Edge for iOS and Android supports app configuration policies for the following data protection settings when the app is managed by Microsoft Endpoint Manager with an Intune App Protection Policy applied to the work or school account that is signed into the app and the policy settings are delivered only through a managed apps App Configuration. Microsoft Edge is a free browser app available to download on your Android device. Easily sync your passwords, favorites, Collections, and other saved data across your signed-in devices in the browser app. Microsoft Edge is available to download on your Android device. Easily sync your passwords, favorites, Collections, and other saved data across your signed-in devices.
Microsoft Edge is a new Internet browser that aims to unify the browsing experience for Android and Windows 10 users.
As most users already know, Microsoft Edge is an Internet browser developed for Windows 10. The company is now also making it available for Android as well to take advantage of the Windows 10 integration with the mobile operating system.
Just like its desktop counterpart, the mobile version of Microsoft Edge allows users to synchronize data across platforms. Users can choose to continue their work or browsing experience on Windows 10 when the two platforms have been paired.
Other features included in Microsoft Edge for Android consists of the hub view, with all the favorites, history, and books under the same roof, a QR code reader, and even voice search. Of course, a private mode is available as well that doesn’t save any kind of data on the device.
For more information on downloading Microsoft Edge to your phone, check out our guide: how to install APK files.Features:
- Continue to browse from Android on Windows 10
- Use the Hub View for an integrated experience
- InPrivate mode ensures nothing is save on the mobile device
- A handy QR code reader is available as well
Microsoft Edge APK versions (193):
- Microsoft Edge 46.03.24.51552021-04-02
- Microsoft Edge 46.02.4.51472021-03-19
- Microsoft Edge 46.02.2.51472021-03-19
- Microsoft Edge 46.02.4.51452021-03-08
- Microsoft Edge 46.02.2.51452021-03-08
- + 188 more versions available
All Microsoft Edge versions:
- Microsoft Edge 46.03.24.51552021-04-02
- Microsoft Edge 46.02.4.51472021-03-19
- Microsoft Edge 46.02.2.51472021-03-19
- Microsoft Edge 46.02.4.51452021-03-08
- Microsoft Edge 46.02.2.51452021-03-08
- Microsoft Edge 46.01.22.5139 Beta2021-02-05
- Microsoft Edge 46.01.24.5139 Beta2021-02-05
- Microsoft Edge 45.12.2.51372021-02-05
- Microsoft Edge 45.12.4.51372021-02-05
- Microsoft Edge 45.12.24.5135 Beta2021-01-29
- Microsoft Edge 45.12.4.51252021-01-29
- Microsoft Edge 45.12.2.51252021-01-29
- Microsoft Edge 45.12.22.5125 Beta2021-01-21
- Microsoft Edge 45.12.24.5125 Beta2021-01-21
- Microsoft Edge 45.12.4.51212020-12-29
- Microsoft Edge 45.12.2.51212020-12-29
- Microsoft Edge 45.11.2.51182020-12-29
- Microsoft Edge 45.11.4.51182020-12-29
- Microsoft Edge 45.11.24.5118 Beta2020-12-15
- Microsoft Edge 45.11.4.51162020-12-08
- Microsoft Edge 45.11.2.51162020-12-08
- Microsoft Edge 45.11.24.5104 Beta2020-12-01
- Microsoft Edge 45.11.4.51042020-12-01
- Microsoft Edge 45.11.2.51042020-12-01
- Microsoft Edge 45.11.24.5102 Beta2020-12-01
- Microsoft Edge 45.11.4.51012020-11-24
- Microsoft Edge 45.11.2.51012020-11-24
- Microsoft Edge 45.11.4.50992020-11-24
- Microsoft Edge 45.11.24.5097 Beta2020-11-20
- Microsoft Edge 45.10.4.50882020-11-20
- Microsoft Edge 45.10.2.50882020-11-20
- Microsoft Edge 45.09.2.50832020-10-27
- Microsoft Edge 45.09.4.50832020-10-27
- Microsoft Edge 45.09.2.50812020-10-22
- Microsoft Edge 45.09.4.50782020-10-09
- Microsoft Edge 45.09.2.50782020-10-09
- Microsoft Edge 45.08.2.50742020-10-09
- Microsoft Edge 45.09.22.5078 Beta2020-10-09
- Microsoft Edge 45.08.4.50742020-10-09
- Microsoft Edge 45.09.24.5078 Beta2020-09-30
