1. Home
  2. Device management
  3. Compliance & Security
  4. Bring Your Own Device Security Controls | Frequently Asked Questions (FAQs)

Bring Your Own Device Security Controls | Frequently Asked Questions (FAQs)

This article provides the answers to frequently asked questions (FAQs) relating to Bring Your Own Device (BYOD) Security Controls.

What do I do if I have a question about the BYO device solution?

Please ensure you have first reviewed all relevant guidance. If you have a question, you can raise a query about the security controls via the ServiceNow (SNOW) Raise a Request form.

What do I do if I have an issue with the BYO device solution?

Please ensure you have first reviewed all relevant guidance and understand the expected user behaviour. If you have an issue, you can raise an incident related to the security controls via the ServiceNow (SNOW) Raise an Incident form.

How do I know my users will be accessing O365 services from a Trusted Location?

Network colleagues in your organisation should be able to confirm the routing of your O365 traffic and whether it goes via the HSCN.

What if my organisation does not use the HSCN?

If an organisation is unable to use the HSCN and is unable to enrol devices in Intune, Local Administrators can enquire about including additional IP addresses in the BYO device solution Trusted Location range. This can be done by raising a query via the ServiceNow (SNOW) Raise a Request form. Please note that such requests will require a security review and will be assessed on a case-by-case basis.

Will the BYO security controls monitor or wipe personal data on BYO devices?

Personal data on BYO device cannot be wiped or monitored as a result of the BYO device security controls.

Do the BYO security controls apply to users or devices?

The BYO security controls apply to users, not to devices. Therefore, no device enrolment is required for this solution.

When will the BYO security controls start to apply to users?

Once a user is added to a Security Group, relevant access controls will be applied. Once a user is removed from the Security Group, all controls will cease to apply.

Last Reviewed Date 14/10/2024
Updated on 14/10/2024

Related Articles

Need Support?
Can’t find the answer you’re looking for? Don’t worry we’re here to help!
Contact Support
back to top