Managing Bring Your Own Device (BYOD) for Android with Microsoft Intune

BYOD For Android using Microsoft Intune

Alright, so today we’re going to be talking about the management of bring your own device BYOD for Android devices. There’s a lot of information out there for the management of iOS devices and you can do that with pretty much any Apple MDM on the market. We just happen to use Jamf where I work, but you could use anything from Braavos to SimpleMDM to Kanji or JumpCloud. Mosyle is also a great option.

Lots of really great solutions and lots of really great information out there. I’ve even written a blog and I’ll put a link here where you can get more information about user enrollment with iOS devices or Apple based devices. So lots of great information there, but not a lot of great information in terms of how do you manage Android devices.

Cant you manage devices with Google Workspace?

If you are a Google subscriber, you use Google Workspace, with that you already have the ability to manage devices directly within your Google Workspace account. In this post we’re not going to talk about that we’re going to focus on how we manage Android devices with Microsoft Intune.

If your already using O365 there is a solution

Within the Office 365 ecosystem, you have many things, maybe you have email through that platform, or you leverage OneDrive or Sharepoint. Many organizations use Microsoft Teams. Maybe you use Azure. In that case you are likely already using Intune to manage your Windows fleet. So how do we use, or how do we leverage the Intune ecosystem for the management of bring your own device for Android devices?

Well, it’s really Something that I think Microsoft has done well is they’ve partnered with Google and the integration with the Google Play ecosystem and allowed a lot of really great interactions between the Google sphere, Android and the management of devices. So I’m just going to walk you through this article online that talks a little bit about how to integrate these two systems.


Part 1: Connect Intune to Google Play Enterprise

So first thing that you’re going to need is you’re going to need an Office 365 account. You’re going to need to be an administrator. You’re going to need to have access to create a administrator account on the Google Play ecosystem. So I’m going to go ahead and you can see I’m logged into my Office 365 ecosystem.

You can see here that I am signed in with my little Playground account here over at Breedlabs. And I am logged into the Microsoft 365 admin center. So what I need to do is I need to go to Microsoft Intune. And I’m going to go ahead and just sign in with my account. And we also need to sign into Azure as well.

Blog Photo

So we’re going to be talking about the concept of managing devices, but also we’re going to be talking about the concept of doing so with a zero trust mindset. So in the article, it basically says, the first thing you have to do is go to the Intune admin center, go to devices and enrollment, and then click on the Android tab.

Blog Photo

So we’re going to go ahead and do that and click on devices. We’re going to go to Android and within this environment, we can see we have an enrollment tab. So the very first thing, the prerequisite is we need to connect this to a manage Google play accounts. I do not have one of those accounts, so I am going to go ahead and do that.

Blog Photo

I’m going to click on, I agree. And then we click on launch Google to connect. Now, now it’s going to pop up an option here. I’m going to go ahead and, and just kind of follow these prompts. I’m going to sign in. With my Microsoft account, I’m going to consent and accept.

Blog Photo

All we need is this Android enterprise subscription and it’s free as you can see and I agree and allow and create account. I’m setting this up with my Microsoft account through Google and I’m essentially authorizing the Microsoft Intune ecosystem to manage applications that are enrolled with my company information.

We need to think about BYOD very holistically. So not only do we want to make sure that if we are offering a BYOD program, we’re doing it for people who have Android devices and Apple devices, people who have Windows devices and Apple devices. So any kind of device that someone could bring to, into your work ecosystem.

You have to have a way of managing that and you have to have rules set up for how you want to interact with them or how do you want to manage them. Okay. So now that I have this set up, we are essentially going to be configuring the personally owned devices with work profile.


Part 2: Configuration of Microsoft Intune

Now we’re going to set up some configurations. So we want to create the baseline standard of security for our,

there we go. For our managed bring your own device. So I am going to go with Android Enterprise and we’re going to click, we’re going to stick with these personally owned work profile. So we only want to restrict settings specifically within the context of the work profile. So Android is great because it creates an actual separation between personal and work on the end user’s device.

So we’re not actually managing the information on the personal side of the device. We are managing the settings and elements on the work profile. So, I’m going to go ahead and just click on device restrictions. And we’re going to set up some common Bring your own device Android restrictions.

Blog Photo

So we’re not going to do a lot of restrictions, but we want to make sure that we are blocking, cutting and pasting between the work and personal profiles. And that is a device that’s a default. That’s all on the moment you create this profile. We don’t want to, We’re just going to select device default where it says data and sharing between work and personal profiles.

Blog Photo

Work profile notifications while device are locked. We’re going to go ahead and block that default app permissions. We’re going to keep those standard screen capture. We’re going to block, we’re going to allow sharing via Bluetooth because we have found that if you turn this off Connections between Bluetooth keyboards and headphones can be disrupted.