- Microsoft Edge 45.09.24.5074 Beta2020-09-30
- Microsoft Edge 45.08.4.50722020-09-22
- Microsoft Edge 45.08.2.50712020-09-18
- Microsoft Edge 45.08.4.50712020-09-18
- Microsoft Edge 45.07.4.50592020-09-10
- Microsoft Edge 45.07.2.50572020-08-25
- Microsoft Edge 45.07.4.50572020-08-25
- Microsoft Edge 45.07.2.50542020-08-17
- Microsoft Edge 45.07.4.50542020-08-17
- Microsoft Edge 45.06.2.50432020-08-17
- Microsoft Edge 45.06.4.50432020-08-17
- Microsoft Edge 45.06.2.50422020-07-21
- Microsoft Edge 45.06.4.50422020-07-21
- Microsoft Edge 45.06.24.5043 Beta2020-07-21
- Microsoft Edge 45.06.22.5042 Beta2020-07-17
- Microsoft Edge 45.06.24.5042 beta2020-07-17
- Microsoft Edge 45.05.4.50362020-06-25
- Microsoft Edge 45.05.2.50362020-06-25
- Microsoft Edge 45.05.22.5036 Beta2020-06-25
- Microsoft Edge 45.05.24.5036 beta2020-06-25
- Microsoft Edge 45.05.24.5026 Beta2020-06-19
- Microsoft Edge 45.05.22.5026 Beta2020-06-19
- Microsoft Edge 45.05.4.50262020-06-19
- Microsoft Edge 45.05.2.50262020-06-19
- Microsoft Edge 45.05.24.5025 Beta2020-06-15
- Microsoft Edge 45.05.24.5024 Beta2020-06-15
- Microsoft Edge 45.04.4.49952020-06-09
- Microsoft Edge 45.04.2.49952020-06-09
- Microsoft Edge 45.04.22.4995 Beta2020-06-09
- Microsoft Edge 45.04.24.4994 Beta2020-05-22
- Microsoft Edge 45.03.4.49582020-05-19
- Microsoft Edge 45.03.22.4955 Beta2020-04-27
- Microsoft Edge 45.03.4.49552020-04-27
- Microsoft Edge 45.03.2.49552020-04-27
- Microsoft Edge 45.03.24.4955 Beta2020-04-23
- Microsoft Edge 45.03.4.4944 Beta2020-04-23
- Microsoft Edge 45.02.4.49312020-04-06
- Microsoft Edge 45.02.2.49312020-04-06
- Microsoft Edge 45.02.4.49302020-04-02
- Microsoft Edge 45.02.2.49262020-03-31
- Microsoft Edge 45.02.4.49262020-03-26
- Microsoft Edge 45.01.4.49202020-03-13
- Microsoft Edge 45.01.2.49202020-03-13
- Microsoft Edge 45.01.24.4920 Beta2020-03-10
- Microsoft Edge 45.01.2.49002020-03-10
- Microsoft Edge 45.01.4.49002020-02-27
- Microsoft Edge 44.11.4.41402020-02-26
- Microsoft Edge 44.11.2.41402020-02-03
- Microsoft Edge 44.11.4.41222020-01-24
- Microsoft Edge 44.11.4.41212020-01-07
- Microsoft Edge 44.11.24.4121 Beta2020-01-03
- Microsoft Edge 42.0.4.40622019-12-27
- Microsoft Edge 42.0.2.40622019-12-24
- Microsoft Edge 42.0.4.40572019-12-09
- Microsoft Edge 42.0.4.40522019-11-26
- Microsoft Edge 42.0.24.4052 Beta2019-11-25
- Microsoft Edge 42.0.4.40482019-11-21
- Microsoft Edge 42.0.2.40482019-11-21
- Microsoft Edge 42.0.4.39892019-11-11
- Microsoft Edge 42.0.24.3989 Beta2019-11-05
- Microsoft Edge 42.0.4.39852019-11-05
- Microsoft Edge 42.0.22.3985 Beta2019-10-22
- Microsoft Edge 42.0.4.39312019-10-16
- Microsoft Edge 42.0.4.39282019-09-16
- Microsoft Edge 42.0.2.38922019-08-25
- Microsoft Edge 42.0.24.38892019-08-19
- Microsoft Edge 42.0.2.38192019-08-06
- Microsoft Edge 42.0.2.38182019-07-31
- Microsoft Edge 42.0.22.3818 Beta2019-07-28
- Microsoft Edge 42.0.2.38112019-07-12
- Microsoft Edge 42.0.2.38102019-07-12
- Microsoft Edge 42.0.2.37732019-07-12
- Microsoft Edge 42.0.2.37682019-07-12
- Microsoft Edge 42.0.22.3768 Beta2019-06-12
- Microsoft Edge 42.0.2.37372019-06-11
- Microsoft Edge 42.0.22.3737 Beta2019-06-10
- Microsoft Edge 42.0.22.3733 Beta2019-06-10
- Microsoft Edge 42.0.22.3728 Beta2019-06-10
- Microsoft Edge 42.0.2.37282019-06-02
- Microsoft Edge 42.0.2.37272019-05-28
- Microsoft Edge 42.0.22.3727 Beta2019-05-27
- Microsoft Edge 42.0.2.37262019-05-27
- Microsoft Edge 42.0.2.34382019-05-15
- Microsoft Edge 42.0.22.3438 Beta2019-05-09
- Microsoft Edge 42.0.2.34282019-05-07
- Microsoft Edge 42.0.2.34262019-05-01
- Microsoft Edge 42.0.22.3418 Beta2019-04-23
- Microsoft Edge 42.0.22.3368 Beta2019-04-23
- Microsoft Edge 42.0.2.33672019-04-09
- Microsoft Edge 42.0.22.3367 Beta2019-04-09
- Microsoft Edge 42.0.22.3363 Beta2019-03-25
- Microsoft Edge 42.0.2.33632019-03-25
- Microsoft Edge 42.0.22.3362 Beta2019-03-19
