In today's digital landscape, companies face unprecedented risks from sophisticated threat actors. IT admins play a crucial role in keeping company data secure internally and externally. At the same time, users demand access to sensitive information on their mobile devices while on the go to remain productive. Microsoft Intune has functionality to help administrators create policies to protect company data and its mobile users, while preserving the users’ personal preferences. Microsoft Edge for Business on mobile platforms seamlessly respects Microsoft Entra Conditional Access policies which can be configured to require Intune application protection polices (APP) before mobile users can access corporate data.
Note: For those specifically interested in Windows, please refer to our aka.ms/Intune/APP/Edge-blog for more insights.
What is Microsoft Edge for Business on mobile? Edge for Business delivers fast, secure browser experience, bringing the best of Microsoft to mobile devices. Recognizing the need for workers to access company data from anywhere at any time, Edge for Business enhances security with enterprise sign-in experience, superior protection, and privacy features. It also synchronizes favorites, passwords, and more across both desktop and mobile devices. Furthermore, Edge ensures consistent and reliable experience, designed to safeguard sensitive company information.
Using Intune, IT admins can configure access requirements so that only a policy-managed browser app, like Edge for Business, may access corporate web content. When Intune policy is assigned and users sign into Edge for Business with their corporate credentials, it becomes a policy-managed browser. While signed in, if users don’t have Edge installed, they’ll be prompted to install it on the first access attempt to company web resources. Importantly, while Intune policies may specify company data must be accessed only from the Edge browser, it doesn’t change the user’s preferred default personal browser. Links from company policy-managed apps (e.g. Outlook or Teams) will open in Edge, while links from their personal apps will open in the system default browser. This preserves user preferences and privacy, while allowing the company’s web content to be protected by a policy-managed app.
A mobile device enrolled in Intune for mobile device management (MDM) is referred to as a “managed device” and is helpful for device management and configuration scenarios. For managed devices, IT admins can pre-install Edge for Business without user interaction. Additional options can be configured for user convenience or to align with the company’s data security standards.
Note: If the device isn’t enrolled, Edge can’t be installed silently in the background from Intune.
Users can sign into apps with their company credentials (such as Outlook, Teams, and others) and receive application protection policies (APP) from Intune, making these “managed apps”. Regardless of device enrollment, IT admins can use APP to ensure only the APP-protected browser accesses corporate data.
Let’s examine some of the parts on how this works.
Policy settings which configure the app to allow sign in from only work or school accounts and other app behavior experiences are important for IT admins to be aware of and set configurations in a manner consistent with company policy. Keep in mind the device management type needs to be accounted for when creating an app configuration policy. Additionally, a Microsoft Edge app configuration policy isn’t required to specify that Edge should be used for company web content handling, but some settings are useful when considering your company policies and shaping user experience. App configuration policies can add useful bookmarks in the browser, and establish pre-defined security controls, such as managing which websites allow file uploads.
Review Manage Microsoft Edge on iOS and Android with Intune for in-depth guidance on managing Edge via app configuration policies.
A separate app protection policy is required for each platform as apps and setting availability varies. For the list of settings review: iOS/iPadOS app protection policy settings and Android app protection policy settings. When creating the policy, one thing to keep in mind is that Microsoft Edge IS included when you use the “Target policy to” option and select “All Apps”, “All Microsoft Apps”, or “Core Microsoft Apps”. The included apps list can be viewed by selecting “View a list of apps that will be targeted”.
For either of the mobile platforms, Edge for Business can be configured as the web content handler by configuring the APP setting “Restrict web content transfer with other apps” to Microsoft Edge. Additional app data protection settings can be enabled in the same policy.
Make sure to set configuration options in alignment with your company’s data handling policies. For example, many companies elect to restrict whether files may be saved onto mobile devices as well as setting whether data can be cut/copy/paste outside of managed apps. Since Edge is built to respect app protection policy, and complies with settings you specify, the handling of company data will be consistent across apps receiving the policy. A consistent and predictable experience helps keep users productive.
The next step is to enforce the app protection policy that was created to specify that Edge should handle managed app web content through Microsoft Entra Conditional Access. App protection policies control how data is accessed and shared within the managed app based on the policy settings. However, it doesn’t require users to access company data from only managed apps. Without enforcing which apps may be used to access company data, users could manually type in a URL in a non-managed browser to access company data as long as they could successfully authenticate.
Conditional Access can be set to require that the app being used to access the company data has an app protection policy applied. Make sure that the app protection policy is also assigned to users targeted by this policy, otherwise the criteria for this Conditional Access policy might not be met.
Note: Conditional Access requires that the device be registered in Microsoft Entra, which is done using a broker app. Learn more in Use app-based Conditional Access policies with Intune.
Require app protection policy
To view and edit, Conditional Access policies require a delegated right from Microsoft Entra ID for IT admins. This is a privileged right, granted from Microsoft Entra for select IT admins called “Conditional Access Administrator”.
Whether you’re looking to implement Zero Trust principles or to simply improve your company’s data security posture, ensuring that access to company data is restricted to managed apps on mobile devices is a great step to take as outlined in this blog.
A checklist to ensure you have covered all the key areas:
By implementing Edge for Business on mobile platforms and leveraging Intune's app protection policies enforced by Conditional Access, your organization can significantly increase its data security posture. These measures ensure that corporate data is accessed only through managed apps and browsers, reducing the risk of data breaches and exfiltration. Stay ahead of potential threats and keep your company's sensitive information secure while enabling your employees to remain productive.
We hope you find these experiences useful and easy to set up with Edge and Intune. If you have any questions or feedback, please leave a comment below, or tagging @IntuneSuppTeam on X.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.