How to set up internet filtering with TinyMDM secure browser
And how to limit the internet access from other browsers
Internet is the secure browser of TinyMDM. It allows, depending on the level of filtering selected in the security policy, to restrict internet access on the devices. If you have multiple browsers installed on your devices, please note that the Internet filtering system only works with the secure browser. The secure browser is installed by default on the devices as soon as a level of Internet filtering has been triggered in the security policy.

If the browser is not yet approved and installed on your devices, go to Enterprise Approved Apps and approve the web app Internet by clicking on ‘Public Apps’. Then type ‘Internet Ars Nova Systems’ in the Play Store search bar, approve it, and install it.
If you have an internal website:
In order to avoid misspelled websites, we verify the websites validity. If you have an internal website, as we cannot access it, the addition is rejected. To bypass the verification, you need to notify TinyMDM that the website you want to add is an internal website. To do that, you need to prefix the website’s URL with the specific token : intra#
For example: www.myintrawebsite.com should be entered like this intra#www.myintrawebsite.com
If you have one or multiple web applications installed
Web Apps that are approved and installed on TinyMDM work only with Chrome browser. That is why it is important not to delete Chrome even if you want to use Internet . To avoid users from using Chrome and bypass the Internet filtering system, follow the steps below:
In kiosk mode
In your policy, under Apps management, click on the menu linked to the Chrome application and select Hide app.

By hiding the app, users will only have access to their web apps on Chrome but won’t be able to visit other websites.
In fully managed mode
1. In fully managed mode, it is not possible to hide Chrome. That is why it is important to block access to all the URLs except those of your web applications.
In your policy, under Apps management, click ont the menu linked to Chrome application and select Configuration.

2. The App managed configurations appear. Search Block access to a list of URLs line and copy-paste the text below:

Due to this configuration, users won’t have access to any internet website or any Google research.
3. In order for your web apps to be opened on Chrome, search the Allow access to a list of URLs, above ‘Block access to a list of URLs’.

Copy and paste the URLs of your private web apps:
a. If you only have one private web app
Type your private web app’s URL between quotes and square brackets (see example below)
b. If you have several private web apps
Type the URLs of your web applications one by one. They need to be in quotation marks and separated by a comma. Once you did it, put the entire text in square brackets.
Due to this configuration, by clicking either on its web applications or the Chrome application, the user will only have access to the URLs of its authorized private web applications.