Intune Stuff | The Community place for Microsoft Intune, Intune Suite, Autopilot, macOS Management, Copilot for Security.

Android Intune Enrollment Profiles – Unconfuse the Confusion and make it Comprehensive & The 3 levels of the App protection policy framework

by | Jul 17, 2024 | Android, Device Management, Featured Post, Intune, MDM, Microsoft, Most Popular, Top Stories | 0 comments

Hi Community,

I’m getting a lot of questions these days regarding the different ways about Android Intune Enrollment. I will try to unconfuse the confusion. You can have lot’s of enrollment profiles as well as configuration profiles with different device experiences which can make things complicated and hard to get your head around it.

Also Microsoft has a very good guide on how to configure app protection and created a framework for this, see below for more information.

I hope this guide will give you a more clear vision of the different types of enrollment and for which use cases you can use them. Android Open Source Project (AOSP) & zero touch will not be in this blogpost.

In this guide I assume that your Intune tenant is setup and everything is ready to set-up Android devices.

 

All policies described in this article can be downloaded as JSON files from my github.

 

 

The Different Android Enrollment Profiles

We have 7 general enrollment profiles from which we can start.

  • Personally-owned devices with work profile
  • Corporate-owned dedicated devices Default
  • Corporate-owned dedicated devices with Entra shared mode
  • Corporate-owned, fully managed (default)
  • Corporate-owned, fully managed, via staging
  • Corporate-owned devices with work profile (Default)
  • Corporate-owned devices with work profile, via staging

 

Below i will explain each different enrollment method, you will see that they each have their own purpose and needs.

Let’s dive in!

 

Personally-owned devices with work profile

Enrollment profile settings

For the Personally-owned devices with work profile there are no specific settings to setup, this is the most common of the enrollment profiles.

Set up enrollment for bring-your-own-device (BYOD) and personal device scenarios using the Android Enterprise personally owned work profile management solution. During enrollment, a work profile is created on the device to house work apps and work data. The work profile can be managed by Microsoft Intune policies. Personal apps and data stay separate in another part of the device and remain unaffected by Intune.

 

Today, Android Enterprise work profile management for personal devices is allowed by default. In policies configured before July 2019 without any changes, the default setting blocks Android Enterprise work profile management. Microsoft Intune is ending support for Android device administrator management on devices with access to Google Mobile Services (GMS) on December 31, 2024. After that date, device enrollment, technical support, bug fixes, and security fixes will be unavailable. If you currently use device administrator management, we recommend switching to another Android management option in Intune before support ends. For more information, see Ending support for Android device administrator on GMS devices

 

Configuration profile settings

I have configured some baseline settings on the Android-DR-Personally-owned with work profile.json file.

 

How to enroll a Personally-owned devices with work profile

Your users must do the following steps. For the specific user experience, go to enroll the device.

  • Go to the Google Play store, and install the Company Portal app.
  • Users open the Company Portal app, and sign in with their organization credentials (user@contoso.com). After they sign in, your enrollment profile applies to the device.

Users may have to enter more information. For more specific steps, go to enroll the device.

Communicate enrollment steps to device users. Users typically don’t like enrolling themselves, and aren’t familiar with the Intune Company Portal app. Be sure to provide guidance, including what information to enter. For some guidance on communicating with your users, see here.

Users must be signed in to the primary user account on their device when enrolling. Enrollment isn’t supported on secondary user accounts. Personal devices previously enrolled with Android device administrator can unenroll, and then re-enroll using the work profile solution.

You can find the full end-user experience here.

 

 

Corporate-owned dedicated devices Default

Enrollment profile settings

This profile you would use in this case:

Android Enterprise supports corporate-owned, single-use, kiosk-style devices with its dedicated devices solution. These devices are used for a single purpose, such as digital signage, ticket printing, or inventory management. Admins can lock down the usage of a device to a single app, or a limited set of apps, inclusive of web apps. Users are prevented from adding other apps or taking actions on the device unless explicitly approved by admins.

As a standard Android Enterprise dedicated device. These devices are enrolled into Intune without a user account and aren’t associated with a user. These devices aren’t intended for personal apps, or apps such as Outlook or Gmail that require user-specific account data.

