Apple Business Manager (ABM)
ABM Bulk App Deployment
Apple Device Enrollment Program (DEP) using Codeproof
Apple Business Manager - Apps Deployment
Migrating Apple devices into ABM(DEP) using Apple Configurator 2
Enabling Supervised Mode for iPhone and iPad
Mobile Alert Management
Cloud Console TWO Factor (2FA) Authentication
Device Lookup by Phone Number, IMEI, ICCID or Employee Name
Mobile Device Management Software System Auditing
How to manage mobile devices and apps using Codeproof?
iOS7 system properties are available
How to ping a device using Codeproof?
Securing Chrome Browser and Web Filtering in Android
Secure Browser and Web Content Filtering
Securing Safari Browser and Web filtering in iPhone-iPad
iPhone, iPad and iPod Touch Parental Controls in Codeproof
Configure Office365 email accounts in mobile devices
Configuring Microsoft Exchange ActiveSync Email on Samsung Devices
Configuring Microsoft Exchange ActiveSync Email on LG devices
How to configure Office365 email or Exchange EAS on Apple devices
How To Articles
Mobile Device Management
What are Web Apps?
Device Admin Deprecation - What you need to know?
Google Workspace and Codeproof
Paid Apps and Managed Play Store
Managed Google Playstore
Restricting access to Account Management
Battery Level low notifications
Android Enterprise Custom Messages
Factory Reset Protection (FRP)
Android Enterprise Policies
Selectively deploying apps from the managed playstore
Android Enterprise (AE) Setup
Network Monitoring in Android
Enabling pre-loaded system apps in Android Enterprise
What is Android Enterprise?
Apple Device Management
Web clips in Apple Devices
What is a supervised device?
iOS App Bundle Id
Apple Watch MDM Policies
iOS 9 MDM Restriction Policies
Blocking AppStore in Apple Devices
iPhone and iPad Restriction Policies
iOS 8 Mobile Device Management (MDM) Policies
What's new in iOS 6 MDM?
iOS7 background apps from being killed by App Switcher
Configuring iOS 7 App Policies
Deploying iOS Configuration Profiles using Profile Manager
Suspending and Hiding Apps in Android
Blocking the default applications in Apple Devices
How to block all the downloaded apps in iOS?
Deploying Web Apps in Android Enterprise
Amazon Flex App Deployment
How to update Google Play Store app
iOS App Deployment
iOS Enterprise App Deployment
How to Deploy Mobile Apps through Codeproof Platform
Android App deployment
How to find iTunes store id or App id?
Data Leakage Prevention(DLP)
Remotely locking Android devices
How to remotely wipe all the data from Android Phone
Phone Remote Lock and Remote Data Wipe By SMS
How to remotely lock the device with a recovery key?
Android MDM Setup using ADB Script
Android Enterprise - Keep All System Apps
Android Zero-touch Enrollment
QR Code Enrollment
Android Enterprise QR Code Generation
Apple Devices Enrollment Techniques
Profile based MDM enrollment for Apple Devices - BYOD Scenario
Device Enrollment Wizard
Bulk Device Enrollment
GPS Location Tracking
GPS location tracking using Codeproof
Prevent end users from disabling GPS Locations
Tracking the physical location of iPhone and iPad devices using MDM
How to enable location permissions?
How to prevent the location service from being turned off?
How to prevent someone from disabling find my iphone?
How to improve mobile phone location accuracy
Enabling Single App mode in iPhone, iPad and iPod
Android Kiosk with Multiple and Single App Mode
How to turn-off kiosk mode?
Mobile Kiosk Branding
Mobile Apps whitelisting
How to prevent the Mobile Device Management protection from being turned off?
How to protect MDM profile in the device?
Force Syncing contacts in the Contact Manager
Disable Contacts Sync in the Outlook Exchange Email
Android Enterprise Permission Management
How to enable Android app permissions?
Block apps based on android permissions
Mobile apps access permissions monitoring using Codeproof
Remove MDM from ABM-DEP Enrolled Devices
Disable MDM using a code
How to remove Codeproof ?
Remove Device Admin MDM
Removing Android Enterprise MDM
How to remove MDM from iPhone, iPad and iPod?
Screenlock and Passcode
How to remotely enforce password in Android Phones and Tablets?
iOS Passcode Management
Device screenlock status and enabling passcode policy
Remotely locking iPhone, iPad or iPod Touch devices
How to unlock iPhone, iPad and iPod touch devices?
How to enable passcode lock in iPhone and iPad
How to turn off Passcode Lock on iPhone and iPad
Changing Android device display language
Mobile Expense Control
Data Usage Monitoring
How to limit mobile data usage?
Call Tracking and Mobile Expense Control
How to optimize Battery usage and Data usage in Android?
Products and Services
Codeproof® Call Blocker
Secured Remote Access
SiteSecure - Campus Camera Blocking
Managed Mobile Hotspot
Updated by Satish Shetty
The Codeproof EMM platform offers an Android factory reset protection (FRP) for the managed devices. The enterprise factory reset protection secures the device from the unauthorized factory reset (such as external hardware reset using Volume Key + Power Key). With the enterprise FRP, The MDM administrator can assign a single or multiple google accounts to force authenticate after the unauthorized factory reset. The default built-in consumer factory reset protection is designed to deter device theft by forcing google sign-in after the unauthorized factory reset. However, the built-in consumer factory reset protection relies on active gmail account in the device and it may not work for the below enterprise provisioned scenarios.
1. Devices with no active Gmail account
By Default, The android uses existing google account in the device to authenticate after the unauthorized factory reset. However, in many cases such as Kiosk mode or COSU scenarios, there may not be any gmail account active in the device. In this case the enterprise factory reset protection is required to protect the device from being stolen and re-provisioned.
2. Devices with active Gmail account
In an enterprise environment, even with active user gmail accounts exists in the device, The IT administrator needs end user gmail credentials to authenticate the device after the unauthorized factory reset. However, if the organization doesn't know an employees account credentials ( for example, the employee no longer in the organization), factory reset protection can block the organizations ability to issue a device to another employee.
Below are the steps to enable the enterprise factory reset protection.
- Login to Cloud Console.
- Go to "Mobile Policy Manager" from the top menu.
- Select a single device or a group of devices from the left pane.
- On right side pane, go to "Enterprise Factory Reset Protection" tab.
- Click on "Enable" check box and then click on "Add Account" to add google accounts. You can add a single or multiple google accounts.
- Hit "Save" to save and publish the policies instantly.
Mobile Policy Editor:
Selecting the Google Accounts:
The below Device Property shows the FRP status in the device.
In the above picture, value "default" means no enterprise FRP account has been added. The device will use user gmail account for factory reset protection.
In the above picture, value "false" means enterprise factory reset protection is disabled in the device.
In the above picture, value contains the account id number indicates that google account has been added as part of the enterprise factory reset protection.