- Microsoft Edge 42.0.2.33622019-03-19
- Microsoft Edge 42.0.22.3350 Beta2019-03-19
- Microsoft Edge 42.0.2.33502019-03-01
- Microsoft Edge 42.0.22.3349 Beta2019-02-28
- Microsoft Edge 42.0.22.3347 Beta2019-02-28
- Microsoft Edge 42.0.2.33332019-02-22
- Microsoft Edge 42.0.22.3333 Beta2019-02-19
- Microsoft Edge 42.0.2.33302019-02-05
- Microsoft Edge 42.0.22.3322 Beta2019-01-30
- Microsoft Edge 42.0.22.3318 Beta2019-01-30
- Microsoft Edge 42.0.22.3308 Beta2019-01-23
- Microsoft Edge 42.0.2.28642019-01-21
- Microsoft Edge 42.0.22.2864 Beta2019-01-11
- Microsoft Edge 42.0.22.2862 Beta2019-01-10
- Microsoft Edge 42.0.0.28512019-01-09
- Microsoft Edge 42.0.0.28372018-12-19
- Microsoft Edge 42.0.0.2848 beta2018-12-18
- Microsoft Edge 42.0.0.2838 beta2018-12-18
- Microsoft Edge 42.0.0.2835 beta2018-12-18
- Microsoft Edge 42.0.0.28042018-12-03
- Microsoft Edge 42.0.0.28012018-11-23
- Microsoft Edge 42.0.0.2790 Beta2018-11-13
- Microsoft Edge 42.0.0.27412018-10-22
- Microsoft Edge 42.0.0.2736 Beta2018-10-16
- Microsoft Edge 42.0.0.2733 Beta2018-10-16
- Microsoft Edge 42.0.0.2729 Beta2018-10-16
- Microsoft Edge 42.0.0.25492018-10-01
- Microsoft Edge 42.0.0.25292018-09-24
- Microsoft Edge 42.0.0.25282018-09-24
- Microsoft Edge 42.0.0.25262018-09-24
- Microsoft Edge 42.0.0.25192018-09-24
- Microsoft Edge 42.0.0.23142018-09-10
- Microsoft Edge 42.0.0.23132018-09-07
- Microsoft Edge 42.0.0.22332018-08-07
- Microsoft Edge 42.0.0.20592018-07-16
- Microsoft Edge 42.0.0.2222 Beta2018-07-12
- Microsoft Edge 42.0.0.20572018-06-28
- Microsoft Edge 42.0.0.20532018-06-18
- Microsoft Edge 42.0.0.20332018-06-06
- Microsoft Edge 42.0.0.2028 Beta2018-05-23
- Microsoft Edge 42.0.0.2025 Beta2018-05-20
- Microsoft Edge 1.0.0.19212018-04-27
- Microsoft Edge 1.0.0.1920 Beta2018-04-24
- Microsoft Edge 1.0.0.1919 Beta2018-04-24
- Microsoft Edge 1.0.0.1916 Beta2018-04-24
- Microsoft Edge 1.0.0.17262018-03-30
- Microsoft Edge 1.0.0.1722 Beta2018-03-19
- Microsoft Edge 1.0.0.16622018-03-19
- Microsoft Edge 1.0.0.1661 Beta2018-03-08
- Microsoft Edge 1.0.0.16562018-02-22
- Microsoft Edge 1.0.0.15632018-02-04
- Microsoft Edge 1.0.0.15612018-01-25
- Microsoft Edge 1.0.0.1561 Beta2018-01-18
- Microsoft Edge 1.0.0.1552 Beta2018-01-15
- Microsoft Edge 1.0.0.12732017-12-27
- Microsoft Edge 1.0.0.12722017-12-19
- Microsoft Edge 1.0.0.12702017-12-05
- Microsoft Edge 1.0.0.1269 Beta2017-12-01
- Microsoft Edge 1.0.0.1265 Beta2017-11-29
- Microsoft Edge 1.0.0.1001 Beta2017-10-12
- Thanks for using Microsoft Edge! Here’s what’s new in this release:
- Try Collections! Easily collect and organize content as you browse the web -- with any of your signed-in devices.
- We’ve also made some general bug fixes and performance improvements.
current version:
Microsoft Edge 46.03.24.5155+ 192 more available- PACKAGE NAME:
- com.microsoft.emmx
- developer:
Edge for iOS and Android is designed to enable users to browse the web and supports multi-identity. Users can add a work account, as well as a personal account, for browsing. There is complete separation between the two identities, which is like what is offered in other Microsoft mobile apps.
This feature applies to:
- iOS 12.0 and newer
- Android 5.0 and newer
Note
Edge for iOS and Android doesn't consume settings that users set for the native browser on their devices, because Edge for iOS and Android can't access these settings.
The richest and broadest protection capabilities for Microsoft 365 data are available when you subscribe to the Enterprise Mobility + Security suite, which includes Microsoft Intune and Azure Active Directory Premium features, such as conditional access. At a minimum, you will want to deploy a conditional access policy that only allows connectivity to Edge for iOS and Android from mobile devices and an Intune app protection policy that ensures the browsing experience is protected.
