How to Configure Android Enterprise Dedicated Kiosk Devices with Intune

What Is Android Enterprise Dedicated Device Mode?

In the previous posts of this series, we covered BYOD, COPE, and COBO enrollment scenarios each designed around a device tied to a specific user identity. Dedicated Device mode is a fundamentally different story.

A Dedicated Device has no user identity attached to it. There is no personal space, no work profile separation, no individual sign-in required. The device exists for a single purpose: to run a defined task or application, locked down and fully controlled by IT. This is what the industry calls Kiosk mode.

Think about the real-world scenarios where this matters: a barcode scanner on a warehouse floor, a self-service check-in tablet at a hotel reception, a digital signage screen in a retail store, or a field device mounted in a delivery truck. These devices are not carried around by named employees they serve a function, and they need to do exactly that function and nothing else. In Android Enterprise terms, this enrollment type is called Corporate-owned dedicated devices (COSU), and Microsoft Intune has robust support for it through the Fully Managed, Dedicated, and Corporate-Owned Work Profile policy framework


INTUNE CONFIGURATION

Step 1: Create the Enrollment Profile

Navigation: Devices › Android › Enrollment

In the Microsoft Intune admin center, navigate to the Android enrollment section. Under the Android Enterprise section, you will see several enrollment profile types. Select Corporate-owned dedicated devices.

This is the enrollment type that places the device into Device Owner mode without any user affinity. Unlike COBO (Fully Managed), which ties the device to a specific user account, Dedicated Device enrollment is completely userless policy applies at the device level, not the user level. Click into Corporate-owned dedicated devices and create a new profile.

Basics Tab Settings

Configure the profile with the following settings:

SettingConfigured ValueRationale
NameDedicated DevicesThis is the value referenced in every Assignment Filter throughout this guide. Use a clear, identifiable name.
Token typeCorporate-owned dedicated device (default)Generates a QR code and enrollment token used during device provisioning. Leave unchanged.
Token expiration dateSet per deployment timelineTokens expire if devices enroll after the expiry date, enrollment fails. Plan ahead for bulk rollouts.
Apply device name templateYesEnables automatic device naming at enrollment time.
Device name templateTAB{{SERIALAST4DIGITS}}Names each device using the last four digits of its serial number (e.g., TAB61JT). Invaluable for inventory tracking in large kiosk deployments where devices are not assigned to individual users.

Choosing a naming convention that maps to physical asset labels pays dividends during troubleshooting. If warehouse tags use serial-based stickers, matching the Intune name template to that convention eliminates ambiguity at scale.

Device Group Tab

On the Device group tab, you have the option to assign an Entra ID security group that devices will automatically join upon enrollment. The informational note reminds you that the Intune Provisioning Client or Intune ClientConfidential app must be added as an owner of that group for dynamic membership to work correctly.

For this guide, leave this as None and rely on Assignment Filters for policy targeting a more flexible approach when multiple device types enroll through different profiles. Click Next, review your settings, and create the profile.

Step 2: Create the Device Configuration Profile

Navigation: Devices › Android › Configuration

With the enrollment profile in place, the next step is to define how the device actually behaves.

Navigate to Devices › Android › Configuration and click + Create. On the Create a profile flyout, set:

SettingConfigured ValueRationale
PlatformAndroid EnterpriseTargets the Android Enterprise management stack.
Profile typeTemplatesProvides access to the built-in restriction templates.
Template nameDevice restrictionsLocated under the Fully Managed, Dedicated, and Corporate-Owned Work Profile section.

On the Basics tab, name this policy Dedicated Devices-Config. Using a consistent naming approach in Intune helps keep things organized, particularly if you’re working with multiple Android Enterprise enrollment types.

Step 3: Configure Device Restrictions Settings

The Configuration settings tab is divided into multiple sections. The following covers the settings most relevant to a Dedicated Device deployment.

General Settings

The General section applies across all Fully managed, dedicated, and corporate-owned work profile devices. For a kiosk deployment, the key configurations are:

SettingConfigured ValueRationale
USB file transferBlockOn a kiosk device, there is no legitimate reason to extract data via USB. Block this unconditionally.
External mediaBlockSD cards and external storage are attack vectors on unattended devices.
Beam data using NFCBlockNFC data transfer is another surface that should be closed, particularly in public-facing deployments.

