Skip to Content
DevicesWindows

BYOD

  • Click on “Devices” in the Dashboard.

  • Select “Windows” on the left panel.

  • Click on “Enroll Device”, then choose the appropriate Device Type which you would like to use.

  • After selecting the device type, select a user.

  • Once it is complete, click on “Enroll Device”.

  • An email will be sent with detailed instructions, which you can follow directly.

    NOTE: You must install the Secure Connect application on your Windows system and follow the GitHub instructions provided to complete the setup

    windows byod device enrollment

Fully Managed

  • Click on “Devices” in the Dashboard.

  • Select “Windows” on the left panel.

  • Click on “Enroll Device”, then choose the appropriate Device Type which you would like to use.

  • Select the device type as “Fully Managed” and choose a user.

  • Once it is complete, click on “Enroll Device”.

  • An email will be sent with detailed instructions, which you can follow directly.

  • There are two ways: Non-Active Directory and Active Directory.

    Non-Active Directory:
    • You will receive an email which will install a .bat extension file which will add the separate user in the system.

    • The Username and Password can be displayed when you first created the user in the user tab.

    • Once signed in, all the policies will begin to take effect.

    Active Directory:
    • Once you have added a directory service, the list of users will also be added along with the previous Username and Password.

    • Add the users to a group and change the policies, once it is completed, update the policies and it will begin to take effect.

windows byod device enrollment

  • Hover over the device and click on “Open” and you will see “Device Policies” and “Actions”.

  • Device Policies will only affect the specific windows device. The Policies are as follows:

    Device Functionality:

    Screen Capture – Can be allowed or restricted.

    Removable Storage Device – Can be allowed or restricted.

    Bluetooth – Can be allowed or restricted.

    Ethernet:

    Ethernet – Can be allowed or restricted.

    Proxy Server:

    Proxy URL – Type in Proxy URL.

    Proxy Certificate – Upload Proxy Certificate, accepted file type “.cer”.

  • Actions will also only affect the specific windows device. The Actions are as follows:

    Delete Device: This will delete the device and remove the policies from the device.

    Locate Device: This will locate the device.

    Graceful Restart: This will restart the device.

    Enable BitLocker: This will allow the user to enable locks on drives.

    Disable BitLocker: This will allow the user to disable locks on drives.

    BIOS/Boot Protection: This will allow the user to change settings to BIOS.

Last updated on