Skip to content
drawing

👋 Introduction

When hiring contractors and granting them access to sensitive resources, such as internal data, SaaS platforms or administrative portals, it is critical to enforce security controls at the application layer, because direct management of the device is not possible. Implementing Microsoft Edge for Business alongside Mobile Application Management (MAM) is an effective way to safeguard your organisation's data accessed through browsers on Windows.

Microsoft has announced the launch of a Public Preview (March 2026) feature that will allow browser-based protection policies to be applied to the work profile of Edge for Business, even when the device is not managed directly. This approach ensures data boundaries are maintained while respecting the ownership of devices belonging to other organisations.

⚙️ Configuration

Mobile Threat Defense (MTD)

The Microsoft Intune MTD connector links Intune with third-party vendors to provide cross-platform threat intelligence. For unmanaged devices, MAM can use these connectors to assess device health without an agent present on the machine.

The connector will only gather data from MAM-enrolled users. To stop transmission, users can sign out of the protected app or the admin can remove the MTD connector from Intune.

The data sent through the connector includes:

  • User, app and device identifiers
  • Last update timestamp
  • A predefined health state
    • Secured: Zero-tolerance for threats
    • Low: Allows only low-level threats
    • Medium: Allows low or medium level threats
    • High: Allows all threat levels (should only be used for test purposes)

Configure the MTD Connector

  1. Open the Intune admin portal -> Tenant administration -> Connectors and tokens -> Mobile Threat Defense and click ➕ Create.
  2. Now select Windows Security Center in the Select the Mobile Threat Defense connector to setup field and click Create.
drawingdrawing

INFO

The status will show 🔁 Not set up until you enroll the first MAM user.


App Configuration policy

This will set up the behaviour of the Edge work profile and how we want the app to interact with the user. Following you will find my best practices:

  1. Open the Intune admin portal -> Apps -> Manage apps -> Configuration and click ➕ Create -> Managed Apps.
  2. Enter a Name, Description and click Select public apps.
  3. Now select Microsoft Edge with the Windows platform, click Select and Next.
drawing
  1. Now add the following settings from the Settings catalog.
Settings Catalog
Settings NameValue
Show Home button on toolbarEnabled
Allow HTTPS-Only Mode to be enabledForce enable HTTPS-Only Mode in Strict mode
Default pop-up window settingDo not allow any site to show popups
Enable saving passwords to the password managerDisabled
Enable AutoFill for payment instrumentsDisabled
Block tracking of users' web-browsing activityBalanced
Enable network predictionDon't predict network actions on any network connections
Allow importing of autofill form dataDisabled
Allow importing of saved passwordsDisabled
Allow importing of browsing historyDisabled
Allow importing cookiesDisabled
Allow importing of extensionDisabled
Allow download restrictionsBlock malicious downloads and dangerous file types
Show Microsoft Rewards experiencesDisabled
Shopping in Microsoft Edge EnabledDisabled
Enable deleting browser and download historyEnabled
Force Microsoft Defender SmartScreen checks on downloads from trusted sourcesEnabled
Allow insecure content on specified sites[]
Block insecure content on specified sites["*"]
Control which native messaging hosts users can use[]
Configure native messaging block list["*"]
Restrict the range of local UDP ports used by WebRTC10000:11000
Clear browsing data when Microsoft Edge closesEnabled
Disable synchronization of data using Microsoft sync servicesEnabled
Enable printingDisabled
InPrivate mode availabilityInPrivate mode disabled
Force synchronization of browser data and do not show the sync consent promptDisabled
Configure sleeping tabsEnabled
Allow or block video captureDisabled
drawing
  1. Click Next 2 times, add your contractor group to Assignments and then click Create.

INFO

You can find Microsofts recommendations for Edge App Configuration policies here.


App Protection policy

This will set up the behaviour of the Edge work profile and how we want the user to interact with the data. Following you will find my best practices:

  1. Open the Intune admin portal -> Apps -> Manage apps -> Protection and click ➕ Create -> Windows.
  2. Enter a Name and Description for the policy, then click Next.
  3. Now select Microsoft Edge and click Next.
drawing
  1. Select which Data Protection settings you want to apply to the app, then click Next.

    Leak control

    If you set the Allow cut, copy, and paste policy, to anything different than All destinations and sources, the following controls are set by default:

    • Blocks Screenshots
    • Blocks Developer Tools
    drawing
drawing
  1. Lastly you can select App conditions and Device conditions.
drawing
  1. Click Next, add your contractor group to Assignments and then click Create to finish the policy.

INFO

You can find Microsofts recommendations for Edge App Protection policies here.


Conditional Access policy

This will set up the access control that forces the contractors to use the app protection policy we set up.

