Tech Community Live: Endpoint Manager edition
Jul 21 2022, 08:00 AM - 12:00 PM (PDT)

How to restrict Unsupported browser

%3CLINGO-SUB%20id%3D%22lingo-sub-3433563%22%20slang%3D%22en-US%22%3EHow%20to%20restrict%20Unsupported%20browser%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3433563%22%20slang%3D%22en-US%22%3E%3CP%3EHi%2C%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWe%20want%20to%26nbsp%3Bfreeze%20them%20if%20any%20one%20use%20unsupported%20browsers%20on%20mobile%20devices.%20is%20this%20possible%20please%20suggest%20possible%20way%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-3433563%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EIntune%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMobile%20Application%20Management%20(MAM)%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMobile%20Device%20Management%20(MDM)%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3433829%22%20slang%3D%22en-US%22%3ERe%3A%20How%20to%20restrict%20Unsupported%20browser%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3433829%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F1255616%22%20target%3D%22_blank%22%3E%40Andy1192%3C%2FA%3E%26nbsp%3BI'm%20not%20sure%20what%20it%20is%20you%20want%20to%20achieve.%20What%20do%20you%20mean%20with%20%22Freeze%20them%22%3F%20If%20I%20had%20to%20guess%2C%20you%20are%20looking%20for%20a%20solution%20to%20restrict%20web%20content%20transfer%20from%20managed%20apps%20to%20unmanaged%20apps.%20Have%20a%20look%20at%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmem%2Fintune%2Fapps%2Fapp-protection-policy-settings-android%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3EApp%20Protection%20Policies.%26nbsp%3B%3C%2FA%3EThe%20links%20is%20for%20Android%2C%20but%20you%20can%20do%20the%20same%20for%20iOS.%20You%20can%20restrict%20web%20transfers%20to%20Edge%2C%20or%20an%20unmanaged%20browser.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%222022-05-26_16h14_08.jpg%22%20style%3D%22width%3A%20779px%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%222022-05-26_16h14_08.jpg%22%20style%3D%22width%3A%20779px%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%222022-05-26_16h14_08.jpg%22%20style%3D%22width%3A%20779px%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%222022-05-26_16h14_08.jpg%22%20style%3D%22width%3A%20779px%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%222022-05-26_16h14_08.jpg%22%20style%3D%22width%3A%20779px%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%222022-05-26_16h14_08.jpg%22%20style%3D%22width%3A%20779px%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%222022-05-26_16h14_08.jpg%22%20style%3D%22width%3A%20779px%3B%22%3E%3Cspan%20class%3D%22lia-inline-image-display-wrapper%22%20image-alt%3D%222022-05-26_16h14_08.jpg%22%20style%3D%22width%3A%20779px%3B%22%3E%3Cimg%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F375445i4EF2B62085E3B2B4%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%222022-05-26_16h14_08.jpg%22%20alt%3D%222022-05-26_16h14_08.jpg%22%20%2F%3E%3C%2Fspan%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3437206%22%20slang%3D%22en-US%22%3ERe%3A%20How%20to%20restrict%20Unsupported%20browser%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3437206%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F132717%22%20target%3D%22_blank%22%3E%40Oktay%20Sari%3C%2FA%3E%2C%20I%20was%20thinking%20the%20same%20thing.%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F1255616%22%20target%3D%22_blank%22%3E%40Andy1192%3C%2FA%3E%26nbsp%3Bis%20probably%20looking%20for%20app%20protection%2C%20which%20would%20be%20the%20best%20solution.%26nbsp%3BOther%20options%20crossed%20my%20mind%2C%20though.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EFor%20Android%20devices%2C%20you%20can%20block%20undesired%20apps%20completely%2C%26nbsp%3Bby%20assigning%20Managed%20Google%20Play%20app%20as%20%22Uninstall%22.%20That's%20not%20possible%20on%20iOS%2C%20unfortunately.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EFor%20iOS%20devices%20y%3CSPAN%3Eou%20can%20list%20%22restricted%20apps%22%20in%20a%20compliance%20policy%20and%20then%20block%20access%20with%20conditional%20access%20if%20they%20are%20found.%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3437786%22%20slang%3D%22en-US%22%3ERe%3A%20How%20to%20restrict%20Unsupported%20browser%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3437786%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F132717%22%20target%3D%22_blank%22%3E%40Oktay%20Sari%3C%2FA%3E%26nbsp%3BHi%20thank%20you%20so%20much%20for%20your%20response.%20What%20we%20are%20looking%20any%20mobile%20device%20using%20an%20Unsupported%20version%20of%20the%20browser%20on%20a%20mobile%20device%20their%20access%20should%20not%20allow%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3438162%22%20slang%3D%22en-US%22%3ERe%3A%20How%20to%20restrict%20Unsupported%20browser%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3438162%22%20slang%3D%22en-US%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F760368%22%20target%3D%22_blank%22%3E%40Anandkumar%3C%2FA%3E%20you're%20welcome.%20There%20are%20a%20couple%20of%20options%20(not%20many)%20but%20the%20outcome%20depends%20on%20the%20device%20state.%20Some%20options%20will%20only%20work%20if%20the%20device%20is%20managed%20with%20Intune%2C%20others%20will%20also%20work%20for%20unmanaged%20devices.%20What%20is%20your%20scenario%20like%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSTRONG%3EManaged%20devices%3A%3C%2FSTRONG%3E%3C%2FP%3E%3CUL%3E%3CLI%3ELike%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F1258874%22%20target%3D%22_blank%22%3E%40NielsScheffers%3C%2FA%3E%26nbsp%3Bmentioned%2C%20you%20can%20either%20use%20compliance%20policies%20for%20iOS%20or%20for%20Android%20devices%20by%20assigning%20the%20app%20as%20Uninstall.%3C%2FLI%3E%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fconditional-access%2Fconcept-conditional-access-grant%23require-approved-client-app%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3EConditional%20access%20policies%20(with%26nbsp%3BRequire%20approved%20client%20app)%20**%3C%2FA%3E%3C%2FLI%3E%3CLI%3ELike%20I%20mentioned%20before%2C%20with%20an%20App%20protection%20Policies%3C%2FLI%3E%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fdefender-cloud-apps%2Fwhat-is-defender-for-cloud-apps%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FA%3E%20(requires%20extra%20licensing)%3C%2FLI%3E%3C%2FUL%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSTRONG%3EUnmanaged%20devices%3A%3C%2FSTRONG%3E%3C%2FP%3E%3CUL%3E%3CLI%3EMAM%20Policies%20(App%20protection%20Policy)%3C%2FLI%3E%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fconditional-access%2Fconcept-conditional-access-grant%23require-approved-client-app%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3EConditional%20access%20policies%20(with%26nbsp%3BRequire%20approved%20client%20app)%20**%3C%2FA%3E%3C%2FLI%3E%3C%2FUL%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EPlease%20note%3A%20The%3CSTRONG%3E%20CA%20with%20require%20approved%20client%20app%3C%2FSTRONG%3E%20requires%20devices%20to%20be%20registered%20with%20AAD%20and%20a%20broker%20app.%20Furthermore%2C%20this%20method%20not%20only%20blocks%20unsupported%20browsers%2C%20but%20any%20app%20that%20is%20not%20on%20the%20approved%20apps%20list!%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EYou%20can%20also%20configure%20the%20CA%20to%20require%20approved%20apps%2C%20AND%2FOR%20app%20protection%20policy.%20See%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fconditional-access%2Fhowto-policy-approved-app-or-app-protection%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3Ethis%20link%3C%2FA%3E%20for%20more%20info%20on%20that.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EHope%20this%20helps.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3444312%22%20slang%3D%22en-US%22%3ERe%3A%20How%20to%20restrict%20Unsupported%20browser%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3444312%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F1255616%22%20target%3D%22_blank%22%3E%40Andy1192%3C%2FA%3E%2C%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F760368%22%20target%3D%22_blank%22%3E%40Anandkumar%3C%2FA%3E%26nbsp%3Bdid%20this%20help%3F%20If%20so%20would%20you%20be%20so%20kind%20to%20mark%20it%20as%20completed%3F%20If%20not%2C%20please%20let%20us%20know%20what%20your%20scenario%20is%20like%20and%20perhaps%20we%20can%20help%20you%20get%20going.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThx!%20Oktay%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E
Occasional Contributor

