Skip to content
English
  • There are no suggestions because the search field is empty.

Which Browsers Are Officially Supported by Empath?

This article explains which browsers are recommended for Empath, which alternatives may work, and how browser extensions, hardening tools, and virtualized workstations can affect performance. Includes requirements for cookies, token passing, and whitelisting app.empathmsp.com.

Which Browsers Are Officially Supported by Empath?

Summary

Empath is a modern SaaS application, and like most browser-based platforms, performance depends on both the browser you use and how that browser is configured. While Empath will generally function across all major browsers, our development team performs the most consistent QA on Google Chrome and Microsoft Edge, making them the recommended choices. Using these browsers in an unmodified state provides the highest reliability, especially regarding cookies, authentication tokens, embedded content, and progress tracking. This article explains recommended browsers, acceptable alternatives, configuration requirements, and special considerations for hardened or virtualized environments.


Primary Supported Browsers (Recommended)

These browsers receive the most QA attention and consistently deliver the best results.

Google Chrome or Microsoft Edge

  • Fully supported and tested by the Empath development team

  • Best performance when used in a standard, unmodified configuration

  • Most reliable for:

    • Login and authentication

    • Progress tracking

    • Embedded content (YouTube, iframe-based embeds, Microsoft Learn, etc.)

    • Course navigation and reporting

  • If you run browser extensions or hardening tools, ensure Empath is whitelisted

Important configuration notes:

  • Local cookies must be enabled for Empath to function properly

  • Authentication and progress tracking rely on the ability to pass tokens

  • Whitelist the following if you run ad blockers, script blockers, tracking protection, or browser-hardening tools:
    app.empathmsp.com


Secondary Browsers (Supported, but Less QA Tested)

Empath should function normally in these browsers, but we perform limited QA, and behavior may vary depending on configuration. Generally speaking Empath should function well in most general purpose browser environments.

Browsers known to work in typical conditions:

  • Mozilla Firefox (vanilla configuration)

  • Safari (macOS, standard configuration)

These browsers have been used successfully in testing and anecdotal partner use. They are not considered primary supported browsers solely because Empath has undergone less structured QA in them.

Your mileage may vary if:

  • Extensions modify cookie behavior

  • Anti-tracking features block authentication tokens

  • Shields or privacy modes block iframe content

  • Browser hardening tools override site permissions


Browser Extensions, Hardening Tools, and Policy Considerations

Because Empath is a SaaS platform, certain modifications can interfere with key functionality.

If you use tools such as:

  • Atakama

  • Defense X

  • uBlock Origin

  • Ghostery

  • DuckDuckGo Privacy Essentials

  • Enterprise browser management policies (Intune, GPO, third-party endpoint tools)

You must:

  • Whitelist app.empathmsp.com

  • Allow local cookies

  • Allow token passing / cross-site navigation

  • Permit iframes for embedded content

Failing to do so may cause:

  • Course progress not tracking correctly

  • Embedded content showing blank or requesting login unexpectedly

  • The dashboard not loading properly

  • Inconsistent navigation behavior


Special Consideration: Virtualized or Cloud Workstations

If you access Empath from a distributed platform such as:

  • AWS WorkSpaces

  • Azure Virtual Desktop

  • Nerdio

  • Other DaaS or VDI environments

You may encounter occasional issues due to how third-party platforms treat traffic from large cloud data centers.

Common symptoms include:

  • Embedded platforms (especially YouTube) asking you to log in again

  • External content treating your session as suspicious or “bot-like”

  • Rate-limiting or additional verification prompts

This is expected behavior and related to how major web services classify data-center traffic. If you submit a support ticket, please include that you are using a virtualized or cloud workstation.