  1. Open the Intune admin portal -> Devices -> Manage devices -> Conditional access -> Policies and click ➕ New Policy.
  2. Enter the Name for your policy.
  3. Under Users or Agents select your contractor user group.
  4. Under Target resources select Microsoft Admin Portals and Office 365. (You can also select any other browser-based resource you want to protect.)
drawing
  1. Under Conditions -> Device platforms select Windows.
drawing
  1. Under Conditions -> Client apps select Browser.
drawing
  1. Under Grant select Grant access and Require app protection policy.
drawing
  1. Lastly set the policy to On and click Create.
drawing

⭐ Usage scenarios

MAM enrollment

To use the new work profile feature you only need to have the previously created polcies assigned to the contractor group on the organizations side.

On the user side, the contractor needs to activate a setting from their side to get the new experience.

  1. Open Microsoft Edge and open edge://flags.
drawing
  1. Enable the following flags and restart the browser.

    • #edge-allow-mam-on-mdm - (This setting is needed when the contractor's device is already enrolled with his own organizations MDM.)
    drawing
  2. After Edge restarted, open your resource of choice (here portal.office.com) and sign in.

  3. In the sign in process the system will ask you to log in to a separate Edge work profile. This happens so the profile can be managed by the MAM policy.

drawing
  1. Clicking Switch Edge profile triggers a pop-up to select and confirm your preferred account. Here you click Sign in to sync data and log in to the Edge work profile.
drawing
  1. In the sign in flow you will be asked if you want to sign in to all apps or only this app.

Important

You need to select Yes, because the Edge work profile can not be managed otherwise and this feature will not work.

drawing

info

If you have not disabled the Disable MDM enrollment when adding work or school account on Windows setting

drawing

your contractor will also get the question if he wants to enroll his device, which he should answer with No.

drawing
  1. After that, you will get a success message and the MAM policies will apply.
drawingdrawing
  1. In the Screenshot below you see that the app protection policies we configured do now apply to the office resource.
drawingdrawingdrawing

What can the organization see of the contractors device?

  • Windows registers the device in Entra ID, where it will be listed with minimal information.
drawing
  • The device will not be listed in the Intune or Defender portal

To find information about the contractors sessions you can:

drawingdrawing

Downloads to OneDrive

To additionally force downloads to be saved in OneDrive for Business, you can make the following settings:

  1. First you need to go to Intune, to the App Protection policy we just created and make sure Send org data to is set to No destinations.
drawing
  1. After that we need to create an Edge policy. To do that, open the M365 admin portal -> Settings -> Microsoft Edge select the Configuration policies tab and click ➕ Create policy.
drawing
  1. Enter the Name and Description for your policy, and make sure to select Windows 10+ as Platform and Cloud as Policy type, before clicking Next.
drawing
  1. Click Next in the Settings and Extensions section, until you come to the Customization Settings.

INFO

If you do not see the Customization Settingssection, you create the policy completly without settings in it and assign it to the contractor group. After that, when you open the policy again, you will see the Customization Settings section, select it and make the needed settings.

drawing
drawing
  1. In the Customization Settings tab, navigate to Security Settings and enable the Protected Downloads setting.
drawing

After you set this up, files downloaded in Edge by your contractors are redirected to the Microsoft Edge Downloads folder in OneDrive for Business, which is tenant-managed and enforces organizational compliance.

INFO

Be aware, for this to work, you need to assign the contractors a license that includes OneDrive for Business.


Watermarking

You can also force watermarking in the protected Browser session for your contractors. With that, you can make sure that you even got visual leak control.

To set this up, you can follow the same steps as described in the Downloads to OneDrive section, but instead of enabling Protected Downloads you need to enable Enable watermarking protection.

drawing

You ca see the effect in the screenshot below.

(I adjusted the Screenshots contrast a bit, so the watermarking is better visible in the screenshot) drawing

💡 Conclusion

Managing external contractors and third-party vendors presents a significant security challenge, you need to grant them access to sensitive resources while maintaining strict data protection boundaries. Implementing MAM (Mobile Application Management) with Microsoft Edge for Business solves this elegantly by enforcing security controls at the application profile layer rather than requiring device enrollment. This approach allows you to protect your organization's data and resources without the friction of device management, without exposing your resources to unmanaged devices or providing the contractor with a separate device. By combining app-level policies and conditional access, you create a secure work profile that sits isolated on the contractor's device, ensuring organizational compliance while respecting device ownership and maintaining a seamless user experience.

Preview Limitations

  • Users can't access data protected by Conditional Access policies when using devices managed by another tenant with the same Conditional Access settings active.
  • To enroll MAM policies on an externally managed device, it mustn't have any Endpoint DLP policies applied at the device level.

References