Fully Managed and Dedicated Devices – Kiosk Mode Settings

Scrolling down reveals settings specific to Fully managed and dedicated devices, including a subsection labeled Kiosk mode only. These settings only take effect when a kiosk policy is active:

SettingConfigured ValueRationale
Volume changesBlockPrevents users from adjusting device volume. Useful for kiosk or shared environments.
Factory resetBlockPrevents users from factory resetting the device and removing management.
Status barBlockHides notification shade and quick settings access.
Wi-Fi settings changesBlockPrevents users from modifying Wi-Fi configurations.
USB storageNot configuredUSB storage behavior follows the platform default. Adjust based on your security requirements.
Network escape hatchEnableAllows temporary network configuration during boot if connectivity is lost.
Notification windowsDisablePrevents pop-up notifications from appearing on screen.
Skip first use hintsEnableSuppresses Android setup hints for a cleaner provisioning experience.

Fully managed and dedicated devices (Kiosk mode only)

SettingConfigured ValueRationale
Power button menuBlockPrevents access to power options via long press.
System error warningsAllowKeeps system error dialogs visible for troubleshooting.
End-user access to device settingsBlockFully blocks access to device settings while in kiosk mode.

Dedicated devices

SettingConfigured ValueRationale
Locate deviceBlockPrevents device location from being accessed via the device interface.

System Security and Device Password

SettingConfigured ValueRationale
Threat scan on appsRequireGoogle Play Protect scanning should always be required on managed devices. Even in a locked-down kiosk scenario, this is a baseline security control.
Disable lock screenDisableOn a kiosk device not tied to a user, requiring a PIN every time the screen turns off creates a poor experience and an operational headache. The security model for dedicated devices rests on device restrictions and management controls — not on a PIN protecting personal data.

Configure the Kiosk (Device Experience) Settings

This is the heart of the Dedicated Device configuration. Within the Configuration settings, navigate to the Device experience section. Set Device experience type to Kiosk mode (dedicated and fully managed). Once selected, the Kiosk mode dropdown appears set it to Single app.

Single app kiosk locks the device to run exactly one application. The selected app becomes the entire user interface no home screen, no app drawer, no way to navigate elsewhere. The device boots directly into that app. Multi-app kiosk uses Microsoft Managed Home Screen as a launcher and allows a curated set of apps, which is covered in a separate post.

After selecting Single app, click + Select an app to use for kiosk mode. A panel opens listing all apps currently synced from Managed Google Play to Intune. In this example, Company Web Site / a web app created in Managed Google Play is selected. Only apps already approved and assigned to Intune will appear in this list. It is important to remember that the app must also be assigned as Required in your app assignment workload. The kiosk policy pins the app, but the app deployment is what actually installs it.

Power Settings and Users and Accounts

SettingConfigured ValueRationale
Add new usersBlockPrevents additional users from being created on the device.
User can configure credentials (work profile-level)Not configuredWork profile credential configuration is not enforced in this deployment.

Fully managed and dedicated devices

SettingConfigured ValueRationale
User removalBlockPrevents removal of any enrolled account.
Personal Google accountsBlockEnsures the device remains strictly business-only.

Dedicated devices

SettingConfigured ValueRationale
Account changesBlockPrevents modification of account settings on unattended task-based devices.

Step 4: Assign the Configuration Profile with an Assignment Filter

ItemValue
Included groupAll Devices
Filter behaviorInclude filtered devices in assignment
Filter nameDedicated Devices
Filter ruledevice.enrollmentProfileName -eq "Dedicated Devices"

This setup ensures the policy applies only to devices enrolled through the Dedicated Devices profile, even though the assignment target is set to All Devices. are evaluated dynamically at policy delivery time, without requiring manual group membership management. As new kiosk devices enroll, they automatically match the filter and receive the policy.

Step 6: Create a Compliance Policy for Dedicated Devices

Navigation: Devices › Android › Compliance

A compliance policy isn’t strictly required for Dedicated Devices. Since these devices don’t depend on user-based Conditional Access by default, you could technically run them without one.

That said, it’s still a good practice to create it.

Compliance gives you visibility into device health, OS versions, encryption status, and overall security posture across your kiosk fleet. It also keeps your options open. If you later decide to introduce Conditional Access or stricter enforcement, the groundwork is already there.

Go to Devices › Android › Compliance and click + Create policy.

In the Create policy pane, configure the following:

  • Platform: Android Enterprise
  • Profile type: Fully managed, dedicated, and corporate-owned work profile

Give the policy a clear and consistent name, for example:

Dedicated Devices Compliance

Keeping compliance separate from configuration policies makes reporting and troubleshooting much easier later on, especially as your environment grows.

