
No-Faffing Managed IT Support & Cyber Security Support. Made in Yorkshire, built for the UK.
A recent YouTube video by Jonathan Edwards argues that businesses should stop using Chrome for work that involves Microsoft 365 and switch to Edge instead. He explains that the issue is not casual browsing but the way browsers convey security and device signals to Microsoft services. Consequently, the video frames this as a practical security gap that many organizations do not notice until access problems or data risk appear.
Edwards clarifies that he does not call for a complete ban on Chrome; rather, he recommends reserving Chrome for personal tasks while using Edge for corporate email, SharePoint, OneDrive, and Teams. The video includes a demonstration of blocking Microsoft 365 access when users attempt to authenticate via Chrome, showing what administrators can enforce. Therefore, the central message is both technical and pragmatic: protect company data with a browser that understands Microsoft’s security signals.
According to the video, Chrome cannot fully pass Microsoft 365 security checks because it does not natively surface the same device and identity signals that Microsoft expects. As a result, Conditional Access and device compliance rules can be bypassed or misapplied when sessions originate in Chrome. This limitation creates gaps where company data might be accessed without the same endpoint protections that exist for Windows devices or managed browsers.
Moreover, Edwards notes that these gaps can lead to confusing user experiences, such as repeated prompts to authenticate or unexpected blocks that look like system errors. Administrators then face help-desk calls and potential productivity loss while they investigate whether a policy, a device setting, or the browser itself is at fault. In short, the issue is not only security but also the operational cost of troubleshooting ambiguous failures.
Edwards shows that Edge, while built on the Chromium engine, carries additional Microsoft-specific integrations that allow it to convey device state and compliance details back to Microsoft 365 services. Consequently, Conditional Access policies and device compliance checks can evaluate sessions more accurately when users are on Edge. This alignment reduces false positives and allows administrators to enforce security controls without unnecessarily blocking legitimate users.
In the demo, enforcing Edge for Microsoft 365 sessions immediately restored expected policy behavior, while Chrome sessions remained limited or blocked. In addition, Edge offers management hooks and controls that make it easier for IT to deploy consistent settings across corporate endpoints. Thus, the browser acts both as a productivity tool and as another layer of enterprise control.
Transitioning to Edge for corporate work brings trade-offs. On one hand, it improves policy enforcement and reduces risk to company data; on the other hand, it introduces administrative overhead and potential user resistance. Changing habits, supporting different operating systems, and dealing with bring-your-own-device (BYOD) scenarios complicate a simple switch.
Furthermore, Edwards highlights that strict enforcement can disrupt workflows if organizations move too quickly. For example, macOS, Linux, or unmanaged devices may require exceptions or additional tooling, and some legacy web apps might behave differently in any managed browser. Therefore, IT teams must balance security gains with support costs and the potential for degraded user experience if policies are applied without a thoughtful rollout.
Edwards offers pragmatic steps for administrators who want to protect Microsoft 365 data without unduly harming productivity. First, pilot Conditional Access rules targeted to sensitive groups and apps and measure the impact before broad enforcement. Then, communicate clearly to users why the change matters and provide guidance on when to use Edge versus Chrome for personal browsing.
Next, the video recommends phased enforcement and monitoring: give help-desk teams clear runbooks for common issues, and collect telemetry to identify apps or endpoints that need exceptions. Finally, use device compliance checks and managed browser capabilities where possible so policies are both enforceable and transparent. By combining technical controls with careful change management, organizations can strengthen security while minimizing disruption.
Jonathan Edwards’ video makes a clear, actionable case that using a browser which natively understands Microsoft signals improves the effectiveness of Microsoft 365 security controls. While the recommendation favors Edge for corporate Microsoft 365 work, he stresses measured adoption to avoid user disruption and unnecessary support costs. Thus, the choice involves balancing stronger policy enforcement against the practical challenges of deployment and user acceptance.
In conclusion, organizations should review their Conditional Access and device compliance posture and consider a phased move toward managed browser use for corporate Microsoft 365 access. By doing so thoughtfully, IT teams can reduce risk, streamline investigations, and maintain a better user experience over time. The video serves as a useful prompt for IT leaders to reassess browser strategy in a Microsoft 365 environment.
stop using Chrome for Microsoft 365, switch to Edge for Microsoft 365, best browser for Microsoft 365, Microsoft 365 browser compatibility, Edge vs Chrome for Office 365, improve Microsoft 365 performance browser, use Edge for Office apps, Edge security for Microsoft 365