This checklist provides a comprehensive guide to onboard Bring Your Own Device (BYOD) Android phones into a Microsoft 365 Business Premium environment. It ensures that personal Android devices are set up with strong security policies so company information remains protected and secure. The process is broken into phases for clarity: Preparation (Admin setup), User Enrollment Steps, Post-Enrolment Configuration, and Ongoing Management. Key security policies for BYOD Android are highlighted throughout.
1. Preparation (IT Admin Configuration)
1.1 Verify Licensing & Prerequisites
- M365 Business Premium License: Ensure each BYOD user has an M365 Business Premium licence assigned. This suite includes Intune (for MDM/MAM), Azure AD Premium P1 (for Conditional Access), and information protection features[1] needed for secure BYOD management.
- Multi-Factor Authentication (MFA): Require all users to have MFA enabled on their Microsoft 365 accounts. This provides an extra layer of identity security before devices can access company data (e.g. using Microsoft Authenticator app).
- Intune (Endpoint Manager) Setup: Confirm that Microsoft Intune is configured as the Mobile Device Management (MDM) authority for your tenant (in modern tenants it’s enabled by default). Verify you have admin access to the Microsoft 365 admin center and Endpoint Manager admin center.
1.2 Intune Enrollment Configuration
- Enable Android BYOD Enrollment: In Intune, enable Android Enterprise “personally-owned work profile” enrollment (the setting might be called Android Enterprise work profile). This allows personal Android devices to register with a Work Profile – a separate, encrypted container on the phone for work apps and data[2]. Work profiles isolate corporate information from personal apps, respecting user privacy while securing business data.
- Managed Google Play Integration: Connect Intune with Managed Google Play. In Endpoint Manager portal, navigate to Devices > Android > Android Enrollment and link to a Managed Google Play account (using a corporate Google account). This integration is required to deploy the Intune Company Portal app and any managed apps to Android devices[3].
- Define Enrollment Restrictions: (Optional) Review Intune Enrollment Restrictions to ensure personal Android devices are allowed. You may limit enrollment to certain Android OS versions (e.g. block very old, insecure Android versions) or disallow jailbroken/rooted devices.
- Communicate BYOD Policy: Prepare and distribute a BYOD usage policy document to users. Include what IT will control on the device (work profile only), what security measures will be enforced, and assure users that personal data (photos, personal apps, etc.) remains untouched. Users should consent to remote wipe of company data if the device is lost or upon separation.
1.3 Configure Security Policies in Intune
Set up the following Intune policies before users enroll their devices, so that they apply automatically during enrollment:
-
Compliance Policy for Android (Work Profile): Create a compliance policy targeting Android Enterprise work profile devices with at least:
- Device must not be rooted – Mark rooted (jailbroken) devices as non-compliant[1].
- OS version patch level – (Optional) Require a minimum Android version or security patch level. This ensures older, vulnerable OS versions are not allowed.
- Device Password/PIN – Require a device lock PIN or password of sufficient complexity on the device. For example, a minimum 6-digit PIN or password, with a limit on simple sequences. Set an inactivity auto-lock (e.g. 5 minutes). Intune can enforce these on the whole device or at least on the work profile.
- Encryption – Require device encryption. Most modern Androids are encrypted by default, but ensure the policy demands encryption is enabled for compliance[4]. This protects data at rest on lost/stolen devices.
- Threat Protection – If leveraging Microsoft Defender for Endpoint (Mobile), set “Require device at or under Medium threat level” (or Low for stricter security)[1][1]. This uses mobile threat defense to evaluate device risk (e.g. malware detected). Devices with high risk are marked non-compliant automatically. (This requires deploying Defender – see step 3.2).
- Safety Net/Play Protect – Enable Google Play Protect and SafetyNet device attestation if available[1], to ensure the Android device hasn’t been compromised.
- Device must not be rooted – Mark rooted (jailbroken) devices as non-compliant[1].
-
App Protection Policy (MAM): Configure an Intune App Protection Policy targeting the user accounts on unmanaged devices (i.e. applying to apps even if the device isn’t fully enrolled, though in work profile scenarios it complements MDM):
- Approved Apps Only – Specify that corporate data can only be accessed via approved apps (e.g. Outlook, Teams, OneDrive, Office mobile apps, etc.).
- Prevent Data Leakage – Block backups of work data to personal cloud services (e.g. Google Drive). Prevent “Save As” of corporate files to unmanaged locations; allow saving only to OneDrive for Business or SharePoint[1][5].
- Restrict Copy/Paste – Do not allow copying text or data from a managed corporate app to personal apps. Conversely, you may allow or restrict personal-to-work copy as appropriate[1].
- Require App PIN/Biometric – Even if the device is unlocked, require a PIN or fingerprint to open company apps (adds a second layer if device falls into wrong hands)[1].
