Skip to content
User Enrollment

User Enrollment

Published by Microsoft

Configure User Enrollment settings to enable privacy-focused BYOD (Bring Your Own Device) deployments where employees maintain personal device ownership while meeting organizational security requirements. This profile establishes a managed partition that separates corporate data and applications from personal content, allowing IT administrators to enforce security policies on work-related resources without accessing or controlling personal information. User Enrollment provides a balanced approach that respects employee privacy while ensuring compliance with corporate security standards, making it ideal for organizations supporting personal device use in the workplace.

OS requirements
Windows 10/11, macOS 11+
Related items:
Certificate
Certificate

Configure digital certificates for authentication, encryption, and secure communications across devices and services. Deploy trusted root certificates, intermediate CA certificates, user identity certificates, or device certificates to enable secure network access, VPN connections, email signing and encryption, or application authentication. Manage certificate trust settings, specify allowed uses, and ensure proper certificate chain validation to maintain security standards across your organization.

Managed Data Flow
Managed Data Flow

Configure and control the movement of data between systems, applications, and services within your infrastructure. Define data routing rules, transformation pipelines, and transfer protocols to ensure secure and efficient information exchange. Implement validation checks, error handling, and logging mechanisms to maintain data integrity throughout the flow process. Support for scheduled transfers, real-time streaming, and batch processing enables flexible deployment across diverse operational requirements.

Passcode
Passcode

Configure passcode requirements and authentication policies for devices across all platforms to enforce security standards across your organization. Define passcode complexity rules including minimum length, character requirements, and expiration intervals. Control grace periods for passcode entry, failed attempt limits, and automatic device lock timeouts. Deploy this profile to ensure consistent authentication policies, protect sensitive data on managed devices, and maintain compliance with organizational security requirements for both local user accounts and device unlock scenarios.