Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Android»How to start with Android Enterprise Corporate owned dedicated devices in Microsoft Intune
    Android

    How to start with Android Enterprise Corporate owned dedicated devices in Microsoft Intune

    Peter KlapwijkBy Peter KlapwijkApril 24, 2019Updated:December 7, 201945 Mins Read

    The last two blog articles I wrote about Android Enterprise and I showed how to start with Work profiles and Corporate owned fully managed user devices. The third management mode is Corporate owned dedicated devices. This mode is used for dedicated devices which are fully managed, but not assigned to a user. Those devices are used for a single purpose, like ticket printing for example.

    To get started with Android Enterprise Corporate owned dedicated devices, your managed Google Play account needs to be connected with your Intune tenant. If you want to see the steps which needs to be taken to connect Intune with Google play, see my previous blog.

    In this blog post I will shows the steps to get started with Android Enterprise Corporate owned dedicated devices. The steps involved are creating an enrollment profile, a dynamic security group, a device restrictions policy (optional) and approving and assigning Google Play apps.

    Create an enrollment profile

    The first configuration step we need to take is creating an enrollment profile. When we create an enrollment profile, a token and QR Code are generated which we need to use to enroll the Android devices in to Intune.

    1. Open the Device Management Portal and click Device enrollment
    2. Click Android enrollment
    3. Click Corporate-owned dedicated devices

    Click Create Profile

    1. Give the profile a Name
    2. Give the profile a Description (Optional)
    3. If required change the Token expiration data (Optional)
    4. Click Create

    When the profile is created, click the Token tab. Here you will find the token and QR Code, you need during enrollment.

    Create dynamic security group

    To assign configuration policies and apps to a group of dedicated Android devices, we can make use of a dynamic security group. We can create a group with group membership based on the enrollment profile name we just created at the previous step. Devices enrolled as corporate owned dedicated device are automatically added to this group en receive the assigned policies and apps.

    1. Click Azure Active Directory – Groups
    2. Click New group
    3. Choose Security as group type
    4. Give the security group a Name
    5. Give the group a Description (Optional)
    6. Choose Dynamic device as Membership type
    7. Click the Add dynamic query tab
    8. Choose enrollmentprofilename in the first drop down list below Add device where
    9. Choose match from the second drop down list
    10. In the third field enter the enrollment profile name
    11. Click Add query – click Create

    Create a device restrictions policy

    Creating and assigning a device restrictions policy is optional when using dedicated Android devices as those devices are already locked down by default. But I want to restrict at least the option to perform a factory reset by using a restriction policy.

    1. Click Device configuration – Profiles
    2. click Create profile
    1. Give the configuration profile a Name
    2. Give the profile a Description (Optional)
    3. Choose Android Enterprise as Platform
    4. Choose Device owner only – Device restrictions as Profile type

    Now configure all the settings you want to apply to your dedicated devices. I set Factory reset as Block. Another setting might be for example blocking the camera.
    When finished the configuration click OK twice and click Create.

    1. Click the Assignments tab
    2. Search for the previously created security group and add it
    3. Click Save

    Approve and assign Android applications

    The last step in our configuration is approving and assiging Android applications to our dedicated devices.

    1. Click Client apps – Apps
    2. Click Add
    1. Choose Managed Google Play as App type
    2. Click the Managed Google Play (Approve) tab
    3. Search for the required app and click on the app, in the case Microsoft Edge

    Click the green Approve button (sorry for the Dutch print screens)

    Click Approve

    Click Save

    Click OK

    Click Sync

    After a few seconds the approved app is available in the list with apps in Intune.

    1. Click the approved app
    2. click the Assignments tab
    3. Click Add group
    4. Select Required as Assignment type
    5. On the Include tab search for the security group and select the group
    6. click OK twice and click Save

    Device enrollment experience

    Now let`s have a look at how the enrollment looks like when we enroll an Android device as dedicated device.

    Some of the screens below might look different to what you will see, or you will see some extra screens. That depends on the Android OS version and supplier. For example I got to accept some terms and conditions from Motorola on my test device.

    After starting your Android device, tab 7 times on the screen at a white space. It will start the QR code setup which needs you to connect to a Wi-Fi network. After connecting to a Wi-Fi network, the QR Code Reader will be installed.

