KEMBAR78
ES Midterm Project | PDF | Android (Operating System) | Personal Identification Number
0% found this document useful (0 votes)
18 views31 pages

ES Midterm Project

The document provides instructions for configuring robust security policies for Android devices using Microsoft Intune, including setting up an Android emulator, creating an Intune account, establishing policies for data encryption, device passwords, device resets, and restricting apps and data sharing, as well as creating a security group and verifying the policies.

Uploaded by

Kim Chan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views31 pages

ES Midterm Project

The document provides instructions for configuring robust security policies for Android devices using Microsoft Intune, including setting up an Android emulator, creating an Intune account, establishing policies for data encryption, device passwords, device resets, and restricting apps and data sharing, as well as creating a security group and verifying the policies.

Uploaded by

Kim Chan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 31

Mobile Device Security Configuration and Intune Management

Objective: To configure robust security policies for Android devices using Microsoft Intune.

Include screenshots and the step-by-step configurations for all the tasks below:

Task 1: Android Setup

Install the Android emulator using the following link.


https://muktime.com/intune-android-emulator-with-microsoft-intune-lab/#more-973
Android Setup
Downloa
d android
studio on
the link

Create a
virtual
device for
your
android
Select the
system
image

Configur
e your
android
virtual
device
Android
virtual
machine
creatd

Task 2: Sign up for Intune


Sign up for Intune account using the following link:
https://www.microsoft.com/en-ca/security/business/microsoft-intune-pricing
Sign up for Intune
Create
your own
email
address

Create a
passwor
d for the
email
Select
the
country
and
birthday

Intune
account
created

Task 3: Create Intune Security polices


Configure the following security policies for in Microsoft Intune.
A. Data Encryption: Protect files and documents
 Configure encryption settings for data at rest and in transit.

B. Mobile Device PIN Code and Inactivity Timeout


 Create a policy requiring a PIN code for device access. Set an inactivity timeout of 5 minutes or
less.
C. Device Reset on Incorrect PIN Entries
 Configure a policy to reset the device to factory defaults after 5 consecutive incorrect PIN entries.

D. Data protection:

 Verify on the Android emulator that you can not copy, cut and paste.

In addition to the three policies mentioned above, create two more security policies of your choice.

Create Intune Security polices


Data Encryption: Protect files and documents
Go to
compliance
policies and
create a new
policy for
your device
Configure
compliance
settings
“look for the
encryption”

Able
Encryption
data

Configure
the actions
for
noncomplia
nce to send
notification
to the admin
Assign the
policy to all
the users

Review &
create the
policy.
Mobile Device PIN Code and Inactivity Timeout
The steps
will be the
same with
the first part

Configure
the system
security

Configure
the actions
for
noncomplia
nce to send
notification
Assign the
policy to all
the users

Review &
create the
policy.
Device Reset on Incorrect PIN Entries
The steps
will be the
same with
the first part

Configure
system
security
password
Configure a
policy to
reset the
device to
factory
defaults
after 5
consecutive
incorrect
PIN entries

Assign the
policy to all
the users
Review &
create the
policy.

Block apps from unknown sources


The steps
will be the
same with
the first part
Configure
System
Security and
block apps
from
unknown
sources

Configure
the actions
for
noncomplia
nce to send
notification

Assign the
policy to all
the users
Review &
create the
policy.

Restricted apps
The steps
will be the
same with
the first part

Lists of the
restricted
apps to use
in android
devices
Configure
the actions
for
noncomplia
nce to send
notification

Assign the
policy to all
the users
Review &
create the
policy.

Data protection
Name the
new policy

block all
sharing
between
profiles
Assign the
policy
Review &
create

Task 4: Create Device Security Group and Assign Policies

1. In the Microsoft Endpoint Manager admin center, create "New group" and specify a group name (e.g.,
"Android Devices Security Group").
2. Under "Membership type," choose "Assigned."
3. Under "Members," add the Android emulator to this group.
4. Click "Create" to create the group.
5. For each policy created in Task 3, navigate to the respective policy section in the Intune portal.
6. In the policy configuration, go to the "Assignments" or "Scope" tab.
7. Add the "Android Devices Security Group" to the list of targeted groups for each policy.
Create Device Security Group and Assign Policies
In the
Microsoft
Endpoint
Manager
admin center,
create "New
group" and
specify a
group name
(e.g.,
"Android
Devices
Security
Group").

Under
"Membership
type," choose
"Assigned."
Under
"Members,"
add the
Android
emulator to
this group.

Click
"Create" to
create the
group.
For each
policy created
in Task 3,
navigate to the
respective
policy section
in the Intune
portal.

In the policy
configuration,
go to the
"Assignments
" or "Scope"
tab.
Add the
"Android
Devices
Security
Group" to the
list of targeted
groups for
each policy.

Task 5: Connecting Android Emulator to Intune

Connect the Android emulator to Intune.


Connecting Android Emulator to Intune
Install and
open Intune
company
portal
Sign in with
your
credential or
email

Successfully
login to your
Intune
account you
can now begin
the access
setup
Company’s
privacy
Task 6: Verify that security policies successfully implemented

Ensure that the implemented security features are functional on the Android emulator

A. Data Encryption:
o Verify on the Android emulator that encryption is enabled.
B. Mobile Device PIN Code and Inactivity Timeout:
o Lock the emulator screen and attempt to unlock it. Confirm that the PIN code is required.
Wait for the inactivity timeout and verify that the device locks automatically.
C. Device Reset on Incorrect PIN Entries:
o Simulate entering an incorrect PIN multiple times (e.g., 5 times) on the emulator. Confirm
that the device is reset to factory defaults after reaching the configured limit.

In addition to the three policies mentioned above, ensure that the two additional policies of your choice are also
implemented

Android studio doesn’t work

Marking schema

Task Mark
Task 1 5
Task 2 5
Task 3 5
Task 4 5
Task 5 5
Task 6 5
Total 30

You might also like