To create this profile go to this section click Create profile, give it a name e.g. Corporate-owned dedicated devices Default select the token type and an expiration date

The Microsoft article is found here

 

Click next and create. A token will be created for you to scan when enrolling a device.

 

Configuration profile settings

I have configured some baseline settings on the Android-DR-Dedicated Multi App.json or Android-DR-Dedicated Multi App.json file.

 

How to Enroll by using the QR code

Intune admins can scan the QR code directly from the enrollment profile to enroll a device. We recommend this enrollment method for most customer scenarios.

  • After you wipe the device, tap the first screen you see repeatedly to launch the QR reader.
  • If prompted to, install a QR reader on your device. Devices running Android 9.0 and later are preinstalled with a QR reader.
  • Scan the enrollment profile QR code, and then follow the on-screen prompts to complete enrollment

 

The Microsoft Intune app will be automatically installed during enrollment of a dedicated device. This app is required for enrollment and cannot be uninstalled. The Microsoft Authenticator app will be automatically installed during enrollment of a dedicated device when using the token type Corporate-owned dedicated device with Microsoft Entra ID shared mode. This app is required for this enrollment method and cannot be uninstalled.

 

Corporate-owned dedicated devices with Entra shared mode

As a standard Android Enterprise dedicated device that’s automatically set up with Microsoft Authenticator and configured for Microsoft Entra shared device mode during enrollment. These devices are enrolled in Intune without a user account and aren’t associated with a user. These devices are intended for use with apps that integrate with Microsoft Entra shared device mode, and allow for single sign-in and sign-out between users across participating apps.

The Microsoft article is found here

Enrollment profile settings

To create this profile go to this section click Create profile, give it a name e.g. Corporate-owned dedicated devices with Entra Shared mode select the token type and an expiration date.

 

Configuration profile settings

I have configured some baseline settings on the Android-DR-Dedicated Multi App.json or Android-DR-Dedicated Multi App.json file.

 

How to Enroll by using the QR code

Intune admins can scan the QR code directly from the enrollment profile to enroll a device. We recommend this enrollment method for most customer scenarios.

  • After you wipe the device, tap the first screen you see repeatedly to launch the QR reader.
  • If prompted to, install a QR reader on your device. Devices running Android 9.0 and later are preinstalled with a QR reader.
  • Scan the enrollment profile QR code, and then follow the on-screen prompts to complete enrollment

 

The Microsoft Intune app will be automatically installed during enrollment of a dedicated device. This app is required for enrollment and cannot be uninstalled. The Microsoft Authenticator app will be automatically installed during enrollment of a dedicated device when using the token type Corporate-owned dedicated device with Microsoft Entra ID shared mode. This app is required for this enrollment method and cannot be uninstalled.

 

Corporate-owned, fully managed (Default) & Corporate-owned, fully managed, via staging

Enrollment profile settings

This profile you would use in this case:

Set up the Android Enterprise fully managed device solution in Microsoft Intune to enroll and manage corporate-owned devices. A fully managed device is associated with a single user and is intended for work, not personal use. As an Intune admin, you can manage the whole device and enforce policy controls that aren’t available with Android Enterprise work profile, such as:

  • Allow app installation from Managed Google Play only.
  • Block users from uninstalling managed apps.
  • Prevent users from factory resetting devices.

 

Corporate-owned, fully managed (Default)

The Microsoft article is found here

 

Corporate-owned, fully managed, via staging

The device staging token, Corporate-owned, fully managed, via staging, enrolls devices into Microsoft Intune in a staging mode so that you or a third party vendor can complete all pre-provisioning steps. End users complete the last step of provisioning by signing into the Microsoft Intune app with their work or school account. Devices are ready to use upon sign-in. Intune supports device staging for Android Enterprise devices running Android 8 or later.

For more information, see Device staging overview.

The Microsoft article is found here

To create this profile go to this section click Create profile, give it a name e.g. Corporate-owned, fully managed (Default) or Corporate-owned, fully managed, via staging and select the token type.

 

Configuration profile settings

I have configured some baseline settings on the Android-DR-Fully Managed.json file.

 

How to Enroll by using the QR code

Intune admins can scan the QR code directly from the enrollment profile to enroll a device. We recommend this enrollment method for most customer scenarios.

