Android phones and tablets keep small businesses moving, but they also break the rules of a tidy office network. They leave the building, hop on public Wi-Fi, and get used with one hand while someone’s juggling orders or driving to a job site.
I see the same problems on repeat: a phone gets lost, a mailbox stays signed in, and nobody knows what was on the device. A tablet at the host stand gets “customized” by well-meaning staff, and now the POS helper app won’t open.
Data leaks are often boring, not dramatic. Someone copies a customer file from a work app into a personal app because it’s easy. Or a device misses patches for months because updates got postponed.
Shared devices add another twist. A dedicated tablet isn’t “owned” by a person, so it doesn’t get cared for like a personal phone. It needs guardrails.
Remote work makes all of this louder. When the device is the office, the office needs rules.
In this post, I’m sharing my top 10 Microsoft Intune configurations for Android devices that give the biggest security and control gains with the least effort. Most of these settings live in the Intune Settings Catalog for Android Enterprise, and I’ll keep the list practical and beginner-friendly.
One non-negotiable before you touch production users: test changes on a small pilot group first. I usually start with 5 to 10 users, or one site, then expand.
Before I change settings, I pick the right Android setup in Intune
Intune management for Android works best when you start with the right enrollment model. In Android Enterprise, the three setups I use most are:
- Work profile (BYOD): The employee owns the phone, work apps live in a separate container.
- Fully managed (company-owned): The company owns it, I can apply stricter device controls.
- Dedicated (kiosk): A shared device that runs one app or a small set of apps.
One company can, and often should, use more than one.
Here’s my quick pre-flight checklist:
- Confirm the enrollment type (work profile, fully managed, dedicated).
- Confirm device ownership intent (personal vs corporate).
- Confirm Managed Google Play is connected and working.
- Keep a test device enrolled in each mode I plan to support.
For Microsoft’s reference lists of Android restriction settings, I keep the official docs bookmarked, like this guide to device restriction settings for Android in Microsoft Intune.
My quick decision guide, BYOD work profile vs. fully managed vs. dedicated
I keep the decision simple and based on real outcomes:
- Office staff using personal phones: Work profile. I protect work data without turning IT into “phone police.” Privacy matters here.
- Company-issued phones for managers: Fully managed. I set stronger locks, block risky USB access, and tighten install sources.
- A tablet at the host stand or warehouse: Dedicated mode. The device should act like an appliance, not a personal tablet.
As policies get stricter, user friction goes up. That’s fine for corporate-owned and kiosk devices. It’s a fast way to lose buy-in on BYOD.
How I avoid policy sprawl using groups, filters, and naming
Android sprawl happens when policies multiply and nobody remembers what hits what. I prevent that with two habits.
First, I use groups and assignment filters to target by ownership and management type, not job titles. If a setting only makes sense for corporate-owned devices, I filter for corporate. This is safer than “All users,” and it keeps BYOD clean.
Second, I name policies so they read like labels on a breaker panel. My pattern is:
ANDR-AE-[Ownership]-[Mode]-[Purpose]
Example: ANDR-AE-Corp-FullyManaged-USBBlock.
This naming saves me when a personal phone suddenly can’t copy a photo, and I need to find the policy fast.
Top 10 Microsoft Intune configurations for Android devices (the ones I start with)
These are the first configurations I reach for because they reduce risk quickly, and they’re easy to explain to owners and managers. If you want broader MDM hygiene ideas, CoreView has a solid list of mobile device management best practices for Microsoft Intune, but below is my Android-specific baseline.
1) Strong screen lock and password rules for work profiles and company phones
A strong screen lock is the base for everything else. If the lock is weak, every other control becomes “nice to have.”
What I set (in Configuration profiles, Settings catalog):
- PIN length and complexity (longer for corporate-owned).
- Idle timeout before the device locks.
- Wipe after failed attempts (more strict on corporate-owned).
I also watch for newer work profile password options that let me manage expiration and reuse history through the Settings Catalog.
When I use it: BYOD (lighter rules), corporate-owned fully managed (strict), dedicated devices (strict, but tuned for shared use).
2) App protection policies (MAM) to block data copy, save-as, and risky sharing
Mobile Application Management (MAM) is my favorite “low drama” control because it protects the data inside the app, even on personal phones. It’s not about owning the device, it’s about controlling what happens to work content.
In App protection policies, I commonly enable:
- Require an app PIN or biometrics for work apps.
- Block copy/paste from work apps to personal apps.
- Restrict Save As and backups to personal locations.
- Require encryption for app data.
This hits the biggest risk apps first: Outlook, Teams, OneDrive, and Microsoft 365.
Microsoft’s settings reference is worth reading once, then using as a checklist: Android app protection policy settings.
When I use it: BYOD first, then corporate-owned too (yes, it still helps).
3) Compliance policy with minimum Android version and security patch level
Unpatched devices are the soft underbelly of mobile fleets. I don’t need perfection, I need a clear minimum that keeps out known-bad builds.
In Compliance policies for Android Enterprise, I set:
- Minimum OS version (based on your app needs).
- Minimum security patch level (I often use a rolling window).
- Rooted device detection (mark as noncompliant).
Then I tie compliance to access. If a device goes noncompliant, it should lose access to email and core apps until it’s fixed. This is where Microsoft Entra ID Conditional Access does the real work.
For the exact compliance knobs, I reference Android Enterprise compliance settings in Microsoft Intune.
When I use it: BYOD, corporate-owned, and dedicated. Every mode benefits.
4) Work profile restrictions to keep work and personal data separate
Work profile is a fence. If you leave the gate open, users will move data across it without thinking.
In Configuration profiles, Settings catalog (work profile restrictions), I often control:
- Sharing between work and personal (allow, limit, or block).
