Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Android»How to configure Android Corporate owned, personally enabled user devices with Microsoft Intune
    Android

    How to configure Android Corporate owned, personally enabled user devices with Microsoft Intune

    Peter KlapwijkBy Peter KlapwijkJuly 21, 2020Updated:August 18, 2020810 Mins Read

    Last week Microsoft announced the public preview for Android Enterprise corporate-owned devices with a work profile support in Intune, also known as Corporate-owned, personally enabled (COPE) devices.

    This is a long-awaited management mode for many customers. This management mode provides an option to manage the Android device itself but also separate personal and corporate data by using a work profile container. Work profile we already know of the personal owned devices with a Work profile.

    With this latest update, we now have 4 MDM Management scenarios (in preview) available in Microsoft Intune.

    As the device itself is managed, this also provides a zero-touch enrollment, for example with Samsung Knox Mobile Enrollment. This makes the enrollment of a device much simpler for the end-user as it enrolls itself in Intune as soon as the device starts the out-of-the-box experience.

    As this management mode is just released in preview, not all management features are directly available. For a current list of features which are and which are not available, read the announcement blog on Tech community.

    Let`s have a look at what the current experience is in setting up the new Corporate-owned, personally enabled management mode in Microsoft Intune as admin and what the experience is for the end-user.

    Create COPE enrollment profile

    Assuming you have already connected your Managed Google Play account with Microsoft Intune, the first thing we need to do is creating an enrollment profile for Corporate-owned devices with work profile.
    In this profile enrollment information is stored like the enrollment token and a QR Code. For manual enrollment, the QR Code is needed. If you setup Google Zero-Touch or Knox Mobile Enrollment you need the token.

    • Sign-in to the Endpoint Manager admin center
    • Browse to Devices – Android
    • Browse to Android enrollment
    • Click on Corporate-owned devices with work profile
    • Click +Create profile
    • Give the enrollment profile a Name
    • Enter a Description (Optional)
    • Click Next
    • Review the information
    • Click Create

    The enrollment profile is created. The enrollment token and QR Code are found on the Token tab. Depending on how the enrollment is done, one of those are needed later.

    Create a dynamic group (optional)

    To only target policies, apps etc. to Android COPE devices, an option is to target these to a dynamic security group. In the query we can use the enrollment profile name, so only devices that are enrolled with this profile are added to the group.
    A down-side of using such a group, it takes some time before the device is added to the group and therefore it takes some time before policies are applied or apps are installed.

    • Sign-in to the Azure Active Directory admin center
    • Browse to Groups
    • Click + New Group
    • Choose Security as Group type
    • Enter a Group name
    • Enter a Group description (Optional)
    • Choose Dynamic device as Membership type
    • Click Add dynamic query
    • Choose enrollmentProfileName as Property
    • Choose Equals as Operator
    • Enter the enrollment profile name as Value
    • Click Save – Click Create

    The dynamic security group is created. Devices enrolled via this enrollment profile are automatically added to this group.

    Create a Device restrictions profile

    To apply some restrictions to the device and the work profile, we need to create a Device restrictions profile. Restrictions I set in this example are related to the work profile, device password and the Google Play store.
    I want to block taking screen captures of the work profile. I set a minimum password length of 8 and I want to allow access to the public Play store on the personal part of the device, but I want to restrict access to the Play store in the work profile to only work apps I make available.

    • Switch to the Endpoint Managed admin center
    • Browse to Devices – Android
    • On the Configuration profile tab click + Create profile
    • Choose Android Enterprise as Platform
    • Choose Device restrictions under Fully Managed, Dedicated….
    • Click Create
    • Give the profile a Name
    • Enter a Description (Optional)
    • Click Next

    The settings I set in this profile are just for testing and pretty basic. Choose your own settings that you need in your environment.

    • Open General
    • Set Block at Screen capture (work-profile level)
    • At Default permissions choose Auto grant from the drop-down list
    • Open Password
    • Set Minimum password length to 8
    • Open User and accounts
    • Set Personal Google accounts to Block
    • Open Applications
    • Make sure Allow access to all apps in Google Play store is set to Not configured

    When all settings are in place, assign the profile to the previously created security group.

    Create a Compliance policy

    To make sure our devices are secure and required (security) settings are in place, we use compliance policies.
    The settings we configure here are settings that are checked on the device level, which we also have available for Fully managed devices. This might change later during preview or when COPE is General Available.

    • Browse to Devices – Android
    • On the Compliance policies tab choose +Create policy
    • Choose Android Enterprise as Platform
    • Choose Fully managed, dedicated, and corporate-owned work profile as Policy type
    • Click Create
    • Give the policy a Name
    • Enter a Description (Optional)
    • Click Next
    • Enter all the compliance settings of choice
    • When finished click Next

    When all settings are in place, assign the profile to the previously created security group.

    Applications are deployed like we are used for Android Enterprise as Managed Google Play Store app. The apps we deploy as required or made available or are installed in the work profile container and not in the personal part of the device.