- Disable Screenshots – For work profile apps on Android, consider blocking screenshots or screen captures of sensitive app content[1].
- Selective Wipe – Enable the ability to wipe corporate app data if the device is unenrolled or non-compliant (Intune default for app protection).
- Approved Apps Only – Specify that corporate data can only be accessed via approved apps (e.g. Outlook, Teams, OneDrive, Office mobile apps, etc.).
-
Configuration Profile (Device Settings): Optionally, deploy a configuration profile to the work profile for additional settings: e.g. enforce device encryption (if not covered by compliance), configure email profile (to push Outlook settings), Wi-Fi profiles for office, etc. These profiles apply to the managed work container on the device.
-
Conditional Access Policies: In Azure AD (Entra ID) > Security > Conditional Access, create policies to protect cloud resources:
- Require Compliant or Protected Device – e.g. for all Exchange Online, SharePoint, Teams access by mobile apps, require device to be marked compliant or require use of an Intune-approved client app with app protection. This ensures only devices under Intune policies (MDM or MAM) can access company email and files[3][6]. Unmanaged or non-compliant devices will be blocked.
- Block Unapproved Apps – Require approved client apps for email (forces use of Outlook rather than native mail apps).
- Require MFA on New/Untrusted Devices – Although MFA is enabled tenant-wide, a CA policy can enforce MFA specifically on risky sign-in or outside trusted locations.
- Exclude Emergency Accounts – Be sure to exclude break-glass admin accounts from CA rules to avoid lockout.
- Require Compliant or Protected Device – e.g. for all Exchange Online, SharePoint, Teams access by mobile apps, require device to be marked compliant or require use of an Intune-approved client app with app protection. This ensures only devices under Intune policies (MDM or MAM) can access company email and files[3][6]. Unmanaged or non-compliant devices will be blocked.
By completing the above preparation, you have established the policies and infrastructure so that when a user enrolls their BYOD Android, it will automatically receive the necessary protections.
2. User Enrollment Steps (On the Android Device)
Once the admin setup is done, instruct users to follow these steps to onboard their personal Android phones:
2.1 Install Company Portal & Setup Work Profile
- Download Microsoft Intune Company Portal app from Google Play Store.
- Sign in to Company Portal with the work (Office 365) credentials. The app will begin the device registration process into Intune.
- Enroll and Create Work Profile: Follow the on-screen prompts to enroll the device. The user will be asked to set up a Work Profile on their phone (this is an Android OS feature for BYOD). They must accept the creation of a managed work profile and Company Portal will configure it.[2]
- Note: The user will see their phone “copying” certain system apps into a work profile. A separate Work folder/icon will appear, containing work versions of apps (marked with a briefcase icon).
- Accept Management & Policies: The user must agree to allow the organisation to manage the work profile. Assure them that only the work container is managed – personal apps and data remain unaffected. Intune will not collect personal information like photos or texts; it only monitors compliance info on the device.
- Set a Work Profile PIN: As part of enrollment or first app launch, the user will be prompted to set a PIN or biometric specifically for the work profile (if required by app protection policy)[2]. For example, they may need to configure a 6-digit PIN that will be used whenever they open a company app like Outlook.
2.2 Install Required Work Apps
- Company Portal Checks: Once enrollment is complete, open Company Portal and check device status. It should show as Enrolled/Compliant if all requirements are met (or show actions needed if not).
- Automatic App Installation: Intune can automatically deploy essential apps to the work profile. Common apps include: ** Outlook**, *Teams*, *OneDrive*, *Office (Word/Excel)*, *Microsoft Defender*, etc. These will appear in the work profile section of the phone (with briefcase icons).
- If apps are not pushed automatically, the user can open the Managed Google Play Store (accessible via the Company Portal or Work Profile) which lists approved apps. They should download the required corporate apps from there.
- Sign Into Work Apps: User should sign in to the Outlook app and other apps with their work credentials. The Conditional Access policies will enforce that sign-ins only succeed within these approved apps. For example, if they try to add their work email to the phone’s native mail app, it should be blocked by policy, guiding them back to using Outlook.
2.3 Comply with Security Prompts
During or after enrollment, Intune will enforce the compliance settings:
- If the user had no lock screen, they will be prompted to set a device PIN/password before enrollment completes (the compliance policy requires it). This is mandatory to protect the device.
- If the OS is out-of-date beyond allowed threshold, it will mark as non-compliant – the user should update their Android to the latest security patch to regain compliance.
- The user might see a prompt to enable device encryption (if not already enabled). They should follow the instructions to encrypt the device (in most cases, modern Androids are encrypted by default, so this step may be transparent).
2.4 Confirm Setup Completion
- The device should now show in Company Portal as Compliant. The work profile is active and corporate apps are installed. At this point, the user’s work email, files, and Teams chats are accessible only inside the protected apps.
