Android
Android is an open-source mobile operating system developed by Google. It powers a wide range of smartphones, tablets, and other devices. With its customizable nature, Android offers users the flexibility to personalize their device, choose from a vast selection of apps on the Google Play Store, and customize settings to suit their preferences. Android provides seamless integration with Google services, including Gmail, Google Maps, Google Drive, and Google Assistant, enhancing productivity and convenience. It also supports features like multi-tasking, notifications, and various customization options. Android's versatility, extensive app ecosystem, and frequent updates make it a popular choice for users seeking a diverse and user-friendly mobile experience.
- Android EMM Known Issues
- Android EMM Zero-Touch Enrollment
- Google Play Store Errors
- Embed WiFi in EMM Enrollment QR
- Force Location for EMM Android Devices
- Geofencing
- Deploying Google Play Apps
- Deploying Google Play Web Apps
- Android EMM Policies and Permissions
- Android apps are not installing immediately
- Android BYOD (EMM) Enrollment
- Android EMM Global Default Policy Change (14.9+)
- Android devices with multiple policies
Android EMM Known Issues
Functionality
Issue | Notes | Reference |
Can not import or create placeholders | FileWave hopes to implement in future release | |
Devices do not show in smart groups | ||
No paid app distribution (AKA group license purchases) | Paid apps not currently implemented in Google API | |
Free Disk Space inaccurate | FileWave hopes to implement in future release | GOOG-194 |
Fileset Report - Empty | FIXED: FW v 13.2 | GOOG-219 |
Wiping device, but not removing from FW does not get previous associations | FileWave hopes to implement in future release | GOOG-216 |
Automatic add of mobile device does not add EMM Android | FileWave hopes to implement in future release FIXED: FW v 13.2 |
GOOG-175 |
Wipe a device with WiFi off creates duplicate devices | FIXED: FW v 13.2 | GOOG-163 |
Devices are hidden (or show and then hide) in the new mobile UI | Workaround: Change sorting (e.g. by time or model). Code fix already in future release. FIXED: FW v 13.2 |
GOOG-254 |
Compliance policy breaks model update Error at model update:
|
Google API was suddenly changed. Code fix already in future release. If you were on 13.1.0 when EMM was enabled in your license, then you will need a fix before or after upgrading to 13.1.1. To request a patch use the Feedback Portal : Question (must be apart of the EMM program to use) |
Minor (Aesthetics) Issues
Issue | Notes | Reference |
Device status can not be changed from "Not Tracked" | Geolocation not currently implemented in Google API | FB-40 |
You cannot put the FileWave Client APK on an EMM enrolled device | ||
Fileset Status - delay between | Google API has its own un published timers | GOOG-199 |
Fileset Status - Does not show version | FileWave hopes to implement in future release | GOOG-196 |
Android Service preferences window sometimes cuts txt | FileWave hopes to implement in future release FIXED: FW v 13.2 |
GOOG-184 |
Closing and reopening the Android signup window before completion will display the wrong Google Org Name | FileWave hopes to implement in future release | GOOG-187 |
No Command History in device details | FileWave hopes to implement in future release | FB-42 |
The Serial Number I see in FileWave does not match the Serial Number I see on the device. | Some devices (Predominately Samsung) have two serial numbers, to see these on the device: Settings > Google > Device Policy > ⋮ (vertical ellipse) > Device Details. Scroll to the bottom to see the serials. |
Android EMM Zero-Touch Enrollment
What
Android Zero Touch Enrollment (ZTE) is a method for automatic device enrollment based on the device's participation in your organization's Zero-Touch Enrollment Portal.
ZTE Portal
The portal is located at : https://partner.android.com/zerotouch
But requires enrollment into the program before you can login.
When/Why
We'll want to use ZTE to ensure that devices are enrolled and are under Enterprise management. (Opt-in enrollments will almost always end up with some devices not being enrolled. and we would like to ensure our devices are all managed, preferably without us ever touching them). ZTE ensures that the device is enrolled when first setup.