Note
New web clips (pinned web apps) on iOS devices will open in Edge for iOS and Android instead of the Intune Managed Browser when required to open in a protected browser. For older iOS web clips, you must re-target these web clips to ensure they open in Edge for iOS and Android rather than the Managed Browser.
Apply Conditional Access
Organizations can use Azure AD Conditional Access policies to ensure that users can only access work or school content using Edge for iOS and Android. To do this, you will need a conditional access policy that targets all potential users. Details on creating this policy can be found in Require app protection policy for cloud app access with Conditional Access.
Follow Scenario 2: Browser apps require approved apps with app protection policies, which allows Edge for iOS and Android, but blocks other mobile device web browsers from connecting to Office 365 endpoints.
Note
This policy ensures mobile users can access all Microsoft 365 endpoints from within Edge for iOS and Android. This policy also prevents users from using InPrivate to access Microsoft 365 endpoints.
With Conditional Access, you can also target on-premises sites that you have exposed to external users via the Azure AD Application Proxy.
Create Intune app protection policies
App Protection Policies (APP) define which apps are allowed and the actions they can take with your organization's data. The choices available in APP enable organizations to tailor the protection to their specific needs. For some, it may not be obvious which policy settings are required to implement a complete scenario. To help organizations prioritize mobile client endpoint hardening, Microsoft has introduced taxonomy for its APP data protection framework for iOS and Android mobile app management.
The APP data protection framework is organized into three distinct configuration levels, with each level building off the previous level:
- Enterprise basic data protection (Level 1) ensures that apps are protected with a PIN and encrypted and performs selective wipe operations. For Android devices, this level validates Android device attestation. This is an entry level configuration that provides similar data protection control in Exchange Online mailbox policies and introduces IT and the user population to APP.
- Enterprise enhanced data protection (Level 2) introduces APP data leakage prevention mechanisms and minimum OS requirements. This is the configuration that is applicable to most mobile users accessing work or school data.
- Enterprise high data protection (Level 3) introduces advanced data protection mechanisms, enhanced PIN configuration, and APP Mobile Threat Defense. This configuration is desirable for users that are accessing high risk data.
To see the specific recommendations for each configuration level and the minimum apps that must be protected, review Data protection framework using app protection policies.
Regardless of whether the device is enrolled in an unified endpoint management (UEM) solution, an Intune app protection policy needs to be created for both iOS and Android apps, using the steps in How to create and assign app protection policies. These policies, at a minimum, must meet the following conditions:
They include all Microsoft 365 mobile applications, such as Edge, Outlook, OneDrive, Office, or Teams, as this ensures that users can access and manipulate work or school data within any Microsoft app in a secure fashion.
They are assigned to all users. This ensures that all users are protected, regardless of whether they use Edge for iOS or Android.
Determine which framework level meets your requirements. Most organizations should implement the settings defined in Enterprise enhanced data protection (Level 2) as that enables data protection and access requirements controls.
For more information on the available settings, see Android app protection policy settings and iOS app protection policy settings.
Important
To apply Intune app protection policies against apps on Android devices that are not enrolled in Intune, the user must also install the Intune Company Portal. For more information, see What to expect when your Android app is managed by app protection policies.
Single sign-on to Azure AD-connected web apps in policy-protected browsers
Edge for iOS and Android can take advantage of single sign-on (SSO) to all web apps (SaaS and on-premises) that are Azure AD-connected. SSO allows users to access Azure AD-connected web apps through Edge for iOS and Android, without having to re-enter their credentials.
SSO requires your device to be registered by either the Microsoft Authenticator app for iOS devices, or the Intune Company Portal on Android. When users have either of these, they are prompted to register their device when they go to an Azure AD-connected web app in a policy-protected browser (this is only true if their device hasn't already been registered). After the device is registered with the user's account managed by Intune, that account has SSO enabled for Azure AD-connected web apps.
Note
Device registration is a simple check-in with the Azure AD service. It doesn't require full device enrollment, and doesn't give IT any additional privileges on the device.
Utilize app configuration to manage the browsing experience
Edge for iOS and Android supports app settings that allow unified endpoint management, like Microsoft Endpoint Manager, administrators to customize the behavior of the app.
App configuration can be delivered either through the mobile device management (MDM) OS channel on enrolled devices (Managed App Configuration channel for iOS or the Android in the Enterprise channel for Android) or through the Intune App Protection Policy (APP) channel. Edge for iOS and Android supports the following configuration scenarios:
- Only allow work or school accounts
- General app configuration settings
- Data protection settings
Important
For configuration scenarios that require device enrollment on Android, the devices must be enrolled in Android Enterprise and Edge for Android must be deployed via the Managed Google Play store. For more information, see Set up enrollment of Android Enterprise personally-owned work profile devices and Add app configuration policies for managed Android Enterprise devices.
Each configuration scenario highlights its specific requirements. For example, whether the configuration scenario requires device enrollment, and thus works with any UEM provider, or requires Intune App Protection Policies.
Important
App configuration keys are case sensitive. Use the proper casing to ensure the configuration takes affect.
Note
With Microsoft Endpoint Manager, app configuration delivered through the MDM OS channel is referred to as a Managed Devices App Configuration Policy (ACP); app configuration delivered through the App Protection Policy channel is referred to as a Managed Apps App Configuration Policy.