Compliance Settings

This section defines the security requirements the device must satisfy. These settings are evaluated continuously, and any violation marks the device as non-compliant.

SettingConfigured ValueRationale
Rooted devicesBlockA rooted device is considered compromised. If any kiosk device is rooted, it should immediately be marked as non-compliant.
Device Threat LevelNot configuredMicrosoft Defender for Endpoint integration is not enforced in this configuration. This can be enabled in higher-security environments.
Minimum OS versionNot configuredNo minimum OS baseline is enforced in this deployment. This can be defined later if version standardization becomes necessary.
Require encryption of data storageRequireEnsures storage encryption is enforced. Although modern Android devices encrypt by default, explicitly requiring it guarantees compliance visibility.

Actions for Noncompliance

Set the default action to Mark device noncompliant: Immediately. The moment a device violates any compliance setting, it is flagged in the Intune console. For dedicated devices, you may also add a Retire action after a prolonged period of noncompliance, depending on your security requirements.

Assign the Compliance Policy

Assign this compliance policy to All devices, and apply the same Dedicated Devices assignment filter. This keeps the policy scoped only to your kiosk devices and avoids impacting other Android enrollments.

Included groupAll Devices
Filter behaviorInclude filtered devices
Filter ruledevice.enrollmentProfileName -eq “Dedicated Devices”

Step 7: Deploy the Kiosk Application

Navigation: Apps › Android

The Intune configuration side is now complete. But a kiosk policy is only as good as the app it pins the device to. In this scenario, a company website is deployed as a kiosk app a common use case for customer-facing or internal information display devices.

Navigate to Apps › Android and click + Create. In the Select app type flyout, select Managed Google Play app and click Select. This opens the embedded Managed Google Play console inside Intune.

Inside the Managed Google Play console, navigate to Web apps in the left sidebar. This section lets you package any website as if it were a native Android app creating a managed shortcut that launches in a dedicated Chrome instance. Click the + button in the bottom right corner to create a new web app.

Web App Configuration

SettingConfigured ValueRationale
TitleCompany Web SiteThis appears in the Intune app list and on the device.
URLFull target URLThe website the kiosk should display a company dashboard, product catalog, self-service portal, etc.
Display modeFull screenCritical for a kiosk experience. Launches the web app without any browser UI. The user sees only the website no address bar, no navigation buttons, no way to type a different URL.
Icon512px square PNG or JPEGBranding with your company logo keeps things professional and identifiable in the Intune console.

Click Create. The web app is published in your Managed Google Play catalog and syncs back to Intune within a few minutes.

Assign the App to Dedicated Devices

Once the web app syncs to Intune, open its Properties, navigate to Assignments, and click Edit. Under the Required section, click + Add all devices. Then apply the Dedicated Devices Assignment Filter.

It is important to use Required assignment rather than Available. In a dedicated device context, there is no user to open a Company Portal and choose to install an app. Available deployment is functionally equivalent to not deploying the app at all in Single App Kiosk mode, Company Portal is inaccessible anyway. Required is the only deployment intent that is meaningful in a userless context.

DEVICE ENROLLMENT EXPERIENCE

With the policies and app deployment in place, the next step is enrolling the device using the QR code generated from the Dedicated Devices enrollment profile.

Below is the full enrollment flow as it appears on the device from the initial setup screen to a fully locked kiosk configuration.

Important: The device must be factory reset. QR code enrollment for Dedicated Devices is only available during the initial Android setup. If the device has already been set up, reset it before starting the process.

The On-Device Enrollment Experience

Stage 1: Getting the Tablet Ready

After scanning the QR code during the Android setup wizard (tap the screen seven times to open the QR scanner), the device starts the managed provisioning process.

The screen shows “Getting your tablet ready…” while Android Device Policy installs in the background. During this stage, the device is being set to Device Owner mode, which enables full corporate management.

Once provisioning completes, the device is fully managed and ready to receive policies and required apps from Intune.

Stage 2: Corporate Ownership Declaration

The device displays a message stating that it belongs to your organization. This is Android’s standard corporate ownership screen, informing anyone handling the device that it is managed by an organization.

Tap Next to continue the setup process.

Stage 3: Management Disclosure and Consent

The Set up your screen discloses exactly what the admin can monitor and manage: settings, corporate access, apps, permissions, theft-protection features, network activity, and device location. It also identifies Android Device Policy as the application responsible for managing the device. On Samsung devices, a reference to the Samsung Knox Privacy Policy also appears, as Knox layer management is active. The person performing the enrollment accepts the Google agreement and taps Continue.