How
Much of the setup for ZTE is done from outside of FileWave, but the Android ZTE portal must know about your FileWave MDM server, hence there is some configuration necessary.
You must have an Android ZTE Configuration created in your portal to configure your ZTE devices to point to FileWave. You'll find detailed information on setting up your ZTE portal and configuration here: https://support.google.com/work/android/answer/7514005
When you create the configuration, you'll fill out the names and such for your organization, but two pieces of information will be driven from your use of FileWave. First, you'll set the EMM DPC as Android Device Policy and second you will copy/paste in the FileWave JSON into the DPC extras field. You get this JSON text from the FileWave Admin in Preferences→ Google→ Configure Enterprise → Copy ZeroTouch Configuration. You'll see the FileWave Admin and Portal Configuration below:
Once the configuration is created, you simply need to assign devices in your portal to the configuration that you want them to use. Example shown below:
Once devices are in the portal, and a configuration is assigned to each, the devices will automatically enroll in your management when first setup.
Devices appear in your Zero Touch Portal through information imported from your Resellers. You must coordinate with your resellers to establish this workflow. Additionally, each device must have a configuration assigned after it is imported. At this time, there is no automatic association available in the ZTE Portal. |
Information on Android Zero Touch Enrollment
Google Play Store Errors
Android EMM Google Play store errors
If you see a 403 error (Figure 1.1):
Server error; FileWave was unable to negotiate a Play Store instance with Google.
Please try reopening this Play Store window.
Server said (403): Caller is not authorized to manage enterprise.
Figure 1.1 - 403 error |
Check your admin permissions by Managing FileWave Administrators. If you keep seeing the error after checking permissions wait a while before opening the Google Window again. Opening it too much will disable your EMM connection and you might start seeing the 500 error below.
If you see a 500 error (Figure 1.2):
Server error; FileWave was unable to negotiate a Play Store instance with Google.
Please try reopening this Play Store window.
Server said (500): Problem with Android EMM enterprise; Please check your FileWave Dashboard.
Then your EMM may be disabled, check the dashboard for errors and then check your enterprise status Admin → Preferences → Google → Configure Service Account.
Then select "Re-Enable Enterprise" (Figure 1.3):
Figure 1.2 - 500 error |
Figure 1.3 - Store has been disabled |
Embed WiFi in EMM Enrollment QR
If you have a Google Policy Fileset with Network information in it. You can select it when you generate a QR code. This inserts the information onto the device for easy enrollment.
Figure 1.1 - WiFi selected in enrollment QR |
Steps
- Generate a Google Policy for Network (Android EMM Policies and Permissions)
- Generate a new Enrollment QR
- Assistant menu → Enroll Android Devices...
- Hit the [+] in the bottom left
- Choose a WiFi Policy from the drop down
- Enroll a device as normal (Quickstart Guide for Android EMM)
Most devices running Android 8+ come with a built-in QR reader app. Older devices will often need to connect to WiFi after the seven taps to then download QR app.
The QR code that is generated contains the WiFi password in plain text.
DO NOT leave the QR code just sitting around.
Force Location for EMM Android Devices
Description
This article will help you enable location services and open the FileWave app on devices to start the reporting process.
The EMM FileWave client will send location every 15min but needs to be launched one time to start this process and location services need to be on to support the app.
Note that for any location services through the Android companion app to function, there is a server side setting for Android that must be enabled (for version 13.3.x). See related article here: Location Tracking
Ingredients
- FW Central
Directions
-
Create a Fileset for the FileWave Google Play Store app
-
From FileWave Admin, create a new mobile fileset
-
Select Play Store
-
Search for "FileWave" and click on it (Figure 1.1)
-
Press the "Select" button on the right
-
Close that window
You do NOT need to associate the app out to devices. FileWave does this automatically. You are only adding this application from the play store so you can select it in the policy
-
Figure 1.1 - FW Client on Play Store |
-
Create a Fileset For the Android Policy
-
From FileWave Admin, create a new mobile fileset
-
Select Policy under Android
-
In the description, give it a name (like "Force Location On")
-
Select "Device Restrictions" on the left and press "Configure..."