- The user should verify they can send and receive work emails in Outlook, access OneDrive files, etc. All company data is now inside the secure work profile environment.
- Verify that personal apps (e.g. Gmail, personal Facebook, etc.) still function normally – there should be no interference, as policies apply only to the work side.
3. Post-Enrolment Configuration & Security Policies Enforcement
After a successful enrollment, the following protections and policies will be in effect to secure the corporate data on the BYOD device:
3.1 Work Profile Isolation
The Android device now has a dedicated Work Profile. This means:
- Work apps cannot share data with personal apps. For example, files downloaded in the work profile are stored in a separate encrypted space and can’t be opened by personal apps.
- The user’s personal notifications and data stay private. Work apps might have their own notifications labelled as work. The admin cannot see personal contacts, photos, or SMS, etc., only an inventory of the work profile apps and device compliance status.
3.2 Policy Enforcement on Device
- Device Compliance: Intune continuously evaluates the device against the compliance policy. If the user disables their device PIN, or if the device is later rooted or falls out of date, it will flip to non-compliant status. Intune can optionally notify the user and even auto-remediate some issues (like require them to set a PIN again).
- App Protection: All managed apps apply the App Protection Policy settings: e.g. if the user tries to copy text from a Teams chat (work) to a personal texting app, it will be blocked. Screenshots in a work app will show as blank if disallowed. If they try to save an attachment from Outlook, they’ll only be allowed to save to OneDrive for Business, not to device Downloads folder[5]. These controls ensure company info stays within approved apps and cannot leak to personal space[5].
- Microsoft Defender for Endpoint (Optional): If deployed, the Defender app runs in the background of the work profile, providing antivirus and anti-phishing protection. It can detect malicious apps or files in the work profile. If malware is detected or the device faces a threat, Defender can raise the device’s risk level. Intune’s compliance policy can then mark the device non-compliant (if risk is above the allowed threshold)[1], and Conditional Access will block the device from accessing company resources until the threat is resolved.
- Email and Data Access: Thanks to conditional access, if the user attempts any other method to access corporate email or data outside the approved apps, it will be denied. For instance, downloading mail in a personal email app or moving a file to a personal Google Drive won’t be possible. Only Outlook can access Exchange, only OneDrive app can access OneDrive/SharePoint, etc., under the managed context.
- Conditional Access in Action: When the user launches a protected app (like Outlook), Azure AD checks compliance. If the device ever becomes non-compliant (say the user removes the PIN or the device is detected with an issue), their access token is revoked – Outlook/Teams will inform the user that the device does not meet security requirements and deny access until compliance is restored. This mechanism ensures only secure, policy-abiding devices can use company services[3].
3.3 Security Policy Summary (BYOD Android)
The following is a summary of key security policies now active on the BYOD Android device:
- Device Protection: Device encryption is enabled and a strong lock PIN/password is enforced. The device is not allowed to be rooted or running outdated software.
- Separate Work Container: Corporate apps and data reside in an encrypted work profile isolated from personal apps.
- Data Loss Prevention: No copying of corporate data to personal apps, no backing up work data to unapproved cloud services. Only approved apps can open or edit work files[5].
- Access Control: Corporate apps require re-authentication or app PIN periodically. If the device fails compliance, corporate app access is blocked.
- Threat Response: Integrated threat defense (Defender) monitors the device for malware; high risk devices are quarantined from company resources[1][1].
- User Privacy: Only work profile information is managed. Personal apps, data, and usage remain private and unaffected (aside from the requirement of a device PIN which benefits the user’s own security as well).
These policies together align with common compliance standards by enforcing encryption, access control, and data protection on BYOD devices. For example, requiring encryption and strong authentication helps meet GDPR and other data protection regulations for safeguarding personal data on portable devices, and the strict separation addresses privacy requirements.
4. Ongoing Management and User Responsibilities
Security is not a one-time setup – it requires continuous management and user cooperation. Both IT administrators and the device user have ongoing responsibilities:
4.1 IT Admin Monitoring & Maintenance
- Compliance Monitoring: Intune provides reports of device compliance. Regularly review the compliance dashboard to spot any non-compliant BYOD devices. If a device is non-compliant for an extended period, follow up with the user. Common issues might include an expired OS version, or a user who hasn’t signed in for a long time (which could indicate a lost device).
- Update Policies: Keep the compliance and configuration policies up to date. For instance, if a new Android OS version comes out with important security features, you might raise the minimum OS level after a grace period. Similarly, periodically review app protection settings to incorporate new policy options or new corporate apps that need protection.
- Defender Alerts: If using Defender for Endpoint, monitor its alerts. A malware alert from a BYOD device should be addressed immediately – ensure the threat is remediated and device is clean before marking it compliant again.