Hi,

 

We want to freeze them if any one use unsupported browsers on mobile devices. is this possible please suggest possible way?

5 Replies

@Andy1192 I'm not sure what it is you want to achieve. What do you mean with "Freeze them"? If I had to guess, you are looking for a solution to restrict web content transfer from managed apps to unmanaged apps. Have a look at App Protection Policies. The links is for Android, but you can do the same for iOS. You can restrict web transfers to Edge, or an unmanaged browser.

 

2022-05-26_16h14_08.jpg

 

@Oktay Sari, I was thinking the same thing. @Andy1192 is probably looking for app protection, which would be the best solution. Other options crossed my mind, though. 

 

For Android devices, you can block undesired apps completely, by assigning Managed Google Play app as "Uninstall". That's not possible on iOS, unfortunately.

 

For iOS devices you can list "restricted apps" in a compliance policy and then block access with conditional access if they are found.

@Oktay Sari Hi thank you so much for your response. What we are looking any mobile device using an Unsupported version of the browser on a mobile device their access should not allow 

 

Hi @Anandkumar you're welcome. There are a couple of options (not many) but the outcome depends on the device state. Some options will only work if the device is managed with Intune, others will also work for unmanaged devices. What is your scenario like?

 

Managed devices:

 

Unmanaged devices:

 

Please note: The CA with require approved client app requires devices to be registered with AAD and a broker app. Furthermore, this method not only blocks unsupported browsers, but any app that is not on the approved apps list!

 

You can also configure the CA to require approved apps, AND/OR app protection policy. See this link for more info on that.

 

Hope this helps.

@Andy1192@Anandkumar did this help? If so would you be so kind to mark it as completed? If not, please let us know what your scenario is like and perhaps we can help you get going.

 

Thx! Oktay