-
Change "Location accuracy" to "High Accuracy" (Figure 1.2)
This setting to turn on location services is not mandated...a customer can turn their location services back off. There is no policy available to prevent this.
However, if you make any other policy changes to that device and update the model, this same policy will turn it back on again. (Every time the policy is changed it applies wholly again to the device)
-
Select "Dedicated Device" on the left and press "Configure..."
-
For "Locked Task" change the dropdown to "Locked Task"
-
Select your "Play Store App - FW Client" fileset (Figure 1.3)
-
-
Associate this Policy Fileset out to EMM enrolled Android Devices
-
Update the Model
Figure 1.2 - Policy for Location |
Figure 1.3 - Policy for Dedicated Task |
Geofencing
What
In FileWave 14.1+ you are able to make policies for FileWave endpoint devices to specify when they are in or out of a particular geographical area.
Remember: A FileWave policy is a fileset for specifying things in/for a filewave endpoint.
This is not the same as a configuration profile, or an Android Policy
When/Why
In 14.1.* this feature is supported on Android EMM devices only, but other platforms are under development and we hope to support them in the future.
Using a geo-fence can be useful if you want to make the devices unusable by an individual that removes a device from a specific location, or just notify them they have gone too far away from "home".
An example would be a tablet used in a store for customers to browse an online library...if the device leaves the store location, you might like to disable functionality and tell the person to return the device.
The reason that this is a FileWave client policy and not something run on the FileWave server is that the client will know soonest that it is has left the location, and might not have connectivity to send info to the server.
Also think about the type of devices typically managed - these are usually WiFi only devices. If a user was to take a device, and leave an area (and also WiFi range), how would your FileWave server be able to reach that device, tell it it is out-of-bounds, and make action on it? It can't, there is no channel for communication at this point.
So, a client policy is much more effective because the client can take action without needing communication to the FileWave services, or the internet at all.
How
Requirements
Before we can setup a geofencing policy, we need to be actively receiving location data from end points. We can verify this by looking at a device in the native admin or web admin ( Individual Device View ).
If you need help getting location tracking to work, check out this KB: Location Tracking for more details.
Here is a tl;dr summary:
-
iOS needs the Enterprise IPA App
-
Android EMM might need Force Location for EMM Android Devices
-
Windows, iOS*, MacOS all need Location services to be on
*iOS Lost Mode, triggered by setting the device to "Missing" in FileWave will force location services on, but it also disables the device, where tracking from the IPA does not impact device behavior but does have a pre-requisite of location services enabled and the app approved by the customer.
Creating the Geofencing Policy
In case you were wondering, the standard for GPS is in meters, so please keep that in mind when specifying this policy.
To set a geo-fence, I first need to know the longitude and latitude of my location, then how far out from that center point I want my boundary.
An easy way to do this is to:
-
Go to a maps site like http://maps.google.com/ and enter the address of the location I want.
-
Right-click in the center and copy the Latitude and Longitude.
-
Then right-click and select "measure distance"
-
Move the first dot to the middle of your location (if needed)
-
Then place a second dot with a standard click at the farthest location of your geofence
-
Take note of the distance in meters
Figure 1.1 - Obtain coordinate and radius from a map |
Now, we need to specify that data into the FileWave Policy
-
Filesets > New Desktop Fileset > Policy
-
Under General: give it a name (like: "Site A Geofence")
-
Under the Geofencing payload, enter the latitude, longitude, and radius you obtained from the map
-
For Description, enter a location. Ideally the location you would want a device returned to, as this description will be used in the message on the device. A bad example would be something too generic like in Figure 1.3
-
Event Action: you can select one of two things
-
Send Location Notification: This is the more subtle approach, a user actively on the device might see this, but continue on their way. If they are unlocking the device they would also see this message, but it could be dismissed
-
Disable All Applications: This is the more stern approach, a user actively on the device would not be able to use it anymore, tapping the notification would tell them why that is happening (Figure 1.3)
-
Figure 1.2 - Geofencing Policy |
Figure 1.3 - Full screen message after user tapped notification |
Finally, we need to assign policy out
To do that, you simply associate the Fileset as you would any other Fileset (aka payload), to:
-
a smart group
-
a group
-
a specific device
Then update the model and you are done.
