You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/in-browser-protection.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.topic: how-to
8
8
9
9
# In-browser protection with Microsoft Edge for Business (Preview)
10
10
11
-
Defender for Cloud Apps users who use Microsoft Edge for Business and are subject to session policies are protected directly from within the browser. In-browser protection reduces the need for proxies, improving both security and productivity.
11
+
Defender for Cloud Apps users who use Microsoft Edge for Business or Purview Data Loss Prevention policies for Cloud Apps in Edge and are subject to session policies are protected directly from within the browser. In-browser protection reduces the need for proxies, improving both security and productivity.
12
12
13
13
Protected users experience a smooth experience with their cloud apps, without latency or app compatibility issues, and with a higher level of security protection.
14
14
@@ -27,14 +27,15 @@ To use in-browser protection, users must also have the following environmental r
27
27
|**Operating systems**|Windows 10 or 11, macOS|
28
28
|**Identity platform**|Microsoft Entra ID|
29
29
|**Microsoft Edge for Business versions**|The last two stable versions. For example, if the newest Microsoft Edge is 126, in-browser protection works for v126 and v125. <br> For more information, see [Microsoft Edge releases](/deployedge/microsoft-edge-release-schedule#microsoft-edge-releases).|
30
-
|**Supported session policies**|<ul><li>Block\Monitor of file download (all files\\*sensitive files)</li><li>Block\Monitor file upload (all files\\*sensitive files)</li><li>Block\Monitor copy\cut\paste</li><li>Block\Monitor print</li><li>Block\Monitor malware upload</li><li>Block\Monitor malware download</li></ul> <br> Users that are served by multiple policies, including at least one policy that's *not* supported by Microsoft Edge for Business, their sessions are always served by the reverse proxy. <br><br> Policies defined in the Microsoft Entra ID portal are also always served by reverse proxy.<br> *Sensitive files identified by built-in DLP scanning are not supported for Edge in-browser protection|
30
+
|**Supported session policies**|<ul><li>Block\Monitor of file download (all files\\*sensitive files)</li><li>Block\Monitor file upload (all files\\*sensitive files)</li><li>Block\Monitor copy\cut\paste</li><li>Block\Monitor print</li><li>Block\Monitor malware upload</li><li>Block\Monitor malware download</li></ul> <br> Users that are served by multiple policies, including at least one policy that's *not* supported by Microsoft Edge for Business, their sessions are always served by the reverse proxy. <br><br> Policies defined in the Microsoft Entra ID portal are also always served by reverse proxy.<br> *Sensitive files identified by built-in DLP scanning are not supported for Microsoft Edge in-browser protection|
31
+
|**Supported Purview DLP policies**|Please see: [Activities you can monitor and take action on in the browser](/purview/dlp-browser-dlp-learn#activities-you-can-monitor-and-take-action-on) <br>Purview policies are always served by in-browser protection.|
31
32
32
33
All other scenarios are served automatically with the standard reverse proxy technology, including user sessions from browsers that don't support in-browser protection, or for policies not supported by in-browser protection.
33
34
34
35
For instance, these scenarios are served by the reverse proxy:
35
36
36
37
- Google Chrome users.
37
-
- Microsoft Edge users who are scoped to a protect file download policy.
38
+
- Microsoft Edge users who are scoped to a protect file download session policy.
38
39
- Microsoft Edge users on Android devices.
39
40
- Users in apps that use the OKTA authentication method.
40
41
- Microsoft Edge users in InPrivate mode.
@@ -52,20 +53,20 @@ Also, the `.mcas.ms` suffix doesn't appear in the browser address bar with in-br
52
53
53
54
### Work profile enforcement for in-browser protection
54
55
55
-
To access a work resource in *contoso.com* with in-browser protection, users must sign in with their`[email protected]` profile. If users try to access the work resource from outside the work profile, they're prompted to switch to the work profile or create one if it doesn't exist. Users can also choose to continue with their current profile, in which case they're served by the [reverse proxy architecture](proxy-intro-aad.md).
56
+
To access a work resource in *contoso.com* with in-browser protection, you must sign in with your`[email protected]` profile. If you try to access the work resource from outside the work profile, you will be prompted to switch to the work profile or create one if it doesn't exist. If access from the Microsoft Edge work profile isn't enforced, you can also choose to continue with your current profile, in which case you're served by the [reverse proxy architecture](proxy-intro-aad.md).
56
57
57
-
If the user decides to create a new work profile, they're prompted with the **Allow my organization to manage my device** option. In such cases, users don't need to select this option to create the work profile or benefit from in-browser protection.
