Use Azure or App Proxy with Managed Browser to Set Proxy Address or Delivery .pac
This is a feature we've already requested through the Managed Browser PG - however was asked to have it documented here as well. Request is to allow organizations to set proxy address (or deliver .pac if possible) for Managed Browser either though MAM controls or using Azure App Proxy. This is distinct from whitelisting specific sites as we want to proxy all traffic out of Managed Browser.
Other MDM providers have a VPN solution with their product to allow internal browsing and other access. MS needs to fill this feature gap.
MS should look at 3rd party MDM providers and provide a VPN solution for Intune to provide internal browsing.
Paul J commented
This is a critically needed feature.
Please add this as a priority.
Being able to specify a proxy address (for web filtering for example) would be a really solid feature to add. Browsers on desktop devices have this capability as a standard feature.
Matt Cooper commented
I agree, we have been told that proxying the traffic internally is old technology. However which is older, Manually whitelisting/blacklisting URL's or blocking based on category, based on who you are.
The managed Browser/edge adds a huge administrative overhead.
What Microsoft is missing is a "gateway" solution, that tunnels all traffic to a company's internal network. So, tunnel all traffic with these domain names or IP addresses to an internal gateway, that can handle any authorization based on supported by the inside site. All other traffic stay external. Pure split tunnel. the App proxy solution is too granular.