Del via


Manage Internet access using managed browser policies with Configuration Manager

 

Updated: May 14, 2015

Applies To: System Center 2012 Configuration Manager SP2, System Center 2012 R2 Configuration Manager SP1

Beginning with System Center 2012 Configuration Manager SP2, you can deploy the Intune Managed Browser, a web browsing application, and associate the application with a managed browser policy. The managed browser policy configures an allow list or a block list that restricts the web sites that users of the managed browser can visit.

Because this app is a managed app, you can also apply mobile application management policies to the app, such as controlling the use of cut, copy and paste, preventing screen captures, and also ensuring that links to content that users click only open in other managed apps. For details, see How to Control Apps Using Mobile Application Management Policies in Configuration Manager.

Important

If users install the managed browser themselves, it will not be managed by any policies you specify. To ensure that the browser is managed by Configuration Manager, they must uninstall the app before you can deploy it to them as a managed app.

You can create managed browser policies for the following device types:

  • Devices that run Android 4 and later

  • Devices that run iOS 7 and later

Note

For more information about the Intune Managed Browser app, see iTunes for iOS and Google Play for Android.

Create a managed browser policy

  1. In the Configuration Manager console, click Software Library.

  2. In the Software Library workspace, expand Application Management, and then click Application Management Policies.

  3. In the Home tab, in the Create group, click Create Application Management Policy.

  4. On the General page, enter the name and description for the policy, and then click Next.

  5. On the Policy Type page, select the platform, select Managed Browser for the policy type, and then click Next.

    On the Managed Browser page, select one of the following options:

    - **Allow the managed browser to open only the URLs listed below** – Specify a list of URLs that the managed browser can open.
    
    - **Block the managed browser from opening the URLs listed below** – Specify a list of URLs that the managed browser will be blocked from opening.
    

    Note

    You cannot include both allowed and blocked URLs in the same managed browser policy.

    For more information about the URL formats you can specify, see URL format for allowed and blocked URLs in this topic.

    Note

    The General policy type lets you modify the functionality of apps that you deploy to help bring them into line with your company compliance and security policies. For example, you can restrict cut, copy and paste operations within a restricted app. For more information about the General policy type, see How to Control Apps Using Mobile Application Management Policies in Configuration Manager.

  6. Complete the wizard.

The new policy is displayed in the Application Management Policies node of the Software Library workspace.

Create a software deployment for the managed browser app

After you have created the managed browser policy, you can then create a software deployment type for the managed browser app. You must associate both a General and Managed Browser policy for the Managed Browser app.

For more information, see How to Create and Deploy Applications for Mobile Devices in Configuration Manager.

Security and privacy for the managed browser

  • On iOS devices, web sites that users visit that have an expired or untrusted certificate cannot be opened.

  • Settings that users make for the built-in browser on their devices are not used by the managed browser. This is because the managed browser does not have access to these settings.

  • If you configure the options Require simple PIN for access or Require corporate credentials for access in a mobile application management policy associated with the managed browser and a user clicks the help link on the authentication page, they can then browse any Internet sites regardless of whether they were added to a block list in the managed browser policy.

  • The managed browser can only block access to sites when they are accessed directly. It cannot block access when intermediate services (such as a translation service) are used to access the site.

Reference information

URL format for allowed and blocked URLs

Use the following information to learn about the allowed formats and wildcards you can use when specifying URLs in the allowed and blocked lists.

  • You can use the wildcard symbol ‘*’ according to the rules in the permitted patterns list below.

  • Ensure that you prefix all URLs with http or https when entering them into the list.

  • You can specify port numbers in the address. If you do not specify a port number, the values used will be:

    • Port 80 for http

    • Port 443 for https

    Using wildcards for the port number is not supported, for example, https://www.contoso.com:\* and https://www.contoso.com: /*

  • Use the following table to learn about the permitted patterns you can use when you specify URLs:

    URL

    Description

    Matches

    Does not match

    https://www.contoso.com

    Matches a single page

    www.contoso.com

    host.contoso.com

    www.contoso.com/images

    contoso.com/

    https://contoso.com

    Matches a single page

    contoso.com/

    host.contoso.com

    www.contoso.com/images

    www.contoso.com

    https://www.contoso.com/*

    Matches all URLs beginning with www.contoso.com

    www.contoso.com

    www.contoso.com/images

    www.contoso.com/videos/tvshows

    host.contoso.com

    host.contoso.com/images

    http://*.contoso.com/*

    Matches all sub-domains under contoso.com

    developer.contoso.com/resources

    news.contoso.com/images

    news.contoso.com/videos

    contoso.host.com

    https://www.contoso.com/images

    Matches a single folder

    www.contoso.com/images

    www.contoso.com/images/dogs

    https://www.contoso.com:80

    Matches a single page, using a port number

    https://www.contoso.com:80

    https://www.contoso.com

    Matches a single, secure page

    https://www.contoso.com

    https://www.contoso.com

    https://www.contoso.com/images/*

    Matches a single folder and all subfolders

    www.contoso.com/images/dogs

    www.contoso.com/images/cats

    www.contoso.com/videos

  • The following are examples of some of the inputs you cannot specify:

Note

*.microsoft.com is always allowed – it is always treated as allowed.

How conflicts between the allow and block list are resolved

If multiple managed browser policies are deployed to a device and the settings conflict, both the mode (allow or block) and the URL lists are evaluated for conflicts. In case of a conflict, the following behavior applies:

  • If the modes in each policy are the same, but the URL lists are different, the URLs will not be enforced on the device.

  • If the modes in each policy are different, but the URL lists are the same, the URLs will not be enforced on the device.

  • If a device is receiving managed browser policies for the first time and two policies conflict, the URLs will not be enforced on the device. Use the Policy Conflicts node of the Policy workspace to view the conflicts.

  • If a device has already received a managed browser policy and a second policy is deployed with conflicting settings, the original settings remain on the device. Use the Policy Conflicts node of the Policy workspace to view the conflicts.