58
+
If you decide to create a new work profile, you'll see a prompt with the **Allow my organization to manage my device** option. In such cases, you don't need to select this option to create the work profile or benefit from in-browser protection.
58
59
59
60
For more information, see [Microsoft Edge for Business](/deployedge/microsoft-edge-for-business) and [How to add new profiles to Microsoft Edge](https://www.microsoft.com/edge/learning-center/how-to-add-new-profiles).
60
61
61
62
## Configure in-browser protection settings
62
63
63
-
In-browser protection with Microsoft Edge for Business is turned on by default. Admins can turn the integration off and on, and can configure a prompt for non-Microsoft Edge users to switch to Microsoft Edge for enhanced performance and security.
64
+
In-browser protection with Microsoft Edge for Business is turned on by default, with **Do not enforce** selected. You can turn the integration off and on, change settings to enforce use of Microsoft Edge for Business, and configure a prompt for non-Microsoft Edge users to switch to Microsoft Edge for enhanced performance and security.
64
65
65
66
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **System**\>**Settings**\>**Cloud apps**\>**Conditional Access App Control** section \>**Edge for Business protection**. Or, to go directly to the **Edge for Business protection** page, use <https://security.microsoft.com/cloudapps/settings?tabid=edgeIntegration>.
66
67
67
68
2. On the **Edge for Business protection** page, configure the following settings as needed:
68
-
-**Turn on Edge for Business browser protection**: The default value is **On**, but you can toggle the setting to **Off**.
69
+
-**Turn on Edge for Business browser protection**: The default value for this is **On**, but you can toggle the setting to **Off**.
69
70
-**Notify users in non-Edge browsers to use Microsoft Edge for Business for better performance and security**: If you select the check box, select one of the following values that appear:
70
71
-**Use default message** (default)
71
72
-**Customize message**: Enter the custom text in the box that appears.
@@ -74,17 +75,16 @@ In-browser protection with Microsoft Edge for Business is turned on by default.
74
75
75
76
When you're finished on the **Edge for Business protection** page, select **Save**.
76
77
77
-
## Working with Microsoft Purview and Endpoint data loss prevention
78
+
## Working with Microsoft Purview Endpoint data loss prevention
79
+
Endpoint DLP policies are prioritized and applied if the same context and action are configured for the Endpoint policy and either a Defender for Cloud Apps session policy or a [Purview DLP policy for cloud apps](/purview/dlp-browser-dlp-learn#activities-you-can-monitor-and-take-action-on).
78
80
79
-
If the same exact context and action are configured for both Defender for Cloud Apps policies and a Microsoft Purview Endpoint data loss prevention policy (DLP), the Endpoint DLP policy is applied.
81
+
For example, you have an Endpoint DLP policy that blocks a file upload to Salesforce, and you also have a Defender for Cloud Apps session policy that monitors file uploads to Salesforce. In this scenario, the Endpoint DLP policy is applied.
80
82
81
-
For example, you have an Endpoint DLP policy that blocks a file upload to Salesforce, and you also have a Defender for Cloud Apps policy that monitors file uploads to Salesforce. In this scenario, the Endpoint DLP policy is applied.
82
-
83
-
For more information, see [Learn about data loss prevention](/purview/dlp-learn-about-dlp).
83
+
For more information, see [Learn about Endpoint data loss prevention](/purview/endpoint-dlp-learn-about).
84
84
85
85
## Enforce Microsoft Edge browser protection when accessing business apps
86
86
87
-
Administrators who understand the power of Microsoft Edge browser protection can require users to use Microsoft Edge when accessing corporate resources. A primary reason is security, since the barrier to circumventing session controls using Microsoft Edge is much higher than with reverse proxy technology.
87
+
Administrators who understand the power of Microsoft Edge browser protection can require users to use Microsoft Edge when accessing corporate resources. A primary reason is security, since the barrier to circumventing session controls using Microsoft Edge is much higher than with reverse proxy technology. For Purview DLP policies, these settings are required to be on and enforcing access only from Microsoft Edge for business application when using policies that [help prevent users from sharing sensitive info with Cloud Apps in Edge for Business](/purview/dlp-create-policy-prevent-cloud-sharing-from-edge-biz).
88
88
89
89
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **System**\>**Settings**\>**Cloud apps**\>**Conditional Access App Control** section \>**Edge for Business protection**. Or, to go directly to the **Edge for Business protection** page, use <https://security.microsoft.com/cloudapps/settings?tabid=edgeIntegration>.
0 commit comments