Blog Photo

Display work, contact, caller ID, and personal profile. We’re going to block that. We’re going to allow the use of the camera and we’re going to keep all of these other items as default for all the Android devices. We’re going to require a passcode specifically for the work ecosystem. And we are going to have the phone lock after one minute of inactivity.

We’re going to require threat scan on apps and we’re going to make sure that we prevent installation of unknown sources in the personal profile. We don’t have an always on VPN. We’re not going to enable lockdown mode. And that, that’s it. We’re going to go ahead and just scope this to all devices. If you were setting this up in your ecosystem, I would highly recommend scoping this to a specific group.

In fact, let’s just go ahead and go through the process of creating a group. So we’re in Entra. If I go to groups, all groups, I’m actually just going to do it. I’m going to create a new group And I’m going to call it Android BYOD.

No users, no devices assigned just yet. I’m going to add a group. Android BYOD, there it is. Next, create. Alright, so now we have a configuration. I’m going to go ahead and just create a couple more.


Part 3: Time for Device Compliance

So I think a lot of people get compliance and configuration Confused because they think well, I’m going to create a compliance Profile and that compliance profile is going to enforce Security settings no compliance In this context is reporting on the state of settings that you define as the compliant level, if the device has that setting, then it will be marked as compliant. So we’re going to go ahead and do that now. So I’m going to click on compliance and we see here that we already have a default compliance policy.

I click on properties and I click on edit. I can edit. the compliance settings and I can see what options we have here.

So I can set this to say, I want this device to have a low require this device to be at or under the low machine risk score devices managed with the device with device administrator rooted devices block. Google Play Protect is configured. We want that, we want that, we want that. Remember, we just set these as configuration properties.

Blog Photo

I’m not gonna set the minimum OS version just yet. I do want the device to be re encrypted. I do wanna block apps from unknown sources. We do wanna require this. And I’m gonna leave everything else. the default. Require a password? Yes, require. Now I’m going to save these policies. Now I have my compliance profile, which is outlining what I am requiring the device to be at in terms of configurations or settings for the device to be marked as compliant.

Blog Photo


Part 4: Conditional Access Policies in Azure

Within Conditional Access, we’re going to set up a few policies. So a few conditions that people must follow when they interact with your Office 365 ecosystem. So if we click up here, we can see that we have several policy templates. I love these because we can actually set up our entire program with a few clicks.

Blog Photo

So we want to require multifactor authentication for admins. We definitely want to do that. So I’m going to go ahead and click on review and create. And I’m just going to put this in a report only for now. Report only means that it’s not going to enforce the condition yet until we get more information about how it might be operating within our ecosystem.

Next thing we’re going to do is we’re going to require MDM enrolled and compliant device to access cloud apps. So this is, otherwise known as zero trust.

We’re talking about Android in this blog. I’m going to just select me as the person who it’s targeting so that I can test this before applying it to everybody. Let’s click on target resources. So we’re basically saying all cloud apps.

Blog Photo

Now I have seen some issues that if you use single sign on, which is something that’s highly recommended if you’re going to be setting up a zero trust network. But if you use Office 365 for single sign on let’s say for Box. com and you are blocking access to Box. com for authentication using Office 365 and it would fall under the umbrella of all resources and it could be kind of a catch 22.

All right, so now I’ve got my target resources. Now what I need to do, if I wanted to specifically set up this policy just for a specific device platform, I could do that by pressing configure, and I can select just Android, but I don’t want to, I want this to apply to all devices. So we’re gonna go ahead and keep that as not configured.

Blog Photo

And finally, where it says Grant. We have to make sure that the device is marked as compliant. So I’m going to go ahead and press select. I’m going to turn this on and I am going to say security defaults must be disabled to enable conditional access policy.

Blog Photo Blog Photo


Part 5: App Configuration for Android and Google Play

Alright, so now I have that conditional access policy in place. And I am good to go. So now I have my Android environment. I have my conditions set up. The final thing I need to do is have a few of my work apps installed on my Android device. When the device is enrolled.

Blog Photo

And you can see here that there’s four tools or, or apps that are added for me, but I have not yet assigned them. So I’m going to go ahead and do that. I’m going to click on the properties and we have to set up an assignment. I’m going to add a group and I’m going to scope this to the Android BYOD group.

I’m going to add two more apps. I’m going to click on manage Google play app and select and we are going to add the Google Chrome app. So you select it, you click select, and then you press sync. Not super intuitive, but now it’s going to sync over. I’m going to add one more app.

