Skip to main content

AndroidNexus Best Practices

Follow these guidelines to get the most out of AndroidNexus and ensure a secure, well-managed device fleet.

Organization & Planning

Use Friendly Names

Device codes are auto-generated (e.g., ACME-AND-0001), but you can set friendly names for easier identification:

Tips:

  • Set descriptive friendly names like "John's Sales Phone" or "Warehouse Scanner 3"
  • Update friendly names from the device detail view (click the pencil icon)
  • Use names that help identify the device's user or purpose

Organize with Tags

Use tags to organize and filter your device fleet:

Example Tags:
- Department: sales, engineering, support, executive
- Location: hq, remote, field
- Device Type: phone, tablet, rugged
- Status: pilot, production, loaner

Tips:

  • Apply multiple tags per device for flexible filtering
  • Use consistent tag naming (lowercase, no spaces)
  • Add tags during enrollment or from device detail view
  • Filter devices by tags on the Devices page

Document Your Policies

Maintain documentation for each policy:

  • Purpose: Why does this policy exist?
  • Target audience: Who/what devices use it?
  • Key settings: Summary of important configurations
  • Change history: When and why it was modified

Security

Follow Least Privilege Principle

Only grant the minimum permissions necessary:

Good:
- Allow only required apps
- Block unnecessary features
- Restrict network access to needed resources

Avoid:
- Blanket admin access
- Disabling all security for convenience
- Leaving default policies unchanged

Enforce Strong Authentication

Minimum recommended password settings:

SettingMinimum Value
Length8 characters
ComplexityLetters + Numbers
Expiration90 days
History5 passwords
Max attempts10

Consider biometric authentication for better user experience with maintained security.

Keep Devices Updated

Configure automatic updates:

System Updates:
Policy: Automatic
Window: 02:00 - 06:00 (low usage hours)

Security Patches:
Policy: Automatic
Max Age: 30 days (compliance warning)

Monitor security patch levels and follow up on outdated devices.

Encrypt Everything

Always enable:

  • Device storage encryption
  • SD card encryption (if applicable)
  • Work profile encryption (for BYOD)

Use Always-On VPN

For sensitive environments:

VPN Configuration:
Always On: Yes
Lockdown Mode: Yes # Block traffic without VPN
Trusted Networks: None # Always require VPN

Enrollment

Test Before Bulk Deployment

Before enrolling many devices:

  1. Enroll 1-2 test devices
  2. Verify all policy settings apply correctly
  3. Test all required apps install and work
  4. Confirm user experience is acceptable
  5. Document any issues and solutions

Use Appropriate Enrollment Methods

ScenarioRecommended Method
1-10 devicesQR Code
10-100 devicesQR Code + batch processing
100+ devicesZero-Touch Enrollment
BYODWork Profile via app store
KioskQR Code with kiosk policy

Set Token Expiration

Don't leave enrollment tokens active forever:

Good:
- Expiration: 7 days
- Use Limit: 10 devices
- Descriptive name: "Q4-Sales-Rollout"

Avoid:
- No expiration
- Unlimited uses
- Generic names like "token1"

Policy Management

Start with Templates

Don't build from scratch:

  1. Choose the closest template
  2. Customize for your needs
  3. Test thoroughly
  4. Document changes

Test Policy Changes

Before applying changes broadly:

  1. Create a test policy or use a pilot device
  2. Apply changes to the test device first
  3. Verify expected behavior
  4. Monitor for 24-48 hours
  5. Roll out to remaining devices

Version Your Policies

Use the policy history feature:

  • Add notes when making changes
  • Reference ticket numbers or requests
  • Document the reason for changes
  • Know how to rollback if needed

Application Management

Vet Apps Before Deployment

Before adding to your library:

  • App is from trusted publisher
  • Reviews don't indicate security issues
  • Permissions requested are reasonable
  • App is actively maintained
  • Compatible with your Android versions

Use Managed Configurations

Pre-configure apps to reduce user friction:

Microsoft Outlook:
email_address: ${user.email}
server: outlook.office365.com

Corporate VPN:
server: vpn.company.com
auto_connect: true

Monitor App Inventory

Regularly review:

  • Apps installed across fleet
  • Versions in use
  • Apps that failed to install
  • Unauthorized app attempts

Plan App Updates

For critical apps:

  • Test updates on pilot devices first
  • Schedule updates during low-usage hours
  • Have a rollback plan
  • Communicate changes to users

Monitoring & Compliance

Monitor System Alerts

AndroidNexus displays alerts in the dashboard for conditions such as:

ConditionSeverity
Device offline for extended periodMedium
Compliance violationsHigh
Low storage warningsLow
Outdated security patchesMedium

Current capabilities:

  • View alerts in the dashboard with severity indicators
  • Acknowledge alerts to dismiss them
  • Filter alerts by severity level

Coming soon:

  • Configurable email notifications
  • Custom alert conditions and thresholds
  • Integration with external notification services

Review Dashboard Daily

Morning checklist:

  • Check offline device count
  • Review compliance status
  • Check for failed enrollments
  • Review alert notifications
  • Verify critical devices are online

Regular Compliance Audits

Monthly:

  • Export compliance report
  • Review non-compliant devices
  • Follow up on persistent issues
  • Update policies if needed

Quarterly:

  • Review all policies
  • Audit user access
  • Check API key usage
  • Review audit logs

Document Incidents

When issues occur:

  1. What happened: Device ID, symptoms
  2. When: Timestamp and duration
  3. Impact: Users/operations affected
  4. Resolution: Steps taken to fix
  5. Prevention: Changes to prevent recurrence

User Experience

Balance Security and Usability

Too restrictive = Shadow IT and workarounds

Good Balance:
- Allow personal apps in work profile
- Enable camera unless required to block
- Allow reasonable app installs from Play Store
- Keep password requirements manageable

Avoid:
- Blocking everything "just in case"
- Complex passwords changed too frequently
- Removing all user control

Communicate with Users

Before changes:

  • Announce upcoming policy changes
  • Explain the reason (security, compliance)
  • Provide timeline
  • Offer support resources

Provide Self-Service Options

Empower users when safe:

  • Password reset (within policy limits)
  • Device location (for lost devices)
  • App installation (from approved list)
  • Profile information updates

Disaster Recovery

Backup Your Configuration

Regularly export:

  • Policy configurations
  • Onboarding token settings
  • Device reports (CSV exports)

Have a Lost Device Procedure

Document the steps:

  1. Verify device is actually lost
  2. Lock device immediately via Quick Actions
  3. Enable Lost Mode with contact information
  4. Wait 24 hours for recovery
  5. Factory Reset if not recovered
  6. Document and close incident

Plan for Admin Account Issues

Ensure:

  • Multiple admin accounts exist
  • Emergency access procedure documented
  • API key for automated recovery
  • Regular admin access reviews

Summary Checklist

Initial Setup

  • Set up device tags for organization
  • Create baseline policies
  • Test enrollment process
  • Configure onboarding tokens

Ongoing Operations

  • Review dashboard daily
  • Respond to alerts promptly
  • Keep devices updated
  • Monitor compliance
  • Document incidents

Regular Reviews

  • Monthly compliance audit
  • Quarterly policy review
  • Annual security assessment
  • User feedback collection