At present there is no inventory data sent back to the FileWave server to indicate there was a geo-fence breach or that the device was returned to the location, but this is under development and we hope to add this in a future release.
Deploying Google Play Apps
Follow this guide to deploy Google Play apps to you EMM (Enterprise Mobility Management) enrolled Android devices.
At this time, Google Android Management does not support the deployment of paid Play Store Apps.
Creating the Fileset
- From the Filesets view
- Select "New Mobile Fileset"
- Select "Play Store"
- Search for the app you want to deploy (figure 1.2)
- Click on the app and then press "Select" (figure 1.3)
FileWave will make the fileset in the background and leave the window open so you can keep searching for additional apps - Now associate the app to devices.
Figure 1.2 - Search for the app |
See: Using Associations with Filesets for steps on creating associations
If you have a Fileset Group selected before clicking the "New Mobile Fileset" button, any filesets you create will be placed into that Fileset Group by default.
Figure 1.3 - Select the app |
Figure 1.4 - App added |
Deploying Google Play Web Apps
Sometimes called a web clips, these are items that look like apps, but open to webpages.
Creating the Fileset
You need to have the Google Chrome app installed or allowed for web apps to work.
-
From the Filesets view
-
Select "New Mobile Fileset"
-
Select "Play Store"
-
On the left, select the globe (Web app)
Figure 1.1 - Adding Web App |
5. .Hit the plus in the bottom right
- Enter Name
- Enter URL
- Choose Display (Full Screen, Standalone, Minimal UI)
- (option) upload Icon
7. Click "Create" on the bottom right (Wait for the App to process and then show)
8. Click on the app
9. Scroll down then press "Select"
FileWave will make the fileset in the background and leave the window open so you can keep searching for additional apps
10. Now associate the app to devices.
See: Using Associations with Filesets for steps on creating associations
Android EMM Policies and Permissions
Android EMM (Enterprise Mobile Management) allows you to create permissions and send policies.
Permissions Types
Permission settings may be configured on multiple levels. They are applied in this priority (low number wins).
- Application specific permission grant (list below dropdown in Permissions tab in applications fileset properties)
- Specific permission for all applications (configured in Policy Fileset)
- Application default (Play Store App Fileset → Permissions tab)
- Global default (Android Default Policy Editor)
1. Within Each App
After you have created a Google Play Apps Fileset:
- Double click the Play Store App fileset
- Permissions tab (Figure 1.1)
- App Default Permission - The default action devices will take when an app requests a permissions
- Application specific permission grant - The setting for a specific permission within this app
- Choices
- Use Default - Defer to another setting
- Prompt - App prompts the user to approve
- Grant - Allowed, user can not change
- Deny - Not Allowed, user can no change
2. Policy Fileset - Permissions
You can create a policy fileset and associate that to a device to specify permission grants/denies.
See below for steps.
3. Global Policy
Specify the default application permission choice. (Figure 1.2)
Found under FileWave Admin → Preferences → Google → Configure Default Policy
- Unspecified
- Prompt
- Grant
- Deny
After you chance the default policy, you must update the model to apply the change.
Policies
You can create a Policy for (Figure 2.1)
- Network
- Compliance
- Password
- Device Restrictions
- Permission Grants
Network
Settings to join a WiFi network
As of 15.4, additional options have been added for DomainSuffixMatch and UseSystemCA for EAP network configuration.