And I am going to go ahead and add Dropbox, select and sync. So these two apps will show up here once they’ve synchronized into my ecosystem. Again, this is that connection that we created with our Google Play Enterprise account and the connection in with Intune. So there is Google Chrome. It comes in on a sign.

So I’m going to go ahead and assign it to all members of the BYOD group.

Blog Photo

And then I am going to refresh until we see Dropbox in the list here. And there it is. And we’re going to assign that also to the BYOD group. All right. So now we have our entire ecosystem set up. We have it set up where if I’m an Android user and I want to access a company resource, I have to enroll my device.


Part 6: Test the Enrollment Process

So now we need to test this out and make sure that it works. Good news is it should work. Bad news is I don’t actually have an Android device. I have only Apple devices. So in that, Situation. What do I do? Well, the easiest way to handle this is to open up Android Studio. Android Studio is a open source or a free developer tool that Google Android has put out there.

Blog Photo

We already have this installed. So I’m gonna go ahead and just open it up Android studio So here it is and I’m going to create a new project File new project and the installation by the way of Android studio Is very simple once you once it downloads you drag it into your applications folder If you’re on a Mac double click the installer if you’re on Windows, then And you’re presented with this sort of like splash screen and the ability to create a project.

Blog Photo

So whenever I’m just trying to test something on a virtualized device inside of Android Studio, I always just click empty activity because I’m not actually creating an app. And I’m just going to call it BYOD test and press finish. So now that I have my Android Studio ecosystem. I can go to tools up here in the menu bar and I can go to device manager and that brings over my device manager and I have the ability to create a virtual device.

Blog Photo

Blog Photo

Now we need to make sure that we pick a device that’s new enough. And also has the Google Play Store pre installed. So you see how we have this column that says Play Store, and we see this icon, the Google Play icon, indicating that, in fact, it does have Google Play pre installed.

Blog Photo

If I press Next, it’ll ask me to confirm the operating system that I want, and you need to make sure, again, confirm that it has in brackets, Google Play, because if it doesn’t have the Google Play app pre installed, then you’re going to have to start over again as we need to install the company portal app in order to manage the device.

Blog Photo

I’m going to click on finish and here is my device here. So I’m going to go ahead and just start this device. I’m just going to make this a little bit bigger so that it’s easier to see the device. So, it’s connecting to the emulator, it’s booting up the Android phone.

Blog Photo Blog Photo Blog Photo

And it’s going to automatically put me into a, a mode here where I need to sign in to personalize the device.

Blog Photo

Now first thing you have to do is you have to go into the settings on the phone and you need to make sure that the SIM card has mobile data turned off. This in the emulator causes some disruption in terms of the bridged internet connection that you’re sharing with your Mac or PC to the phone itself.

So I just turned that off and get rid of that. All right. Next step is to sign in with the Google play store. So it’s going to check your accounting your check your device. for eligibility and then you have to sign in.

Blog Photo

So we’re going to just click through all these and search for company portal. There it is. And we’re going to install it.

Blog Photo Blog Photo

Once we have this app installed, it’s going to allow us to create a work profile. Here are the things that it can what the MDM can do. Here’s what the company might see.

And then it’s going to go ahead and facilitate the creation of that work profile environment on the device. We’re going to accept and configure accepting, continue work apps, as explained here are being separated from personal apps and it’s setting up the work profile now.

Blog Photo

And we next company portal is going to validate everything and it’s going to activate the work profile. We’re going to continue that process and it is now registering the device. It’s adding the device to the company portal, which means that if I go back to Intune here, we should eventually see Our new device show up in the platform

So this is the device. And we’re just going to check to see if it is compliant. Now remember the settings and compliance not going to trigger until we put this device in the group that we created. So if we go back into our group area and we look at our BYOD group, we need to make sure that we are adding that member.

Blog Photo

It’s going to apply those security standards, and it’s going to install. those two work apps that we told it to install. So Chrome and Dropbox.

Blog Photo Blog Photo

We can see that they are pending installation status and if I go back to the company portal app and now click on get apps. I should eventually see applications installing here and we can see that they are in queue and we can see that the device configuration is being applied and it can say it says here that it can take up to 20 minutes for this to all propagate down.

The whole point of this being that yes, it can take some time, but now at least you have a way for it that you can test what the actual experience is like for people who have Android devices. So we have our work profile, we have our personal profile and now we can access specific company resources.

Sources

AI Usage Transparency Report

AI Era · Written during widespread use of AI tools

AI Signal Composition

Rep Tone Struct List Instr
Repetition: 52%
Tone: 45%
Structure: 59%
List: 5%
Instructional: 100%
Emoji: 0%

Score: 0.45 · Moderate AI Influence

Summary

This article discusses the management of bring your own device (BYOD) for Android devices using Microsoft Intune. It covers the process of connecting Intune to Google Play Enterprise, configuring personally owned devices with work profiles, and setting up device restrictions.

