Back to Blog
Andriod desktop groups7/26/2023 Learn about the Microsoft-recommended methodology for deploying the security configuration framework.Ĭonfigure device enrollment restrictions for personally owned devicesĪpply these restrictions to configure a basic or high security level for devices that are personally owned with work profile.ĭisallow personal accounts on Android Enterprise devices Learn about the Android Enterprise framework deployment methodology This configuration enforces stricter Android version requirements and other device restrictions, and introduces mobile threat defense or Microsoft Defender ATP.įor more information about the security framework, see the articles listed in the following table. For example, users who handle highly sensitive data where unauthorized disclosure causes considerable material loss to the organization. High security (Level 3) – This configuration is recommended for devices used by specific users or groups who are uniquely high risk. It's applicable to most mobile users accessing work or school data on a device. It enforces stronger password policies and disables user and account capabilities. It enforces password requirements, minimum Android version, and certain device restrictions.Įnhanced security (Level 2) – This configuration is recommended for devices from which users access sensitive or confidential information. The security levels for fully managed devices are:īasic security (Level 1) – This configuration is recommended as the minimum security configuration for supervised devices where users access work or school data. This configuration introduces mobile threat defense or Microsoft Defender Advanced Threat Protection (ATP), enforces stricter Android version requirements, enforces stronger password policies, and further restricts work and personal separation. This configuration introduces password requirements, separates work and personal data, and validates Android device attestation. The security levels for personally owned devices with work profile are:īasic security (Level 1) – This configuration is recommended as the minimum security configuration for personal devices where users access work or school data. Each security level builds off the previous one to offer more protection than the last. It includes recommended settings for basic, enhanced, and high-level security. The taxonomy for this framework is similar to the one used for security configurations in iOS. You can apply them to devices that are fully managed or personally owned with work profiles. These recommendations can help you tailor your organization's mobile device security protection to your specific needs. The Android Enterprise security configuration framework is a series of recommendations for device compliance and configuration policy settings. Leverage the Android Enterprise security configuration framework Create support, testing, and validation plans.Create rollout and communication plans.Determine goals, use-case scenarios, and requirements. The guide provides information to help you: Use the Microsoft Intune planning guide for help with planning, designing, and implementing Microsoft Intune in your organization. Have Global Administrator or Intune administrator Azure Active Directory permissions.For more detailed information about how to set up, onboard, or move to Intune, see the Intune setup deployment guide. Prerequisitesīefore you begin, complete these prerequisites to enable Android device management in Intune. This guide provides Android-specific resources to help you set up enrollment in Intune and deploy apps and policies to users and devices. Intune supports the mobile device management (MDM) of Android devices to give people secure access to work email, data, and apps.
0 Comments
Read More
Leave a Reply. |