By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Cookie Policy for more information.
Icon Rounded Closed - BRIX Templates
Insights

Windows MAM for Edge: Secure BYOD Without VDI

5 mins
share on
 Windows MAM for Edge: Secure BYOD Without VDI

Microsoft is enabling a browser‑first path for many BYOD scenarios on Windows: apply Intune App Protection Policies (Windows MAM) to the work profile in Microsoft Edge, and gate access with Conditional Access → Require app protection policy (Windows). Users reach Microsoft 365 and SaaS apps from personal Windows devices without full device enrollment, while policy controls follow the work identity in Edge.

For the last decade, if a contractor or employee wanted to use their personal laptop for work, IT had two heavy-handed options: force them to enroll the device in Intune (which users hate due to privacy concerns) or force them into a slow, expensive Citrix/AVD session (which users hate due to latency).

This new feature creates a third path: The Browser as the Container.

Supported on Windows 11 and Windows 10, version 20H2+ (with KB5031445) when Conditional Access requires an app protection policy for Windows.

Windows MAM with Microsoft Edge: A Browser‑First Alternative to VDI for BYOD

TLDR

Windows Mobile Application Management (MAM) applies Intune App Protection Policies to Microsoft Edge on personal Windows devices. With Conditional Access → Require app protection policy, users can reach Microsoft 365 and SaaS, while copy/paste, downloads, printing, and data transfer are restricted to approved paths (e.g., OneDrive for Business). Works on Windows 11 and Windows 10 20H2+ (KB5031445) when users sign into a work profile in Edge.

What Is It?

Microsoft is bringing the "App Protection Policies" (MAM) we have used on iOS and Android for years to the Windows desktop.

Windows MAM applies Intune App Protection Policies to Microsoft Edge on personal (unmanaged) Windows devices. Policies bind to the work identity in Edge, not the device.

This allows you to enforce data leakage controls, like blocking copy/paste, preventing downloads, or disabling printing, directly within the Microsoft Edge browser on a personal, unmanaged Windows PC. The controls are applied to the identity, not the device.

How it works structurally:

  1. Identity Separation: When a user signs into Edge with their Entra ID (Work Account), it creates a visually distinct "Work Browser" window.
  2. Policy Enforcement: Intune pushes a MAM policy to that specific browser profile.
  3. Data Boundary: The user can browse SharePoint, check Outlook, or access internal SaaS apps freely. However, if they try to copy text from that window to a personal Notepad or save a file to their local C:\ drive, the action is blocked.

The Architecture: How to Enforce It

Implementing this requires a combination of Conditional Access (CA) and Intune App Protection. You are essentially telling Entra ID: "If the device is unmanaged, do not allow access unless the user is in a protected browser."

  • Step 1: The Conditional Access Policy. You create a CA policy that targets "All Cloud Apps" but is scoped only to unmanaged devices (exclude "Compliant" or "Hybrid Joined" devices). The "Grant" control is set to "Require app protection policy."
  • Step 2: The Intune Policy. You configure a Windows App Protection Policy in Intune that defines the restrictions (e.g., Block "Save As," Block "Cut/Copy" to unmanaged apps).

Note: When Grant is set to Require app protection policy (Windows), devices must meet the supported OS criteria and users must sign into Edge with a work profile for policies to apply.

Microsoft Intune

Key Capabilities and Restrictions

This feature moves the security perimeter from the network/device level up to the application layer.

  • Clipboard controls (copy/paste): Use Windows MAM App Protection Policy settings to allow within managed contexts and block to unmanaged apps (e.g., prevent pasting from Edge’s work profile into personal apps). See “Restrict cut, copy, and paste” scenarios for expected behaviors and troubleshooting.
  • Download & save protections: Block local saves entirely or allow only approved services (e.g., OneDrive for Business/SharePoint) via Windows MAM data‑transfer and “Allow user to save copies to selected services” settings (reinforced with sensitivity labels and DLP for SharePoint/OneDrive). Avoid implying forced saves to a local monitored folder, policy governs destinations, not arbitrary local paths.
  • Watermarking (preview/tenant‑dependent): Edge is rolling out watermark protection via the Edge management service to visibly deter screen capture when specific data‑loss rules apply. Treat as preview/optional, and verify availability in your tenant before relying on it.
  • Health Checks: Even without full MDM, the browser can perform basic health checks (e.g., "Is the OS version minimum met?" or "Is Defender running?") before granting access.
SharePoint Homepage and notepad app

The Benefits

1. Death of the "BYOD Tax" Managing personal devices via full MDM (Intune enrollment) is a support nightmare. It generates tickets about privacy, slows down onboarding, and often requires legal waivers. This approach requires zero device enrollment. The user just downloads Edge, signs in, and works.

2. Cost Reduction vs. VDI Virtual Desktops (AVD/Windows 365) are powerful but expensive, often costing $30-$100 per user/month in compute and licensing. If a user only needs a browser to access O365 and web apps, putting them in a VDI is overkill. This Edge feature moves that workload to the local endpoint (free) while maintaining the data boundary.

3. User Privacy The "Work" and "Personal" profiles in Edge are completely siloed. IT can wipe the Work profile data remotely, but they cannot see the user's personal browsing history, bookmarks, or files in their personal profile. This separation builds trust and increases adoption.

Requirements to Execute

To execute this rollout, you must verify that the following configurations are present in the tenant.

  • Licensing: The architecture requires Microsoft Intune Plan 1 and Microsoft Entra ID P1. These licenses must be assigned to the target users prior to onboarding.
  • Browser Version: Endpoints must run Microsoft Edge version 120 or later. This version is necessary to support the required security controls and policy application.
  • Platform scope: The Windows MAM + “Require app protection policy (Windows)” path is Windows‑specific. On macOS, pair Edge for Business with Conditional Access and, where needed, Defender for Cloud Apps session controls to achieve similar in‑browser protections.

FAQ

Q1. What is Windows MAM for Microsoft Edge?

Windows MAM applies Intune App Protection Policies to the Edge work profile on personal Windows devices, so controls follow the user’s work identity, not the device.

Q2. Which OS versions are supported?

Windows 11 and Windows 10, version 20H2+ (with KB5031445) when Conditional Access requires an app protection policy (Windows).

Q3. How do I enable a “protected browser only” experience?

Create Conditional Access for Microsoft 365 and set Grant → Require app protection policy (Windows), then assign a Windows App Protection Policy in Intune to the target users.

Q4. Can I block downloads or allow only OneDrive/SharePoint?

Yes, configure Windows MAM data‑transfer rules and “Allow user to save copies to selected services” to block local saves or allow only approved services (e.g., OneDrive for Business).

Q5. How does copy/paste blocking really work?

Use Restrict cut, copy, and paste (Windows APP). Allow within managed contexts; block to unmanaged apps. See Microsoft’s scenarios/troubleshooting for exact behaviors.

Q6. Does this replace VDI/Windows 365?

For browser‑only work: often yes. For full desktop/legacy apps: VDI or Windows 365 still apply, pick the lightest tool that meets the requirement.

Q7. Is watermarking available?

Watermark protection in Edge is rolling out via the Edge management service; treat as preview/tenant‑dependent until available in your environment.

Let’s talk about securing BYOD with Edge and Intune. Book a quick consult.
Case Study Details

Similar posts

Get our perspectives on the latest developments in technology and business.
Love the way you work. Together.
Next steps
Have a question, or just say hi. 🖐 Let's talk about your next big project.
Contact us
Mailing list
Occasionally we like to send clients and friends curated articles that have helped us improve.
Close Modal