Related Posts

Setting up Ollama on macOS

Recently, after some bad experiences with OpenAI's ChatGPT and CODEX, I decided to look into and learn more about running local AI models. On its face it was intimidating, but I had seen a lot of people in the MacAdmins community posting examples of macOS setups, which really helped lower the bar for me both in terms of approachability and just making me more aware of the local AI community that exists out there today.

Read more

AI Agent Constraints and Security

I really feel like in this era of AI it's essential to write about and share experiences for others who are leveraging AI, especially now that AI usage seems almost ubiquitous. Specifically, when it comes to AI in development and the rapid growth of AI-driven automations in the IT landscape, I believe there's a need for open discussion and exploration.

Read more

Vibe Coding with Codex: From Fun to Frustration

So there I was, a typically day, a typical weekend. As a ChatGPT customer, I had heard good things about Codex and had not yet tried the platform. To date my experience with agentic coding was simply snippit based support with ChatGPT and Gemeni where I would ask questions, get explanations and support with squashing bugs in a few apps that I work on, for fun, on the side. There were a few core features in one of the apps I built that I wanted to try implementing but the...

Read more

Turn Jamf Compliance Output into Real Audit Evidence

Most teams use Apple’s macOS Security Compliance Project (mSCP) baselines because they scale and they’re repeatable. Jamf’s tooling makes deployment straightforward and the Extension Attribute (EA) output is a convenient place to capture drift. What you don’t automatically get is the artifact an auditor will accept on a specific date—an actual document you can file that shows which endpoints are failing which items, plus a concise roll-up of failure counts you can act on. Smart Groups answer scope; they don’t produce evidence.

Read more

Secure Software, Secure Career: How I Passed the CSSLP

After passing the CISSP earlier this year, I decided to follow it up with the **Certified Secure Software Lifecycle Professional (CSSLP)** certification. For those unfamiliar, CSSLP is an ISC2 certification that focuses specifically on secure software development practices across the full SDLC—from requirements and design to coding, testing, deployment, and maintenance. My goal in pursuing this certification was to further develop my skills in ensuring the security of software throughout its entire lifecycle.

Read more

Good Cybersecurity policies, procedures, guidelines take time. They're not rushed and aren't rubber stamped

Cybersecurity is no longer a luxury or an afterthought—it's an absolute necessity. But how can you tell if the company you work for, as a security professional, truly values cybersecurity? Let's explore some clear indicators that demonstrate a company's commitment to implementing robust security practices in-house. A genuine commitment will be reflected in the organization's policies and procedures, which should be regularly reviewed and updated to address emerging threats.

Read more

BYO with me in 2025: iOS with User Enrollment in JAMF Pro

It really depends on your company's needs. For example, many companies need to hire 1099 contractors and in such a case they come with their own devices but not the correct security settings or enforcements. Remember BYOD is a security construct. The idea here is that you should be securing the company's sensitive data in all forms. This may involve implementing policies for contractor-owned devices, ensuring that all devices accessing company data meet minimum security standards, and regularly reviewing and updating these standards to stay ahead of emerging threats.

Read more

Securing BYOD Email Access: Exploring Strategies in Microsoft 365

In today’s mobile-first world, organizations increasingly rely on Bring Your Own Device (BYOD) programs to empower employees while optimizing costs. However, this flexibility introduces unique challenges, particularly around securing email access. To mitigate risks, we are implementing a comprehensive strategy to block email access on non-company devices by default and ensure only sanctioned apps can access organizational email accounts. This approach will help prevent unauthorized access and data breaches, aligning with our commitment to maintaining the security and integrity of company communications.

Read more

How I Conquered the CISSP Exam: 9 Months, Top Resources, and Proven Strategies

Passing the CISSP (Certified Information Systems Security Professional) exam is no small feat. It’s known for its breadth, depth, and ability to test not just your knowledge but your practical understanding of cybersecurity. After nine months of intense preparation, I’m thrilled to say I’ve joined the ranks of CISSP-certified professionals! Here's a detailed account of my experience, including the resources I used, some tips that helped me along the way, and what I learned from the process itself.

Read more

Enhancing Cybersecurity on macOS: Empowering Users for a Safer Digital Journey!

macOS has earned a strong reputation for built-in security, but the real value of the platform is not just that protections exist. It is that Apple continues pushing the operating system toward more context-aware security decisions that help users make better choices before a problem becomes a breach. This approach allows users to understand and mitigate potential risks in real-time, rather than simply reacting to threats after they've occurred.

Read more