- Screenshots in work apps (block for sensitive roles).
- Work app notifications on lock screen (hide content if needed).
The goal is simple: work data stays in work apps, and personal data stays personal.
If you manage personally owned work profiles, this doc helps clarify what’s available: personally owned Android Enterprise device restriction settings.
When I use it: BYOD work profile, sometimes corporate-owned with a work profile scenario.
5) Managed Google Play app approvals and a safe company app catalog
If users can install anything, they will. Not because they’re careless, but because the Play Store is a candy aisle.
In Intune, I use Managed Google Play to:
- Approve the apps the business supports.
- Push required apps (Outlook, Teams, Authenticator, OneDrive).
- Keep the catalog small and role-based.
I also keep app updates on. Stale apps cause weird bugs and real risk.
A small trick that helps: I treat the app catalog like a menu. If it’s not ordered often, it shouldn’t be on the menu.
When I use it: All modes. It’s the cleanest way to standardize.
6) USB access controls to reduce data leaks and “charge-only” risks
USB is still a common way data walks out the door. It’s also how bad accessories can cause problems. Most staff will plug into any charger they find.
On corporate-owned devices, I often set USB to a safer posture in Device restrictions:
- Block USB data transfer when possible.
- Allow charging, limit the rest.
I keep BYOD lighter here since it can break personal workflows.
When I use it: Corporate-owned fully managed, dedicated shared devices.
7) Kiosk mode for dedicated devices using Managed Home Screen
Dedicated devices should feel like appliances. If a check-in tablet can open Settings, you’ll get Settings changes. If it can browse the web, it will browse the web.
For Android Enterprise dedicated devices, I use Managed Home Screen (MHS) with:
- Single-app kiosk for one-job devices.
- Multi-app kiosk for a short allowed list.
I also lock down system apps, hide settings, and keep the device focused. Recent MHS improvements in late 2025 help frontline use, including better controls for device volume options and improved offline behavior, which matters in back rooms and warehouses.
I configure most of this via Apps, App configuration policies plus device restrictions.
When I use it: Dedicated mode tablets (host stand, inventory, time clock), sometimes fully managed for a limited-use phone.
8) Hide organization name on lock screen to reduce targeted theft
This one is small, but it’s real life. If a lock screen announces the business name, the device becomes a better target. Field staff, restaurants, and retail teams feel this first.
In Device restrictions, I remove lock screen org branding and owner info unless there’s a strong reason to keep it.
If a device is lost, I want recovery through inventory, not through advertising.
When I use it: Corporate-owned phones, any device used in public spaces.
9) Private Space settings to add another layer for sensitive work data
Private Space (think “secure folder”) can add separation for sensitive work content on supported Android builds. I don’t treat it as magic. I treat it like another locked room inside the house.
When I do use it, it’s for users who handle:
- Finance data
- Health info
- Exec communications
- Regulated client files
In Intune, this usually shows up as settings in the Settings catalog where supported, plus app and data controls that keep sensitive apps inside the protected area.
When I use it: Fully managed devices for execs and finance, sometimes BYOD for high-risk roles.
10) Device targeting with filters so BYOD gets privacy, and corporate gets stricter controls
If I had to pick one “adult supervision” feature in Intune, it’s targeting. The fastest way to create support tickets is to push corporate-only controls to personal devices.
I split policy assignment using groups plus filters such as:
- Personal vs corporate ownership
- Work profile vs fully managed vs dedicated
Example targeting in practice:
- BYOD work profile: MAM, baseline compliance, mild lock rules.
- Corporate fully managed: strict lock, USB data block, tighter install sources.
- Dedicated: kiosk policies, minimal app set, strict restrictions.
This approach also keeps my environment sane as it grows. Nerdio’s overview of Microsoft Intune best practices is a good reminder that governance and targeting matter as much as the settings.
When I use it: Always. This is how I keep rules from colliding.
How I roll these out without breaking phones or slowing the team down
Android policy changes can feel like pulling a fire alarm if you do them all at once. My goal is fewer help desk tickets, not more.
I keep rollouts tight, and I treat every new control like it might block someone at the worst time (because it will, once).
My rollout order: compliance, access rules, apps, then restrictions
This order keeps me from locking users out before their device is ready:
- Start with compliance policies in a pilot group (reporting first if possible).
- Add Conditional Access rules that act on compliance.
- Deploy core apps via Managed Google Play and confirm installs succeed.
- Apply app protection (MAM) to reduce data spill.
- Tighten device restrictions (USB, sharing, screenshots, kiosk lockdown).
If I’m supporting a restaurant group or multi-site business, I pilot by location. One store tells me more than a spreadsheet.
For work profile plus MAM planning, Microsoft’s deployment guidance is useful: MAM and Android Enterprise personally owned work profiles.
What I check after deployment: user impact, help desk signals, and reports
After rollout, I watch three places in Intune:
- Device status: enrollment failures, policy conflicts, settings not applicable.
- App install status: required apps failing, update loops, Play approval issues.
- Compliance and sign-in logs: noncompliance reasons, Conditional Access blocks.
I also document what I changed and when. For rollback, I keep a second set of assignments ready (a “safe” group) so I can remove enforcement fast without rewriting policies.
Conclusion
Android management doesn’t need to feel like a big project. With Intune, I can set a baseline that protects data, keeps devices updated, and still respects BYOD privacy.
If I’m short on time, I start with strong screen locks, app protection policies, and compliance plus Conditional Access. After that, I build a safe app catalog, lock down kiosk devices with Managed Home Screen, and use filters so policies hit the right devices.
If you want a simple next step, I’d audit your current Android policies today and pick the first three settings in this list to tighten this week. Once those are stable, everything else gets easier.
Discover more from Guide to Technology
Subscribe to get the latest posts sent to your email.