Compliance Policy
Set compliance level of associated devices.
- None - Do not enforce any compliance. When other settings are sent they can be ignored and the device will operate
- Low (Default) - Require password compliance. If not compliant, no other apps will open
- High - same as low, but additionally disables any device running below Android 7.
Password Policy
Set password constraints
- Password History Length - The length of the password history. After setting this field, the user won't be able to enter a new password that is the same as any password in the history. A value of 0 means there is no restriction
- Count of Failed Passwords for Wipe - Number of incorrect device-unlock passwords that can be entered before a device is wiped. A value of 0 means there is no restriction.
- Password Expiration Timeout - A duration after which a password must be changed. A value of 0 means that passwords do not expire.
- Password Quality - The restrictions an Android device will enforce
- Weak Biometric - The device must be secured with a low-security biometric recognition technology, at minimum. This includes technologies that can recognize the identity of an individual that are roughly equivalent to a 3-digit PIN (false detection is less than 1 in 1,000)
- Password Required - A password is required, but there are no restrictions on what the password must contain.
- Numeric - Must contain numeric characters
- Minimum Length
- Numeric , Non repeating - Must contain numeric characters with no repeating (4444) or ordered (1234, 4321, 2468) sequences.
- Minimum Length
- Alphabetic - The password must contain alphabetic (or symbol) characters.
- Minimum Length
- Alphanumeric - The password must contain both numeric and alphabetic (or symbol) characters
- Minimum Length
- Complex - The password must contain at least a letter, a numerical digit and a special symbol. Other password constraints, for example, passwordMinimumLetters are enforced.
- Minimum length
- Minimum count of letters
- Minimum count of uppercase letters
- Minimum count of non-alphanumerics
- Minimum count of numerals
- Minimum count of special symbols
Device Restrictions
Restrict access to device functionality
You can choose Unspecified, Allowed, Disallowed for:
- Use of camera
- Debugging
- Install packages from unknown sources
- Allow user to add own WiFi networks
As of 15.4, a new restriction for USB Data Access has been included.
Permission Grants
A detailed list of permission settings for settings that have been classified
- Dangerous
- Normal
- No Classification
And includes everything from allowing answering of calls, camera, NFC, vibrate, to battery status, and system alerts
Toggle to show all Permission options... Expand source
ACCEPT_HANDOVER
ACCESS_BACKGROUND_LOCATION
ACCESS_COARSE_LOCATION
ACCESS_FINE_LOCATION
ACTIVITY_RECOGNITION
ADD_VOICEMAIL
ANSWER_PHONE_CALLS
BODY_SENSORS
CALL_PHONE
CAMERA
GET_ACCOUNTS
PROCESS_OUTGOING_CALLS
READ_CALENDAR
READ_CALL_LOG
READ_CONTACTS
READ_EXTERNAL_STORAGE
READ_PHONE_NUMBERS
READ_PHONE_STATE
READ_SMS
RECEIVE_MMS
RECEIVE_SMS
RECEIVE_WAP_PUSH
RECORD_AUDIO
SEND_SMS
USE_SIP
WRITE_CALENDAR
WRITE_CALL_LOG
WRITE_CONTACTS
WRITE_EXTERNAL_STORAGE
ACCESS_LOCATION_EXTRA_COMMANDS
ACCESS_NETWORK_STATE
ACCESS_NOTIFICATION_POLICY
ACCESS_WIFI_STATE
BLUETOOTH
BLUETOOTH_ADMIN
BROADCAST_STICKY
CALL_COMPANION_APP
CHANGE_NETWORK_STATE
CHANGE_WIFI_MULTICAST_STATE
CHANGE_WIFI_STATE
DISABLE_KEYGUARD
EXPAND_STATUS_BAR
FOREGROUND_SERVICE
GET_AND_REQUEST_SCREEN_LOCK_COMPLEXITY
GET_PACKAGE_SIZE
INSTALL_SHORTCUT
INTERNET
KILL_BACKGROUND_PROCESSES
