22en-US%22%3ERe%3A%20Intune%20-%20iOS%20Mail%20Profile%20with%20Azure%20MFA%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-261628%22%20slang%3D%22en-US%22%3E%3CP%3EI%20updated%20my%20phone%20to%20iOS%2012%20and%20attempted%20the%20Intune%20Company%20Portal%20deployment%20again%2C%20but%20it%20still%20does%20not%20seem%20to%20support%20MFA.%20Am%20I%20doing%20something%20wrong%2C%20or%20is%20an%20Intune%20Company%20Portal%20update%20required%20to%20support%20MFA%3F%20Has%20anyone%20gotten%20deployment%20of%20MFA%20accounts%20to%20work%20since%20iOS%2012%20was%20released%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-207680%22%20slang%3D%22en-US%22%3ERe%3A%20Intune%20-%20iOS%20Mail%20Profile%20with%20Azure%20MFA%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-207680%22%20slang%3D%22en-US%22%3E%3CP%3EThe%20Native%20iOS%20mail%20app%20actually%20does%20support%20MFA%20but%20not%20for%20deployment%20scenarios.%26nbsp%3B%20That%20is%20not%20available%20in%20the%20current%20build%20of%20iOS.%20If%20I%20understand%20correctly%2C%20version%2012%20(in%20current%20Beta)%20does%20support%20MFA%20(oAuth%2FModern%20%3CFONT%3Eauthentication%3C%2FFONT%3E)%20I%20am%20not%20certain%20if%20it%20is%20in%20the%20current%20build%20and%20if%20intune%20will%20need%20to%20add%20additional%20code%20once%20iOS%2012%20is%20released.%26nbsp%3B%20You%20will%20have%20to%20manually%20configure%20the%20native%20app%20or%20use%20Outlook%20for%20iOS%20with%20accounts%20that%20have%20MFA%20enabled.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-207389%22%20slang%3D%22en-US%22%3ERe%3A%20Intune%20-%20iOS%20Mail%20Profile%20with%20Azure%20MFA%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-207389%22%20slang%3D%22en-US%22%3E%3CP%3EThe%20native%20iOS%20mail%20app%20doesn't%20support%20MFA.%20You%20have%20to%20use%20app%20passwords%20for%20that%20app.%26nbsp%3B%3C%2FP%3E%3CP%3EMy%20advise%20because%20you%20are%20also%20using%20Office365%20is%2C%20go%20for%20the%20Outlook%20for%20iOS%20app.%20Email%20account%20push%20is%20not%20needed%20for%20this%20app%20and%20this%20app%20supports%20MFA.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-553398%22%20slang%3D%22en-US%22%3ERe%3A%20Intune%20-%20iOS%20Mail%20Profile%20with%20Azure%20MFA%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-553398%22%20slang%3D%22en-US%22%3E%3CP%3EHas%20anyone%20had%20any%20success%20with%20Office%20365%20MDM%3F%20I%20still%20have%20no%20way%20to%20%22%3CSPAN%3Eenable%20oauth%20within%20the%20intune%20mail%20profile%22%20for%20this%20product%2C%20so%20all%20MFA%2FModern%20Auth%20users'%20email%20profiles%20deployed%20to%20iOS%20through%20Office%20365%20MDM%20won't%20connect.%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E
James Sabia
Occasional Contributor

Having issues setting up a Device Configuration Profile with intune. I created a Profile to deploy a Mail Profile for iOS devices to connect to Office 365 mailbox. The profile deploys properly but when the profile deploys, I am asked to enter my credentials but they do not work.

 

The iOS Mail Profile is never able to verify the exchange account. After entering the password it says "Unable to verify account information".

 

We do have MFA enabled and our domain is federated with ADFS. 

 

Does intune iOS Mail Profile configuration work with Azure MFA? What could possibly be the issue?

18 Replies

The native iOS mail app doesn't support MFA. You have to use app passwords for that app. 

My advise because you are also using Office365 is, go for the Outlook for iOS app. Email account push is not needed for this app and this app supports MFA. 

 

The Native iOS mail app actually does support MFA but not for deployment scenarios.  That is not available in the current build of iOS. If I understand correctly, version 12 (in current Beta) does support MFA (oAuth/Modern authentication) I am not certain if it is in the current build and if intune will need to add additional code once iOS 12 is released.  You will have to manually configure the native app or use Outlook for iOS with accounts that have MFA enabled. 

I updated my phone to iOS 12 and attempted the Intune Company Portal deployment again, but it still does not seem to support MFA. Am I doing something wrong, or is an Intune Company Portal update required to support MFA? Has anyone gotten deployment of MFA accounts to work since iOS 12 was released?

we tried applying Intune Company Portal deployment also Today after updating all IT dept phones to iOS 12. Can confirm it still does not work. We fell back to conditional access for mfa based on  Intune policy compliance instead, which is easier on the phone users anyways. 

We are Office 365 only, no Azure AD, so conditional access isn't an option for us. Until MDM deployment works properly with MFA, it is very difficult to use both together. Hopefully it is supported soon...
Very strange. We upgraded our IT phones to iOS12. Then downloaded the portal. Was able to authenticate and the mail profile deployed to our devices. On deployment, I received a prompt that I needed to update my password settings. Clicked it, jump to the mail setting to where the action button was update your password. Click it, and was directly over the oAuth to authenticate and verify my identity with MFA. Mail successful. Accounts do not have conditional access but MFA is enabled.

Our experience - Users updated to iOS 12 and latest version of comp portal available.

 

Intune profiles to add mail to default app and comp portal were installed on all devices and in use for the past 6 mos.  I did not make the users delete the policy and re-enroll.

 

I go to the portal and Enforce MFA on selected users.

 

Users proactively go to https://aka.ms/MFASetup and enroll authenticator with push notification. Setup is successful.

 

Users open mail app on LTE or away from known good IP's and it fails to connect to server. NO popup Approval from Authenticator.

 

Users open outlook app for testing and are prompted for MFA immediately in authenticator.

Robert can provide more information on how you setup conditional access for mfa based on Intune policy compliance? We also had to fall back however our many of our intune clients are getting hung up and need to be re-enrolled.

Thanks

Thank you I will review that.

Robert when you say you fell back what was the mechanism you used? Powershell?

 

Thanks

When I say fell back I mean we reconfigured the conditional access policy via the gui to the previous config.

Got it thanks

I was able to get an in tune deployed iOS mail profile to successfully support Office 365 multi-factor authentication through the built in iOS mail app.  To do so, you must enable oauth within the intune mail profile. Previous commenters have mentioned iOS 12 as a requirement.  The above was tested and successful on iOS 12.1.1 and 12.1.2

Is there a way to enable oauth for Office 365 MDM? My deployment is configured through Office 365 MDM, and I don't see an option to enable oauth.

That is the Intune configuration, which I don't have access to. The Office 365 MDM configuration uses the same back-end infrastructure (and the Intune Company Portal app), but the configuration is done here:

 

https://protection.office.com/?rfr=AdminCenter#/devicev2

 

Has anyone had any success with Office 365 MDM? I still have no way to "enable oauth within the intune mail profile" for this product, so all MFA/Modern Auth users' email profiles deployed to iOS through Office 365 MDM won't connect.

Related Conversations
Tabs and Dark Mode
cjc2112 in Discussions on
35 Replies
Extentions Synchronization
ChirmyRam in Discussions on
3 Replies
flashing a white screen while open new tab
Deleted in Discussions on
14 Replies
Stable version of Edge insider browser
HotCakeX in Discussions on
35 Replies