Only allow work or school accounts
Respecting the data security and compliance policies of our largest and highly regulated customers is a key pillar to the Microsoft 365 value. Some companies have a requirement to capture all communications information within their corporate environment, as well as, ensure the devices are only used for corporate communications. To support these requirements, Edge for iOS and Android on enrolled devices can be configured to only allow a single corporate account to be provisioned within the app.
You can learn more about configuring the org allowed accounts mode setting here:
This configuration scenario only works with enrolled devices. However, any UEM provider is supported. If you are not using Microsoft Endpoint Manager, you need to consult with your UEM documentation on how to deploy these configuration keys.
General app configuration scenarios
Edge for iOS and Android offers administrators the ability to customize the default configuration for several in-app settings. This capability is currently only offered when Edge for iOS and Android has an Intune App Protection Policy applied to the work or school account that is signed into the app and the policy settings are delivered only through a managed apps App Configuration Policy.
Important
Edge for Android does not support Chromium settings that are available in Managed Google Play.
Microsoft Edge On Android Phone
Edge supports the following settings for configuration:
- New Tab Page experiences
- Bookmark experiences
- App behavior experiences
- Kiosk mode experiences
These settings can be deployed to the app regardless of device enrollment status.
New Tab Page experiences
When you sign in into Edge for iOS and Android, opening a new tab page delivers the familiar productivity content and new pivots that organize news feeds relevant to your organization's industry and interests in one view. The New Tab Page experience provides links for your organization's home page, top sites, and industry news.
Edge for iOS and Android offers organizations several options for adjusting the New Tab Page experience.
Organization logo and brand color
These settings allow you to customize the New Tab Page for Edge for iOS and Android to display your organization's logo and brand color as the page background.
To upload your organization's logo and color, first complete the following steps:
- Within Microsoft Endpoint Manager, navigate to Tenant Administration > Customization. Next to Settings, click Edit.
- To set your brand's logo, next to Show in header, choose 'Organization logo only'. Transparent background logos are recommended.
- To set your brand's background color, select a Theme color. Edge for iOS and Android applies a lighter shade of the color on the New Tab Page, which ensures the page has high readability.
Next, utilize the following key/value pairs to pull your organization's branding into Edge for iOS and Android:
Key | Value |
---|---|
com.microsoft.intune.mam.managedbrowser.NewTabPage.BrandLogo | true shows organization's brand logo false (default) will not expose a logo |
com.microsoft.intune.mam.managedbrowser.NewTabPage.BrandColor | true shows organization's brand color false (default) will not expose a color |
Homepage shortcut
This setting allows you to configure a homepage shortcut for Edge for iOS and Android in the New Tab Page. The homepage shortcut you configure appears as the first icon beneath the search bar when the user opens a new tab in Edge for iOS and Android. The user can't edit or delete this shortcut in their managed context. The homepage shortcut displays your organization's name to distinguish it.
Key | Value |
---|---|
com.microsoft.intune.mam.managedbrowser.homepage | Specify a valid URL. Incorrect URLs are blocked as a security measure. For example: https://www.bing.com |
Multiple top site shortcuts
Similarly to configuring a homepage shortcut, you can configure multiple top site shortcuts on New Tab Pages in Edge for iOS and Android. The user can't edit or delete these shortcuts in a managed context. Note: you can configure a total of 8 shortcuts, including a homepage shortcut. If you have configured a homepage shortcut, that will override the first top site configured.
Key | Value |
---|---|
com.microsoft.intune.mam.managedbrowser.managedTopSites | Specify set of value URLs. Each top site shortcut consists of a title and URL. Separate the title and URL with the | character.For example: GitHub|https://github.com/||LinkedIn|https://www.linkedin.com |
Industry news
You can configure the New Tab Page experience within Edge for iOS and Android to display industry news that is relevant to your organization. When you enable this feature, Edge for iOS and Android uses your organization's domain name to aggregate news from the web about your organization, organization's industry, and competitors, so your users can find relevant external news all from the centralized new tab pages within Edge for iOS and Android. Industry News is off by default.
Key | Value |
---|---|
com.microsoft.intune.mam.managedbrowser.NewTabPage.IndustryNews | true shows Industry News on the New Tab Page false (default) hides Industry News from the New Tab Page |
Homepage instead of New Tab Page experience
Edge for iOS and Android allows organizations to disable the New Tab Page experience and instead have a web site launch when the user opens a new tab. While this is a supported scenario, Microsoft recommends organizations take advantage of the New Tab Page experience to provide dynamic content that is relevant to the user.
Key | Value |
---|---|
com.microsoft.intune.mam.managedbrowser.NewTabPage.CustomURL | Specify a valid URL. If no URL is specified, the app utilizes the New Tab Page experience. Incorrect URLs are blocked as a security measure. For example: https://www.bing.com |
Bookmark experiences
Edge for iOS and Android offers organizations several options for managing bookmarks.
Managed bookmarks
For ease of access, you can configure bookmarks that you'd like your users to have available when they are using Edge for iOS and Android.
- Bookmarks only appear in the work or school account and are not exposed to personal accounts.
- Bookmarks can't be deleted or modified by users.
- Bookmarks appear at the top of the list. Any bookmarks that users create appear below these bookmarks.