    When the installation of the QR Code Reader is finished, scan the QR Code which we have created in the Device Management Portal under Android enrollment, Corporate owned dedicated devices. This will start the device enrollment.
    Click Encrypt.

    You will be redirected to Settings of the device. Encrypt your device and after encrypton is finished, setup continues.
    Click OK.

    Set up work device.
    setting the device owner…

    Updating device…
    Downloading Google Play store

    Registering device…
    Applying your organizations`s policies.

    When the policies are applied , you are logged on to the device and it shows the home screen. After installation the required app is shown on the home screen next to some default apps.

    As you can see only some default apps are available besides the assigned (required) app Edge.
    The Device Policy app is installed as part of the enrollment and performs the communication with Intune.

    As I set in the device restrictions policy, factory reset is blocked (greyed out).

    A next step in creating Android dedicated devices is creating a kiosk style device, which further locks down the Android devices. A kiosk style device can be setup to only allow a single-app or multiple apps. In a next blog I will show the configurations steps for such a device.

    Android Browser EMS Intune MEM Microsoft 365 Microsoft Endpoint Manager
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    How to block mobile apps like TikTok with Microsoft Intune

    July 18, 2020

    How to start with Android Enterprise work profiles in Microsoft Intune

    April 16, 2019

    Secure Outlook Mobile with App Protection Policies

    April 3, 2019
    View 4 Comments

    4 Comments

    1. Kel on December 20, 2019 21:18

      I was with you up to the Approve and assign Android applications section.
      When I click on Client Apps, I just get the App Install Status screen with a bunch of apps listed (mostly from Microsoft). I don’t see any way to Add more apps to the list to be able to search the Play Store.

      I’m not sure if they changed the internet or if I’m missing something but if you have any ideas, please let me know.

      Thanks.

      Reply
      • Peter Klapwijk on December 23, 2019 09:37

        Hi Kel,

        Did you connect your Managed Google Play account to Intune like described in my previous article https://inthecloud247.com/how-to-start-with-android-enterprise-work-profiles-in-microsoft-intune/

        Regards,

        Peter

        Reply
        • Kel on December 23, 2019 17:39

          Yep. It says the account is ‘Setup’ and has a green checkmark.
          I was able to figure it out. Instead of going to ‘Client Apps’ from the Home page, I had to go to just ‘Apps’ on the left side, and then choose All Apps. I then got the Add button I was looking for. Thanks!

          On a side note, what we’re trying to do is use tablets outside our conference rooms to show the schedule. We wanted to simply run Chrome and put it into fullscreen mode but there is no fullscreen mode. I was told that if we enroll the devices and manage them, we’ll be able to put them in a Kiosk mode and run Chrome fullscreen to remove all the tabs, bars, etc. Will following through these steps allow that to work?
          Thanks!

          Reply
    2. Andy on March 8, 2023 14:06

      do you have any experience in connected dedicated devices to eap\tls wifi configurations using cisco ISE? we use scep\wifi profiles with out fully managed and work profiles but dedicated is beating me as them devices are userless and our ISE requires a username added to the user cert, dedicated devices require a device cert as far as im aware. any help would be appreciated.

      Reply
    Leave A Reply Cancel Reply

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Hide the “Turn on an ad privacy feature” pop-up in Chrome with Microsoft Intune

    April 19, 2025

    How to set Google as default search provider with Microsoft Intune

    April 18, 2025

    Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs

    April 13, 2025

    Using Visual Studio with Microsoft Endpoint Privilege Management, some notes

    April 8, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Google Chrome Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Teams Windows Windows 10 Windows10 Windows 11 Windows Autopilot Windows Update
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • Peter Klapwijk on Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs
    • John M on Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs
    • Christoffer Jakobsen on Connect to Azure file shares with Microsoft Entra Private Access
    • Ludo on How to block Bluetooth file transfer with Microsoft Intune
    • RCharles on Automatically configure the time zone (during Autopilot enrollment)
    most popular

    Application installation issues; Download pending

    October 1, 2024

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    How to change the Windows 11 language with Intune

    November 11, 2022

    Update Microsoft Edge during Windows Autopilot enrollments

    July 9, 2024
    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}