- Conditional Access Reviews: Audit sign-in logs to ensure Conditional Access rules are working as intended (e.g., no unexpected app access). Adjust rules if users encounter false positives (e.g., a new approved app might need to be added to the allowed list).
- Support & Troubleshooting: Be prepared to assist users with issues. For example, if the Company Portal shows the device as non-compliant due to a setting, guide the user on how to resolve it (update OS or set a PIN, etc.). Ensure helpdesk can answer questions about what IT can and cannot see on BYOD (to alleviate privacy concerns).
4.2 User Best Practices & Responsibilities
- Keep Device Updated: Users should install Android system updates and security patches promptly. Even with compliance policies, user diligence ensures their device stays secure and compliant.
- Maintain Screen Lock: Users should never remove or weaken their device PIN/password. If they do, company data access will stop. Encourage them to use biometric unlock for convenience, but the PIN is still required in background.
- Only Use Work Apps for Work Data: Remind users to only use the apps provided in the work profile for any company information. They should avoid downloading company attachments or data into personal apps. The system largely enforces this, but user understanding helps prevent attempts to circumvent.
- Report Lost or Stolen Device: It is the user’s duty to immediately inform IT if their phone is lost or stolen. This allows IT to take swift action (see 4.3).
- No Tampering: Users should not attempt to root their phone or install untrusted firmware. These actions will break compliance and pose security risks. Instruct that doing so will result in loss of access to work resources (until they reset the device to a secure state).
- Personal Data Backups: Users should continue their normal personal data backups (this is outside of work profile). For work data, they don’t need to worry – it’s in cloud (OneDrive, Exchange) or protected within apps, but not bad practice to remind them corporate data is backed up by the company’s cloud, not by their personal Google account.
4.3 Device Retirement and Incident Response
- Offboarding Users: When an employee leaves the company or no longer needs corporate access on their phone, perform a Selective Wipe (Retire) via Intune. This action removes all company data and apps from the work profile without affecting personal data. The work profile and its contents will be erased[6]. Always do this for departing staff BYOD devices to prevent any residual access.
- Lost/Stolen Device: If a device is reported lost or is suspected stolen, Intune can issue a Remote Wipe. For BYOD, you’d typically do a selective wipe (work profile only) to remove business info. In higher-risk scenarios (or if the user requests it), a full device wipe can be initiated, but note this erases personal data too – typically only done if absolutely needed and with user consent. Either way, because data is encrypted and protected by PIN, the risk of data exposure before wipe is low, but timely action adds assurance.
- Non-Compliant & Inactive Devices: Intune can be set to retire devices that haven’t checked in for a long period (e.g. 90 days of inactivity), which could indicate the device is no longer in use. This auto-cleans stale records and ensures access isn’t lingering on an unused phone.
- Periodic Policy Acknowledgement: It’s wise to have users periodically re-accept the BYOD policy (e.g. annually). This can be done via a simple internal process or a compliance requirement in Intune that asks users to open Company Portal and acknowledge a Terms of Use. This keeps users aware of their role in protecting company data.
4.4 Continuous User Education
Security is an ongoing effort. Provide regular training or tips to users about mobile security:
- Educate on phishing threats via SMS or email on their mobile and how to avoid them (the Defender app can help alert if a malicious link is clicked in the work profile).
- Remind about not installing untrusted apps on the device – even though work data is compartmentalised, a compromised device at the OS level could still be dangerous.
- Share any updates in policy or new security features (for example, “Now we enforce a 8-digit PIN due to updated policy – please update your PIN proactively.”).
Conclusion
By following this onboarding checklist, organisations can successfully enable employees to use their personal Android devices for work while maintaining a robust security posture. Microsoft 365 Business Premium provides the necessary tools – Intune for device/app management, Conditional Access, Defender for Endpoint, and information protection – to implement a zero-trust approach for BYOD: never trust a device until it meets all security requirements, and continually verify compliance. The result is a balance of productivity and security: users gain the convenience of a single device for work and personal needs, and the company ensures its sensitive emails, files, and applications are safe from unauthorised access or leakage on those devices.
All stakeholders should regularly revisit this checklist and update it as technology and threats evolve. A well-maintained BYOD program with clearly defined security policies will significantly reduce the risk of data breaches and ensure that even outside the office, corporate information remains secure and under IT’s control[3].
References
[1] Android Enterprise compliance settings in Microsoft Intune
[2] Microsoft 365 Business Premium Setup Checklist A Comprehensive Guide for IT Professionals
[3] Comprehensive Android Device Onboarding Checklist for M365 Business Premium
[4] Protect unmanaged devices with Microsoft 365 Business Premium
[5] BYOD iPhone Onboarding Checklist – Microsoft 365 Business Premium
[6] Onboarding a Windows Device into M365 Business Premium Step-by-Step Checklist