After you wipe the device, tap the first screen you see repeatedly to launch the QR reader.
If prompted to, install a QR reader on your device. Devices running Android 9.0 and later are preinstalled with a QR reader.
Scan the enrollment profile QR code, and then follow the on-screen prompts to complete enrollment

 

Corporate-owned devices with work profile (Default) & Corporate-owned devices with work profile, via staging

Enrollment profile settings

This profile you would use in this case:

Android Enterprise corporate-owned devices with a work profile are single user devices intended for corporate and personal use.

End users can keep their work and personal data separate and are guaranteed that personal data and applications will remain private. Admins can control some settings and features for the entire device, including:

  • Setting requirements for the device password
  • Controlling Bluetooth and data roaming
  • Configuring factory reset protection

 

Tokens for corporate-owned devices with a work profile will not expire automatically. If an admin decides to revoke a token , the profile associated with it will not be displayed in Devices > By platform > Android > Device onboarding > Enrollment > Corporate-owned devices with work profile. To see all profiles associated with both active and inactive tokens, click on Filter and check the boxes for both “Active” and “Inactive” policy states. For corporate-owned work profile (COPE) devices, the afw#setup enrollment method and the Near Field Communication (NFC) enrollment method are only supported on devices running Android 8-10. They are not available on Android 11. For these version check out my article here: https://intunestuff.com/2023/12/20/intune-android-enrollment-in-a-loop-at-your-work-checklist-for-corporate-owned-devices-with-work-profile-when-using-afwsetup/

 

Corporate-owned devices with work profile (Default)

The default token, corporate-owned work profile, enrolls devices into Microsoft Intune as standard Android Enterprise corporate-owned devices with work profiles. This token requires you to complete pre-provisioning steps before you distribute the devices. End users complete the remaining steps on the device when they sign in with their work or school account.

 

Corporate-owned devices with work profile, via staging

The device staging token, Corporate-owned work profile, via staging, enrolls devices into Microsoft Intune in a staging mode so that you or a third party vendor can complete all pre-provisioning steps. End users complete the last step of provisioning by signing into the Microsoft Intune app with their work or school account. Devices are ready to use upon sign-in. Intune supports device staging for Android Enterprise devices running Android 8 or later.

For more information, see Device staging overview.

The Microsoft article is found here

To create this profile go to this section click Create profile, give it a name e.g. Corporate-owned devices with work profile and select the token type.

 

 

 

Configuration profile settings

I have configured some baseline settings on the Android-DR-Personally-owned with work profile.json file.

 

How to Enroll by using the QR code

Intune admins can scan the QR code directly from the enrollment profile to enroll a device. We recommend this enrollment method for most customer scenarios.

After you wipe the device, tap the first screen you see repeatedly to launch the QR reader.
If prompted to, install a QR reader on your device. Devices running Android 9.0 and later are preinstalled with a QR reader.
Scan the enrollment profile QR code, and then follow the on-screen prompts to complete enrollment

 

 

When to use the Managed Home Screen App VS the Launcher app

 

Microsoft Launcher is an Android application that lets users personalize their phone, stay organized on the go, and transfer from working from their phone to their PC. On Android Enterprise fully managed devices, Launcher allows enterprise IT admins to customize managed device home screens by selecting the wallpaper, apps, and icon positions. This standardizes the look and feel of all managed Android devices across different OEM devices and system versions.

The Managed Home Screen is the application used for corporate-owned Android Enterprise dedicated devices enrolled via Intune and running in multi-app kiosk mode. For these devices, the Managed Home Screen acts as the launcher for other approved apps to run on top of it. The Managed Home Screen provides IT admins the ability to customize their devices and to restrict the capabilities that the end user can access.

The are used in different scenarios. We can choose one according to our enrollment type. We can see more details in the following links:

 

 

The 3 levels of security – Microsoft Data Protection Framework using app protection policies

As more organizations implement mobile device strategies for accessing work or school data, protecting against data leakage becomes paramount. Intune’s mobile application management solution for protecting against data leakage is App Protection Policies (APP). APP are rules that ensure an organization’s data remains safe or contained in a managed app, regardless of whether the device is enrolled.