MANAGE_OWN_CALLS
MODIFY_AUDIO_SETTINGS
NFC
NFC_TRANSACTION_EVENT
READ_SYNC_SETTINGS
READ_SYNC_STATS
RECEIVE_BOOT_COMPLETED
REORDER_TASKS
REQUEST_COMPANION_RUN_IN_BACKGROUND
REQUEST_COMPANION_USE_DATA_IN_BACKGROUND
REQUEST_DELETE_PACKAGES
REQUEST_IGNORE_BATTERY_OPTIMIZATIONS
SET_ALARM
SET_WALLPAPER
SET_WALLPAPER_HINTS
TRANSMIT_IR
USE_BIOMETRIC
USE_FINGERPRINT
VIBRATE
WAKE_LOCK
WRITE_SYNC_SETTINGS
ACCESS_MEDIA_LOCATION
BATTERY_STATS
BIND_REMOTEVIEWS
BIND_SMS_APP_SERVICE
CHANGE_CONFIGURATION
GET_ACCOUNTS_PRIVILEGED
GET_TASKS
GLOBAL_SEARCH
INSTANT_APP_FOREGROUND_SERVICE
PACKAGE_USAGE_STATS
PERSISTENT_ACTIVITY
READ_MEDIA_AUDIO
READ_MEDIA_IMAGES
READ_MEDIA_VIDEO
SMS_FINANCIAL_TRANSACTIONS
SYSTEM_ALERT_WINDOW
USE_FULL_SCREEN_INTENT
Figure 1.1 - App |
Figure 1.2 - Global |
Figure 2.1 - Policy Options |
DEDICATED DEVICE
Keyguard
This feature enables you to lock and unlock your screen.
Disabled option will bypass the lock screen.
Custom Launcher
When enabled, it will set your device to kiosk mode. All the applications available on device screen were deployed through FileWave.
Locked Task
This option will lock the device to open only a single app. The App must be downloaded and installed via FileWave.
Android apps are not installing immediately
What
As an administrator, you use FileWave to send a policy to an Android device. This policy will be enforced on the device. However, the precise timing of when to implement the policy changes, and particularly installing and updating applications, is determined by the device itself.
When/Why
Google prioritizes battery life and user experience for Android users. As a result, Android Play Store filesets that have been associated with a device may take up to 24 hours to install or update, per Android user experience priorities.
How
You can check the Android Device Policy on the device. The Policies section will reflect the status of apps specified by the policy.
Instructions to speed up the process
There are two ways to accelerate this process, but both require some level of cooperation from the user:
-
Once a Fileset has been associated with a device, within a short period of time, the app should appear as available in the user’s Play Store on the device. The user can select to install the app immediately.
-
The user may put their device into a passive state, by:
-
Turning on wifi and connecting to the internet
-
Charging their device
-
Clear out any running applications and stop using the device for a period of time
Alternatively, wait for a period of time (up to 24 hours) and the policy will eventually be applied and apps will be installed.
Future
Google has added a new feature called “high priority updates”. This can be specified at a per-app level and indicates that the device should install or update an app immediately, but this is not yet in FileWave as of 15.2.1.
Related Content
Android BYOD (EMM) Enrollment
About BYOD (EMM)
Android BYOD (Bring Your Own Device) Enrollment, also known as Android Enterprise Work Profile, is a method of enrolling personal Android devices in an Enterprise Mobility Management (EMM) system. This allows organizations to manage and secure corporate data and apps on employees' personal devices, while maintaining user privacy and keeping personal data separate from work data.
In this enrollment method, a work profile is created on the user's personal device, which acts as a separate container for work-related apps and data. This ensures that the organization can only manage and access the work profile, without interfering with the user's personal data and apps.