    End-user experience

    In the end-user experience part of this post, I first show how enrollment is done by scanning the QR Code. The enrollment looks pretty familiar to the enrollment of a Fully Managed device using the QR code. The device is first prepared for enrollment, if that is finished you need to authenticated and the Intune enrollment experience is started.

    After that we have a look what the end-result is when the enrollment is finished.

    Enrollment is done with a Nokia running Android 9. Screenshots you see might differ when you use a device from a different vendor and a different Android version. Also, different required settings deployed with a configuration profile or compliance policy might cause a different enrollment experience.

    To start the enrollment manually, tab 7 times on the free space of this first screen. This will start the manual enrollment by starting the QR code scanner. Scan the QR Code which is found on the token tab of the enrollment profile we previously created. This QR Code can be printed to hand over to your service desk or end-user.

    If you use Google Zero-Touch enrollment or Samsung Knox Mobile Enrollment scanning the QR code is skipped and enrollment should immediately start.

    If the device has a network connection, the enrollment is started, otherwise you`re asked to connect to a Wi-Fi connection.
    Click Accept & Continue to accept the terms.

    Setting up work device…
    The enrollment is started.

    Updating device…
    The Google Play Store is being updated.

    Setting up work profile…

    During the setup of your work profile, a few screens are shown with information about the separation of personal and work-related apps.

    When this preparation is finished, click Done.

    Your subtitle here

    Registering profile…

    Click Accept & Continue

    A sign in screen is shown to authenticate with your corporate credentials. Enter your username and password.

    Setting up device…

    Registering profile….
    Applying your organizations`s policies

    Setup your work profile.
    Click Install

    If a policy kicks in at this moment to set a PIN and encrypt the device, that`s the first step in this enrollment wizard. During my enrollments these where delayed and this was handled later during enrollment.

    The required apps Microsoft Authenticator and Microsoft Intune are installed in the work profile. These apps don`t need to be assigned as required by the IT admin, this is done automatically in Intune.
    Additional apps that are assigned by the IT admin are installed as well, but the enrollment wizard doesn`t wait for these to complete installing.

    If a device policy kicks in at this moment, in which you set encryption and a PIN code as requirements, that part of the enrollment is started.

    Click Start.

    Depending on the requirements, set a PIN and enable secure startup.

    The next step is the registration of the device using the Intune app.
    Click Start.

    The Microsoft Intune app is started.
    Click Sign in.

    We need to authenticate again.

    Click Register.

    Signing in…

    Registration is finished.
    Click Done.

    The setup of the device is finished, the device is managed by Intune and a work profile container is created with work-related apps.
    Click Done.

    Pretty soon after finishing the work-related registration and setup, you`re asked to add your personal account.
    This account is your personal Gmail account used to access the Google Play store etc on the personal part of the device.
    Click Next.

    Enter your Gmail account and password to finish this personal part of the setup.

    The setup is now completely finished!
    As you can see personal and corporate apps are separated. The corporate apps are stored in a work profile section.

    Depending on the device restrictions settings, the Google Play Store in the work profile container only shows apps which are made available via Intune.

    Taking a screen capture is restricted in the work profile section as I configured in the device restrictions policy, but allowed on the personal section of the device.

    Admin experience

    If we take a look at the Endpoint Manager admin center, under Android devices, we see our newly enrolled device. The OS is Android (corporate-owned work profile).

    If we take a look at the overview tab of the device we see the ownership is corporate, the serial number, Device manufacturer and Device model.
    Here you also find options like Wipe (factory reset) and Remote lock.

    The Compliance policy is applied.

    The Configuration profile is also successfully applied.

    As I have an App Configuration Policy assigned, that one is also applied.

    If we take a look at the device in Azure AD, we see the OS is AndroidEnterprise. As this is equal to our Fully Managed devices, we cannot use the OS to only group our COPE devices as the group would contain both Fully managed and COPE devices.

    Conclusion

    I`m ending this post with a short conclusion with keeping in mind this is a feature in preview.
    The enrollment works pretty fine. It looks familiar to the enrollment process of a Fully Managed device. I noticed that sometimes to enrollment process doesn`t end with entering your personal Gmail account. No big deal as you can enter it for example when you open the Google Play Store for the first time but would be nice if the process is always the same.
    Another thing I noticed is with the Outlook mobile app. As soon as I configure the app as end-user a pop-up is shown with a message I need to install the Company app. If I don`t install the app, my account is removed from Outlook. I forgot to exclude my test account from an App Protection Policy as that isn`t supported at this moment. But even after excluding the device from the policy and resetting the device multiple times I still see the pop-up. I enrolled the device in another tenant without an App Protection Policy targeted to my user and I don`t see the pop-up. I assume it`s indeed related to the App Protection Policy.

    That`s it for now. As soon as Microsoft releases new features to the management mode Corporate-owned with work profile, I will update the post as soon as possible.