- If you have enabled Application Proxy redirection, you can add Application Proxy web apps by using either their internal or external URL.
- Ensure that you prefix all URLs with http:// or https:// when entering them into the list.
- Bookmarks are created in a folder named after the organization's name which is defined in Azure Active Directory.
Key | Value |
---|---|
com.microsoft.intune.mam.managedbrowser.bookmarks | The value for this configuration is a list of bookmarks. Each bookmark consists of the bookmark title and the bookmark URL. Separate the title and URL with the | character.For example: Microsoft Bing|https://www.bing.com To configure multiple bookmarks, separate each pair with the double character |
My Apps bookmark
By default, users have the My Apps bookmark configured within the organization folder inside Edge for iOS and Android.
Key | Value |
---|---|
com.microsoft.intune.mam.managedbrowser.MyApps | true (default) shows My Apps within the Edge for iOS and Android bookmarks false hides My Apps within Edge for iOS and Android |
App behavior experiences
Edge for iOS and Android offers organizations several options for managing the app's behavior.
Default protocol handler
By default, Edge for iOS and Android uses the HTTPS protocol handler when the user doesn't specify the protocol in the URL. Generally, this is considered a best practice, but can be disabled.
Key | Value |
---|---|
com.microsoft.intune.mam.managedbrowser.defaultHTTPS | true (default) default protocol handler is HTTPS false default protocol handler is HTTP |
Disable data sharing for personalization
By default, Edge for iOS and Android prompts users for usage data collection and sharing browsing history to personalize their browsing experience. Organizations can disable this data sharing by preventing this prompt from being shown to end users.
Key | Value |
---|---|
com.microsoft.intune.mam.managedbrowser.disableShareUsageData | true disables this prompt from displaying to end users false (default) users are prompted to share usage data |
com.microsoft.intune.mam.managedbrowser.disableShareBrowsingHistory | true disables this prompt from displaying to end users false (default) users are prompted to share browsing history |
Disable specific features
How To Get Microsoft Edge On Android
Edge for iOS and Android allows organizations to disable certain features that are enabled by default. To disable these features, configure the following setting:
Key | Value |
---|---|
com.microsoft.intune.mam.managedbrowser.disabledFeatures | password disables prompts that offer to save passwords for the end user inprivate disables InPrivate browsing To disable multiple features, separate values with |
Note
Edge for Android does not support disabling the password manager.
Disable extensions
You can disable the extension framework, like Coupons, within Edge for iOS and Android to prevent users from installing or using any pre-configured app extensions. To do this, configure the following setting:
Key | Value |
---|---|
com.microsoft.intune.mam.managedbrowser.disableExtensionFramework | true disables the extension framework false (default) enables the extension framework |
Note
Edge for iOS does not support disabling extensions.
Kiosk mode experiences on Android devices
Edge for Android can be enabled as a kiosk app with the following settings:
Key | Value |
---|---|
com.microsoft.intune.mam.managedbrowser.enableKioskMode | true enables kiosk mode for Edge for Android false (default) disables kiosk mode |
com.microsoft.intune.mam.managedbrowser.showAddressBarInKioskMode | true shows the address bar in kiosk mode false (default) hides the address bar when kiosk mode is enabled |
com.microsoft.intune.mam.managedbrowser.showBottomBarInKioskMode | true shows the bottom action bar in kiosk mode false (default) hides the bottom bar when kiosk mode is enabled |
Data protection app configuration scenarios
Edge for iOS and Android supports app configuration policies for the following data protection settings when the app is managed by Microsoft Endpoint Manager with an Intune App Protection Policy applied to the work or school account that is signed into the app and the policy settings are delivered only through a managed apps App Configuration Policy:
- Manage account synchronization
- Manage restricted web sites
- Manage proxy configuration
- Manage NTLM single sign-on sites
These settings can be deployed to the app regardless of device enrollment status.
Manage account synchronization
By default, Microsoft Edge sync enables users to access their browsing data across all their signed-in devices. The data supported by sync includes:
- Favorites
- Passwords
- Addresses and more (autofill form entry)
Sync functionality is enabled via user consent and users can turn sync on or off for each of the data types listed above. For more information see Microsoft Edge Sync.
Organizations have the capability to disable Edge sync on iOS and Android.
Key | Value |
---|---|
com.microsoft.intune.mam.managedbrowser.account.syncDisabled | true (default) disables Edge sync false allows Edge sync |
Manage restricted web sites
Organizations can define which sites users can access within the work or school account context in Edge for iOS and Android. If you use an allow list, your users are only able to access the sites explicitly listed. If you use a blocked list, users can access all sites except for those explicitly blocked. You should only impose either an allowed or a blocked list, not both. If you impose both, only the allowed list is honored.
Organization also define what happens when a user attempts to navigate to a restricted web site. By default, transitions are allowed. If the organization allows it, restricted web sites can be opened in the personal account context, the Azure AD account’s InPrivate context, or whether the site is blocked entirely. For more information on the various scenarios that are supported, see Restricted website transitions in Microsoft Edge mobile. By allowing transitioning experiences, the organization's users stay protected, while keeping corporate resources safe.
Note
Edge for iOS and Android can block access to sites only when they are accessed directly. It doesn't block access when users use intermediate services (such as a translation service) to access the site.
