Setting Up Mobile Device Management (MDM) in Office 365
Setting Up Mobile Device Management (MDM) in Office 365
Mobile Device Management (MDM) in Office 365 (now part of Microsoft 365) is a feature that allows organizations to manage and secure mobile devices such as smartphones, tablets, and laptops that access corporate data. This is particularly important for organizations that need to secure company data on employee devices, ensure compliance with company policies, and protect sensitive information.
MDM in Microsoft 365 integrates with Azure Active Directory (Azure AD), Exchange Online, and other Microsoft services, offering a comprehensive solution for managing mobile devices.
Step 1: Verify Your Office 365 Plan
Before starting, ensure that your Office 365 plan supports Mobile Device Management (MDM). MDM is included in the following Microsoft 365 plans:
- Microsoft 365 Business Premium
- Microsoft 365 Enterprise (E3 and E5)
- Office 365 Enterprise E3 and E5
- Microsoft 365 Education (A3 and A5)
If your organization does not have a plan that includes MDM, you will need to upgrade to one of the appropriate plans.
Step 2: Access the Microsoft 365 Admin Center
To set up MDM, you need to access the Microsoft 365 Admin Center. Here’s how you can get there:
-
Sign in to Microsoft 365:
- Open your browser and go to the Microsoft 365 Admin Center.
- Log in with your admin account credentials.
-
Navigate to Endpoint Security:
- In the Admin Center, from the left-hand navigation pane, click on "Endpoint security" under the "Security" section. This is where you can configure and manage MDM settings.
Alternatively, MDM is also accessible through Intune (if you have Microsoft Intune included in your plan) for more granular device management.
Step 3: Enable Mobile Device Management (MDM)
Once you are in the Admin Center, you need to enable MDM for your organization. Follow these steps:
-
Go to the “Devices” section:
- In the Admin Center, navigate to "Devices" and click on "Mobile Device Management" or "Endpoint Security".
- You’ll be redirected to the Microsoft Intune Admin Console for managing mobile devices.
-
Activate MDM:
- Under Mobile Device Management settings, choose "Mobile Device Management (MDM)" and then click on “Set up”.
- You will be prompted to configure the MDM settings.
-
Enable MDM for Office 365:
- MDM needs to be enabled to allow devices to be enrolled in your organization. If it's not yet enabled, you’ll be asked to turn on the MDM feature.
- Click on “Start” to enable MDM. This will take a few moments to process.
Step 4: Configure Device Security Policies
Once MDM is enabled, you need to create and assign policies that will manage the security and access rules for devices. These policies define how devices will interact with Office 365 services (e.g., email, SharePoint).
-
Create a Mobile Device Policy:
- In the Intune Admin Console, go to "Device security" and select “Policies”.
- Click on "Create policy" and choose Mobile Device Management.
- Select the type of devices you want to manage (e.g., iOS, Android, Windows).
-
Configure the Policies:
- Password Requirements: Set strong password policies for mobile devices, such as requiring PINs or biometric authentication.
- Encryption: Require encryption on devices to ensure that sensitive data is protected.
- Lock Screen Settings: Configure lock screen timeout settings and prevent unauthorized access.
- Remote Wipe: Configure policies that allow you to remotely wipe data from lost or stolen devices.
- App Management: Set policies on which apps can be installed or blocked on the device, including corporate apps like Outlook, Teams, and SharePoint.
-
Set Compliance Rules:
- Create compliance policies that enforce the settings (e.g., encryption, password length) on the mobile devices.
- For example, if the device doesn’t comply with the password policy, it can be marked as non-compliant and access to email or other corporate resources will be restricted.
-
Assign the Policies:
- Once your policies are created, you’ll need to assign them to specific users, groups, or device types. You can assign policies based on department (e.g., sales team, IT team) or role within the organization.
- Go to "Assignments" and select the groups or users who should be targeted for these policies.
Step 5: Configure Conditional Access for MDM
You can implement Conditional Access policies to ensure that only compliant devices can access corporate resources like email, SharePoint, and Teams. Here's how you can configure it:
-
Go to Azure Active Directory:
- In the Admin Center, go to Azure Active Directory and select Security.
- Under Security, click on Conditional Access.
-
Create a New Conditional Access Policy:
- Click "New policy" and give the policy a name.
- Under Assignments, select the users or groups you want to apply the policy to.
- Under Cloud apps or actions, select the services you want to secure (e.g., Exchange, SharePoint).
-
Configure Conditions:
- Select Conditions, such as requiring devices to be compliant before they can access corporate data.
- You can also set locations, so only devices from trusted networks (like your office) can access resources.
-
Configure Access Controls:
- Under Grant, you can choose to block access or allow access with additional controls like Require compliant device, Require multi-factor authentication (MFA), or Require hybrid Azure AD joined device.
-
Enable the Policy:
- Set the policy to "On" to start enforcing it.
- Click "Create" to apply the Conditional Access policy.
Step 6: Enroll Devices into MDM
Once MDM is set up, users will need to enroll their mobile devices into the system. Here's how users can do it:
-
Enroll iOS Devices:
- Go to Settings on the iPhone/iPad.
- Tap on "Mail", then "Accounts".
- Tap "Add Account" and select "Exchange".
- Enter the user's credentials (email and password), and follow the prompts to enroll the device in MDM.
-
Enroll Android Devices:
- On the Android device, go to Settings > Accounts > Add account > Microsoft Exchange.
- Enter the user’s email and password.
- Follow the on-screen instructions to finish the enrollment.
-
Enroll Windows Devices:
- On Windows 10/11 devices, go to Settings > Accounts > Access work or school.
- Click on "Add work or school account" and enter the user’s credentials.
- The device will be automatically enrolled in MDM.
Once devices are enrolled, they will be subject to the policies you created in the previous steps.
Step 7: Monitor and Manage Devices
After devices are enrolled and the policies are applied, you can monitor and manage them through the Microsoft 365 Admin Center or Intune portal.
-
View Device Compliance:
- Go to the "Devices" section in the Admin Center.
- Here, you can view a list of all devices, see their compliance status, and take actions such as remote wipe, lock, or retire a device if necessary.
-
Audit and Reports:
- You can view device compliance reports to see how many devices are compliant or non-compliant with your security policies.
- These reports can help you identify any devices that are not adhering to your company’s security guidelines.
-
Remote Wipe:
- In case of lost or stolen devices, you can perform a remote wipe to erase company data from the device.
- This can be done directly from the Microsoft Endpoint Manager (Intune) console or through the Admin Center.
Step 8: User Communication and Training
To ensure smooth adoption of MDM, it is important to communicate with your users about the policies and their role in securing corporate data. Provide training and instructions on how to enroll their devices, what security policies they must follow, and what to do if they lose their devices or experience technical issues.
Conclusion
Setting up Mobile Device Management (MDM) in Office 365 (via Microsoft Intune) allows organizations to secure and manage mobile devices that access corporate resources. By following the steps outlined, you can:
- Enable MDM and configure security policies.
- Use Conditional Access to control device access.
- Enroll and monitor devices for compliance.
- Secure company data on mobile devices.
By effectively managing mobile devices, businesses can ensure that sensitive information remains secure, even as employees use a variety of devices to access corporate resources.

Comments
Post a Comment