    Happy testing 🙂

    Android Intune MEM Microsoft 365 Microsoft Endpoint Manager
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    Windows Autopilot lifecycle automation with Logic Apps

    March 8, 2021

    How to start with Android Enterprise Corporate owned, fully managed user devices in Microsoft Intune

    April 18, 2019

    How to start with Android Enterprise work profiles in Microsoft Intune

    April 16, 2019
    View 8 Comments

    8 Comments

    1. Ronald on September 3, 2020 13:50

      i had the same thing when configuring a Exchange online mailbox with the Outlook app. Turned off the app protection policy and now it works. When i use on premise Exchange it works though. The only downside to that is i don’t see phone numbers in the GAL (Global address list)

      Reply
    2. Carsten Nielsen on November 3, 2020 11:29

      Hello

      Great guide, but I can’t register my device, the secure part is failing, do you have an idea why?

      Reply
    3. Sven Van thielen on April 13, 2021 14:05

      Hi, Great guide indeed but same issue here, the device is only registered in the dynamic group until i sign in to the intune portal which is a few step too late. so my pin code is not enforced, what can we do about this?

      Reply
      • Peter Klapwijk on April 13, 2021 17:01

        Hi Sven,

        It’s known dynamic groups are slow, if you can avoid using those groups, do it. If you for example only manage personally en corporate-owned device with work profile, you could assign the profiles to all users/ device. The COPE profile isn’t applied on personally owned devices and vice-versa.

        Reply
    4. Aron on May 26, 2021 01:09

      Peter, great guide but you kind of skipped the QR code scanning part in the End User Experience chapter of the article.
      Android 11 + QR code scanning = how? No amount of tapping does anything.

      In my experience the Intune COPE QR scanning does not invoke Work Profile setup in any way. This is today, 26.05.2021.
      You can invoke it by typing the (Intune QR- ) URL to the browser manually but how is that 21st century…
      Part Microsoft issue but also part Android issue.
      I do understand the release date of the article.
      BYOD works great with Intune.

      Reply
      • Peter Klapwijk on June 29, 2021 10:41

        Android 11 still supports ‘tapping’ on the first OOBE screen to start the QR Scanner and enroll in, for example, COPE. Haven’t seen any issues with that.

        Reply
    5. Seb on June 25, 2021 16:20

      Thank you for this very detailed and helpful guide (I initially used “afw#setup” to enroll.

      However there is one strange problem I can’t really get behind: the installation of Intune and Authenticator during enrollment doesn’t seem to work whatever I’d try. Both apps show a red exclamation mark instead of a checkmark and when I hit “Next” ist just says that the device can’t be set up and needs to be reset.

      Reply
    6. Arty on March 16, 2022 18:33

      Hi Peter,

      Great guide and I just wanted to check something.
      In terms of user experience, it is absolutely fantastic that you can simply send them a device and it will set up two profiles for them and if we remote wipe it will not effect their personal data etc.
      The question is: If a user has a personal account added to it with personal settings, pin, password etc and the user needs to return the device back to the company. As we do not know the password to access personal settings is it essentially now a brick device as there is no way we can factory reset it for re-use?

      It is of course completely different for fully-managed devices as we have the powers to do it but not corporate owned personal devices.

      Hope the question makes sense?

      Many thanks in advance,
      Arty

      Reply
    Leave A Reply Cancel Reply

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Configure Azure file shares for Entra joined Windows devices and cloud identities

    December 19, 2025

    Managing Windows 365 Link devices with Intune

    October 24, 2025

    Hard drive and partitions are not shown while installing Windows

    October 14, 2025

    Intune compliance for Windows 365 Cloud PCs

    September 12, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    • Bluesky 1.5K
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Defender Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Windows Windows 10 Windows10 Windows 11 Windows 365 Windows Autopilot Windows Update
    Awards
    Sponsor
    Follow me on Twitter
    Tweets by inthecloud_247
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Defender Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Windows Windows 10 Windows10 Windows 11 Windows 365 Windows Autopilot Windows Update
    Archives
    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • George on Configure Azure file shares for Entra joined Windows devices and cloud identities
    • Ganesh sekarbabu on Configure Azure file shares for Entra joined Windows devices and cloud identities
    • John on Connect to Azure file shares with Microsoft Entra Private Access
    • Luis on Application installation issues; Download pending
    • AndrewWak on Issues syncing SharePoint Online libraries with OneDrive for Mac
    most popular

    Application installation issues; Download pending

    October 1, 2024

    How to change the Windows 11 language with Intune

    November 11, 2022

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    How I solved a strange Kerberos issue

    December 12, 2024
    Recent Comments
    • George on Configure Azure file shares for Entra joined Windows devices and cloud identities
    • Ganesh sekarbabu on Configure Azure file shares for Entra joined Windows devices and cloud identities
    • John on Connect to Azure file shares with Microsoft Entra Private Access
    • Luis on Application installation issues; Download pending
    • AndrewWak on Issues syncing SharePoint Online libraries with OneDrive for Mac
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

    Copyright © 2023 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved. No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand: Don’t pass off my work as yours, it’s not nice.

    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS Bluesky
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}