When configuring App Protection Policies, the number of various settings and options enable organizations to tailor the protection to their specific needs. Due to this flexibility, it may not be obvious which permutation of policy settings are required to implement a complete scenario. To help organizations prioritize client endpoint hardening endeavors, Microsoft has introduced a new taxonomy for security configurations in Windows 10, and Intune is leveraging a similar taxonomy for its APP data protection framework for mobile app management.

The APP data protection configuration framework is organized into three distinct configuration scenarios:

  • Level 1 enterprise basic data protection – Microsoft recommends this configuration as the minimum data protection configuration for an enterprise device.
  • Level 2 enterprise enhanced data protection – Microsoft recommends this configuration for devices where users access sensitive or confidential information. This configuration is applicable to most mobile users accessing work or school data. Some of the controls may impact user experience.
  • Level 3 enterprise high data protection – Microsoft recommends this configuration for devices run by an organization with a larger or more sophisticated security team, or for specific users or groups who are at uniquely high risk (users who handle highly sensitive data where unauthorized disclosure causes considerable material loss to the organization). An organization likely to be targeted by well-funded and sophisticated adversaries should aspire to this configuration.

In my personal opinion we can use these polices for these different user profiles:

  • Level 1: user profiles with very little to none sensitive/private or only public corporate data on their devices.
  • Level 2: user profiles with sensitive/private corporate corporate data on their devices –> for me this is the profile to use for general user profiles
  • Level 3: Sensitive user profiles, e.g HR, Accounting, Management, ….

 

Check out the full Microsoft article here for more information.

 

Level 1 enterprise basic data protection

Level 1 is the minimum data protection configuration for an enterprise mobile device. This configuration replaces the need for basic Exchange Online device access policies by requiring a PIN to access work or school data, encrypting the work or school account data, and providing the capability to selectively wipe the school or work data. However, unlike Exchange Online device access policies, the below App Protection Policy settings apply to all the apps selected in the policy, thereby ensuring data access is protected beyond mobile messaging scenarios.

The policies in level 1 enforce a reasonable data access level while minimizing the impact to users and mirror the default data protection and access requirements settings when creating an App Protection Policy within Microsoft Intune.

 

Level 2 enterprise enhanced data protection

Level 2 is the data protection configuration recommended as a standard for devices where users access more sensitive information. These devices are a natural target in enterprises today. These recommendations don’t assume a large staff of highly skilled security practitioners, and therefore should be accessible to most enterprise organizations. This configuration expands upon the configuration in Level 1 by restricting data transfer scenarios and requiring a minimum operating system version.

The policy settings enforced in level 2 include all the policy settings recommended for level 1. However, Level 2 only lists those settings that have been added or changed to implement more controls and a more sophisticated configuration than level 1. While these settings may have a slightly higher impact to users or to applications, they enforce a level of data protection more commensurate with the risks facing users with access to sensitive information on mobile devices.

 

Level 3 enterprise high data protection

Level 3 is the data protection configuration recommended as a standard for organizations with large and sophisticated security organizations, or for specific users and groups who will be uniquely targeted by adversaries. Such organizations are typically targeted by well-funded and sophisticated adversaries, and as such merit the additional constraints and controls described. This configuration expands upon the configuration in Level 2 by restricting additional data transfer scenarios, increasing the complexity of the PIN configuration, and adding mobile threat detection.

The policy settings enforced in level 3 include all the policy settings recommended for level 2 but only lists those settings below that have been added or changed to implement more controls and a more sophisticated configuration than level 2. These policy settings can have a potentially significant impact to users or to applications, enforcing a level of security commensurate with the risks facing targeted organizations.

To ensure that only apps supporting App Protection Polices access work or school account data, Microsoft Entra Conditional Access policies are required.

Check out these policies here

Also implement the steps in Block legacy authentication to block legacy authentication capable iOS and Android apps.

These policies leverage the grant controls Require approved client app and Require app protection policy.

I hope this will give you a clearer view on the different enrollment methods for Android devices. And as always if you feel there is something in error or you want to add some stuff from your own experience don’t hesitate to contact me!

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Discover more from IntuneStuff

Subscribe now to keep reading and get access to the full archive.

Continue reading