Use the following key/value pairs to configure either an allowed or blocked site list for Edge for iOS and Android.
Key | Value |
---|---|
com.microsoft.intune.mam.managedbrowser.AllowListURLs | The corresponding value for the key is a list of URLs. You enter all the URLs you want to allow as a single value, separated by a pipe | character.Examples: |
com.microsoft.intune.mam.managedbrowser.BlockListURLs | The corresponding value for the key is a list of URLs. You enter all the URLs you want to block as a single value, separated by a pipe | character.Examples: URL1|URL2|URL3 http://www.contoso.com/|https://www.bing.com/|https://expenses.contoso.com |
com.microsoft.intune.mam.managedbrowser.AllowTransitionOnBlock | true (default) allows Edge for iOS and Android to transition restricted sites. When personal accounts are not disabled, users are prompted to either switch to the personal context to open the restricted site, or to add a personal account. If com.microsoft.intune.mam.managedbrowser.openInPrivateIfBlocked is set to true, users have the capability of opening the restricted site in the InPrivate context. false prevents Edge for iOS and Android from transitioning users. Users are simply shown a message stating that the site they are trying to access is blocked. |
com.microsoft.intune.mam.managedbrowser.openInPrivateIfBlocked | true allows restricted sites to be opened in the Azure AD account's InPrivate context. If the Azure AD account is the only account configured in Edge for iOS and Android, the restricted site is opened automatically in the InPrivate context. If the user has a personal account configured, the user is prompted to choose between opening InPrivate or switch to the personal account. false (default) requires the restricted site to be opened in the user's personal account. If personal accounts are disabled, then the site is blocked. In order for this setting to take effect, com.microsoft.intune.mam.managedbrowser.AllowTransitionOnBlock must be set to true. |
com.microsoft.intune.mam.managedbrowser.durationOfOpenInPrivateSnackBar | Enter the number of seconds that users will see the snack bar notification 'Link opened with InPrivate mode. Your organization requires the use of InPrivate mode for this content.' By default, the snack bar notification is shown for 7 seconds. |
The following sites are always allowed regardless of the defined allow list or block list settings:
https://*.microsoft.com/*
http://*.microsoft.com/*
https://microsoft.com/*
http://microsoft.com/*
https://*.windowsazure.com/*
https://*.microsoftonline.com/*
https://*.microsoftonline-p.com/*
URL formats for allowed and blocked site list
You can use various URL formats to build your allowed/blocked sites lists. These permitted patterns are detailed in the following table.
Ensure that you prefix all URLs with http:// or https:// when entering them into the list.
You can use the wildcard symbol (*) according to the rules in the following permitted patterns list.
A wildcard can only match a portion (e.g.,
news-contoso.com
) or entire component of the hostname (e.g.,host.contoso.com
) or entire parts of the path when separated by forward slashes (www.contoso.com/images
).You can specify port numbers in the address. If you do not specify a port number, the values used are:
- Port 80 for http
- Port 443 for https
Using wildcards for the port number is not supported. For example,
http://www.contoso.com:*
andhttp://www.contoso.com:*/
are not supported.URL Details Matches Does not match http://www.contoso.com
Matches a single page www.contoso.com
host.contoso.com
www.contoso.com/images
contoso.com/
http://contoso.com
Matches a single page contoso.com/
host.contoso.com
www.contoso.com/images
www.contoso.com
http://www.contoso.com/*
Matches all URLs that begin with www.contoso.com
www.contoso.com
www.contoso.com/images
www.contoso.com/videos/tvshows
host.contoso.com
host.contoso.com/images
http://*.contoso.com/*
Matches all subdomains under contoso.com
developer.contoso.com/resources
news.contoso.com/images
news.contoso.com/videos
contoso.host.com
news-contoso.com
http://*contoso.com/*
Matches all subdomains ending with contoso.com/
news-contoso.com
news-contoso.com.com/daily
news-contoso.host.com
news.contoso.com
http://www.contoso.com/images
Matches a single folder www.contoso.com/images
www.contoso.com/images/dogs
http://www.contoso.com:80
Matches a single page, by using a port number www.contoso.com:80
https://www.contoso.com
Matches a single, secure page www.contoso.com
www.contoso.com
http://www.contoso.com/images/*
Matches a single folder and all subfolders www.contoso.com/images/dogs
www.contoso.com/images/cats
www.contoso.com/videos
The following are examples of some of the inputs that you can't specify:
*.com
*.contoso/*
www.contoso.com/*images
www.contoso.com/*images*pigs
www.contoso.com/page*
- IP addresses
https://*
http://*
http://www.contoso.com:*
http://www.contoso.com: /*
Manage proxy configuration
You can use Edge for iOS and Android and Azure AD Application Proxy together to give users access to intranet sites on their mobile devices. For example:
- A user is using the Outlook mobile app, which is protected by Intune. They then click a link to an intranet site in an email, and Edge for iOS and Android recognizes that this intranet site has been exposed to the user through Application Proxy. The user is automatically routed through Application Proxy, to authenticate with any applicable multi-factor authentication and Conditional Access, before reaching the intranet site. The user is now able to access internal sites, even on their mobile devices, and the link in Outlook works as expected.
