Get a Pentest and security assessment of your IT network.

Cyber Security

BYOD Device Approval: A Step-by-Step Guide

TL;DR

This guide shows you how to check if a personal device (phone, tablet, laptop) is approved for use with company resources. We’ll cover checking the Mobile Device Management (MDM) system and verifying compliance.

Checking Device Approval Status

  1. Access the MDM Portal: Open your web browser and go to the address of your company’s Mobile Device Management (MDM) portal. This is usually provided by your IT department. Common examples include Workspace ONE, Microsoft Intune, or Jamf.
    If you don’t know the address, contact your IT helpdesk.
  2. Log In: Use your company username and password to log in. You may need two-factor authentication (a code sent to your phone or email).
  3. Find Your Device: Once logged in, locate the section for ‘Devices’ or ‘My Devices’. Search for your device by name or serial number.
    If you have multiple devices, make sure you select the correct one.
  4. Check Compliance Status: The MDM portal will show the compliance status of your device. Look for indicators like:
    • Compliant: Your device meets all security requirements and is approved.
    • Non-compliant: Your device does not meet one or more security requirements. You’ll need to fix these issues (see step 6).
    • Pending: The device is still being evaluated for compliance.
  5. View Device Details: Click on your device name to see detailed information, including:
    • Operating System version
    • Security software status (antivirus, firewall)
    • Encryption status
    • Password requirements
  6. Resolve Non-Compliance Issues: If your device is non-compliant:
    1. Identify the Issue: The MDM portal will tell you what needs to be fixed. Common issues include outdated software, missing security apps, or weak passwords.
    2. Update Software: Update your operating system and any required apps.
      For example, on an iPhone go to Settings > General > Software Update.
    3. Install Security Apps: Install any required antivirus or other security software provided by the company.
      # Example command for installing a package (Linux)
      sudo apt-get update && sudo apt-get install 
    4. Set Strong Passwords: Ensure your device has a strong password or biometric authentication enabled.
    5. Re-sync with MDM: After making changes, you may need to re-sync your device with the MDM system. This is usually done through the MDM app on your phone or by restarting your device.
  7. Contact IT Support: If you are unable to resolve the non-compliance issues, contact your IT helpdesk for assistance. They can provide specific guidance and support.

Verifying Compliance with Security Policies

  1. Review Company BYOD Policy: Familiarize yourself with your company’s Bring Your Own Device (BYOD) policy. This document outlines the security requirements for personal devices accessing company resources.
  2. Check Email Configuration: Ensure your company email account is configured securely on your device. Use the recommended settings provided by IT.
    # Example IMAP settings
    Server: imap.example.com, Port: 993, Security: SSL/TLS
  3. Confirm Data Encryption: Verify that your device’s data is encrypted. This protects company information if the device is lost or stolen.
    • Android: Go to Settings > Security > Encryption.
    • iOS: Encryption is enabled by default with a passcode.
    • Windows: Use BitLocker Drive Encryption.
Related posts
Cyber Security

Zip Codes & PII: Are They Personal Data?

Cyber Security

Zero-Day Vulnerabilities: User Defence Guide

Cyber Security

Zero Knowledge Voting with Trusted Server

Cyber Security

ZeroNet: 51% Attack Risks & Mitigation