Android BYOD Enrollment offers several benefits, such as:
- Increased flexibility: Employees can use their personal devices for work, reducing the need for organizations to provide dedicated work devices.
- Enhanced security: Corporate data is secured within the work profile, preventing unauthorized access and data leakage.
- Improved privacy: Users maintain control over their personal data and apps, as the organization can only manage the work profile.
- Simplified management: EMM administrators can easily manage and configure work profiles, apply policies, and distribute apps to enrolled devices.
To implement Android BYOD Enrollment, organizations need an EMM solution that supports Android Enterprise, such as FileWave. The EMM solution will guide users through the enrollment process and help administrators manage and configure work profiles on enrolled devices.
Getting Started with BYOD (EMM)
The very first step before getting start with BYOD (EMM) is to setup Android EMM using our QuickStart Guide.
After going through the QuickStart Guide continue with the next steps.
- Download Android device policy App (https://play.google.com/store/apps/details?id=com.google.android.apps.work.clouddpc&hl=en_US)
- From the App scan the Enrollment QR code
- Add the devices to admin as normal
- (Observe) you will have a "Play Store" app and a "Work Play Store"
The devices will have the same icon in admin.
If the Inventory field "Is User-Owned" is True, the device is a BYOD.
I would add this as a column in the client view to more easily identify.
Enrollment Workflow (EMM)
If you have a Google Policy Fileset with Network information in it. You can select it when you generate a QR code. This inserts the information onto the device for easy enrollment.
Figure 1.1 - WiFi selected in enrollment QR |
The QR code that is generated contains the WiFi password in plain text.
DO NOT leave the QR code just sitting around.
Android EMM Location Tracking
Android EMM devices need to install a FileWave "companion" application onto the device that will send us location data. Reference Force Location for EMM Android Devices for details.
Android EMM Global Default Policy Change (14.9+)
What
Prior to version 14.9 of FIleWave, Password and Keyguard policies were included automatically in an Android Default Custom Policy. An Android Default Custom Policy sets certain device parameters for ALL managed Android EMM devices. In Version 14.9, this behavior is changed because inclusion of Keyguard/Password elements in the default policy can cause issues with BYOD enrollment, so those elements are now removed from all default policies.
When/Why
Default Policies are used to set global settings for enrolled Android devices. If you don’t use them, or are just starting now to use them, this article has no impact on your environment. If you used them prior though, and Keyguard and Password Policies are important to your environment, you MUST make the changes outlined below.
How
Because those two settings are removed from the default policy, you’ll likely want to make the following change BEFORE upgrade to ensure a seamless policy shift (afterword is OK too, but devices won’t have the policies in the meantime). Basically, it is a simple change…instead of including those policy configs in the global policy, we’ll just put them in a normal (fileset) policy and apply that by smart group instead. The best option would be to apply that policy via a smart group to all non-BYOD Android devices. Then, as soon as your server is upgraded, all devices that need the “new” policies will have them. Example fileset policy and smart group definition shown below:
Android devices with multiple policies
What
Android Policies can be used to manage settings on Android devices. For a list of some of the things that can be managed take a look at Android EMM Policies and Permissions.
When/Why
When more than one policy is applied, how will you know which settings are in effect? In reality, Android only supports 1 policy at a time so what is the logic used when combining them?
How
This is the crucial ordering. merge_policy_fragment() follows the principle of "most restrictive" policy wins, but what is more correct in those gray areas of competing information? For example, which fragment wins if there are two conflicting WiFi configurations? In that case, the last one, as ordered by distance first (in DESC order), and ties won by the most recently created association.
- This ordering is the reverse of other sections of the FW code because here, "last one wins". So, closer distance overwrites farther distance.
- Being precise, we (FileWave) do not order beyond (distance, assoc_id) in other parts of the code. We do here, however.
For even more clarity about what is installed, you can look at Device Details for a device in FileWave Central. Go to the Installed Policy tab and see the policy as it was sent to the device. This view will let you know exactly what was sent.