- A user opens Edge for iOS and Android on their iOS or Android device. If Edge for iOS and Android is protected with Intune, and Application Proxy is enabled, the user can go to an intranet site by using the internal URL they are used to. Edge for iOS and Android recognizes that this intranet site has been exposed to the user through Application Proxy. The user is automatically routed through Application Proxy, to authenticate before reaching the intranet site.
Before you start:
- Set up your internal applications through Azure AD Application Proxy.
- To configure Application Proxy and publish applications, see the setup documentation.
- Ensure that the user is assigned to the Azure AD Application Proxy app, even if the app is configured with Passthrough pre-authentication type.
- The Edge for iOS and Android app must have an Intune app protection policy assigned.
- Microsoft apps must have an app protection policy that has Restrict web content transfer with other apps data transfer setting set to Microsoft Edge.
Note
Edge for iOS and Android updates the Application Proxy redirection data based on the last successful refresh event. Updates are attempted whenever the last successful refresh event is greater than one hour.
Target Edge for iOS with the following key/value pair, to enable Application Proxy:
Key | Value |
---|---|
com.microsoft.intune.mam.managedbrowser.AppProxyRedirection | true enables Azure AD App Proxy redirection scenarios false (default) prevents Azure AD App Proxy scenarios |
Note
Edge for Android does not consume this key. Instead, Edge for Android consumes Azure AD Application Proxy configuration automatically as long as the signed-in Azure AD account has an App Protection Policy applied.
For more information about how to use Edge for iOS and Android and Azure AD Application Proxy in tandem for seamless (and protected) access to on-premises web apps, see Better together: Intune and Azure Active Directory team up to improve user access. This blog post references the Intune Managed Browser, but the content applies to Edge for iOS and Android as well.
Manage NTLM single sign-on sites
Microsoft Edge On Android Tablet
Organizations may require users to authenticate with NTLM to access intranet web sites. By default, users are prompted to enter credentials each time they access a web site that requires NTLM authentication as NTLM credential caching is disabled.
Organizations can enable NTLM credential caching for particular web sites. For these sites, after the user enters credentials and successfully authenticates, the credentials are cached by default for 30 days.
Key | Value |
---|---|
com.microsoft.intune.mam.managedbrowser.NTLMSSOURLs | The corresponding value for the key is a list of URLs. You enter all the URLs you want to allow as a single value, separated by a pipe | character.Examples: For more information on the types of URL formats that are supported, see URL formats for allowed and blocked site list. |
com.microsoft.intune.mam.managedbrowser.durationOfNTLMSSO | Number of hours to cache credentials, default is 720 hours |
Deploy app configuration scenarios with Microsoft Endpoint Manager
If you are using Microsoft Endpoint Manager as your mobile app management provider, the following steps allow you to create a managed apps app configuration policy. After the configuration is created, you can assign its settings to groups of users.
Sign into Microsoft Endpoint Manager.
Select Apps and then select App configuration policies.
On the App Configuration policies blade, choose Add and select Managed apps.
On the Basics section, enter a Name, and optional Description for the app configuration settings.
For Public apps, choose Select public apps, and then, on the Targeted apps blade, choose Edge for iOS and Android by selecting both the iOS and Android platform apps. Click Select to save the selected public apps.
Click Next to complete the basic settings of the app configuration policy.
On the Settings section, expand the Edge configuration settings.
If you want to manage the data protection settings, configure the desired settings accordingly:
For Application proxy redirection, choose from the available options: Enable, Disable (default).
For Homepage shortcut URL, specify a valid URL that includes the prefix of either http:// or https://. Incorrect URLs are blocked as a security measure.
For Managed bookmarks, specify the title and a valid URL that includes the prefix of either http:// or https://.
For Allowed URLs, specify a valid URL (only these URLs are allowed; no other sites can be accessed). For more information on the types of URL formats that are supported, see URL formats for allowed and blocked site list.
For Blocked URLs, specify a valid URL (only these URLs are blocked). For more information on the types of URL formats that are supported, see URL formats for allowed and blocked site list.
For Redirect restricted sites to personal context, choose from the available options: Enable (default), Disable.
Note
When both Allowed URLs and Blocked URLs are defined in the policy, only the allowed list is honored.
If you want to additional app configuration settings not exposed in the above policy, expand the General configuration settings node and enter in the key value pairs accordingly.
When you are finished configuring the settings, choose Next.
On the Assignments section, choose Select groups to include. Select the Azure AD group to which you want to assign the app configuration policy, and then choose Select.
When you are finished with the assignments, choose Next.
On the Create app configuration policy Review + Create blade, review the settings configured and choose Create.
The newly created configuration policy is displayed on the App configuration blade.
Use Edge for iOS and Android to access managed app logs
Users with Edge for iOS and Android installed on their iOS or Android device can view the management status of all Microsoft published apps. They can send logs for troubleshooting their managed iOS or Android apps by using the following steps:
- Open Edge for iOS and Android on your device.
- Type
about:intunehelp
in the address box. - Edge for iOS and Android launches troubleshooting mode.
For a list of the settings stored in the app logs, see Review client app protection logs.
To see how to view logs on Android devices, see Send logs to your IT admin by email.