Stage 4: Setting Up Your Device

The provisioning engine continues setting up the device. During this phase, Intune is establishing the management channel, downloading policies, and beginning the app deployment queue.

Stage 5: Privacy Disclosure

Android Enterprise requires an explicit privacy disclosure before enrollment completes on corporate-owned devices. The screen This Galaxy Tab A9+ isn’t private clearly states that the IT admin may be able to see data and activity on this device, and that the IT admin can set permissions for apps on this device. For a dedicated device without a personal user, this screen is largely procedural but it is a required part of the Android Enterprise enrollment flow.

Stage 6: Updating Device Policy

The “Updating device…” screen appears as Android Device Policy downloads and applies the latest policies from Intune. This is where device restrictions, kiosk mode settings, and compliance requirements begin to take effect on the device. Depending on network speed and policy complexity, this stage can take one to five minutes.

Stage 7: Install Work Apps

This screen confirms that everything is wired up correctly. The device displays the list of apps queued for installation, divided by assignment type:

Required apps (2)Microsoft Intune, Company Web Site assigned as Required with the Dedicated Devices filter.
Additional apps (2)Intune Company Portal, Google Chrome supporting apps that are part of the broader managed environment.

The presence of Company Web Site in the Required apps list confirms that the Managed Google Play web app, the kiosk Device experience configuration, and the Required app assignment are working as intended. The device begins downloading and installing these apps automatically.

Stage 8: Registering the Device

After apps are queued for installation, the device registers with the Intune service. The “Registering device…” screen indicates the device is completing its MDM registration creating the device record in Intune with its hardware identifiers, enrollment profile association, and initial compliance state.

Stage 9: Google Services Configuration

The Google services configuration screen appears. For dedicated devices, these settings are typically pre-configured by policy, but the enrollment wizard may still present this screen depending on the device manufacturer and Android version. In a kiosk deployment, location services are left enabled if the device is used for asset tracking, or disabled if privacy is the priority.

Stage 10: Admin Policy Applied / Kiosk App Launches

The enrollment is complete. The device now displays the company logo as the kiosk app launches for the first time. Note the system notification: Based on the admin policy set for your tablet, the following agreement has been withdrawn: Sending of Diagnostic Data.

This is the device restrictions policy taking effect in real time the admin policy has automatically revoked the diagnostic data sharing agreement that was set during the Google services step. This is the kind of automatic policy enforcement that makes Android Enterprise powerful: the administrator’s intent is enforced without any user action required.

Stage 11: Kiosk App Running / End State

The device is now fully enrolled and in kiosk mode. The Company Web Site app is running full screen. The following behaviors confirm that device restrictions are enforced at the Device Owner level:

No status barBlocked by device restriction. No Wi-Fi indicator, no notifications, no quick settings access.
No navigation barThe back button, home button, and recents button are suppressed in kiosk mode.
Full screen web experienceThe Managed Google Play web app with Full screen display mode renders the website without any browser chrome.
No way outThe end user cannot navigate away, open another app, or access device settings. The device is completely locked to this single application.

Verifying Enrollment in Intune

Navigation: Devices › Android › Android devices

In the Intune admin center, the freshly enrolled tablet appears in the device list with the following attributes:

Device nameTAB61JT automatically generated by the TAB{{SERIALAST4DIGITS}} template. Last 4 digits of the serial number.
Managed byIntune confirms Android Enterprise Device Owner management, not legacy Device Admin.
OwnershipCorporate set automatically by the Corporate-owned dedicated devices enrollment profile.
ComplianceCompliant the Dedicated Devices Compliance policy has been evaluated and all conditions are met.
OSAndroid (dedicated) the OS type confirms kiosk/dedicated enrollment, distinguishing it from BYOD, COPE, and COBO entries in the same list.
Primary user UPNNone the defining characteristic of Dedicated Device enrollment. No user identity, no user affinity. This device is managed at the device level only.

This is the confirmation that everything worked exactly as designed. A compliant, corporate-owned, Intune-managed dedicated device with no user running a single locked application, ready to deploy in a production environment.

Intune Configuration Summary

At this stage, the Intune-side configuration for Dedicated Device (Kiosk) deployment is complete.

OrderComponentLocationAssignment
1Enrollment ProfileDevices › Android › EnrollmentQR code based
2Device Configuration ProfileDevices › Android › ConfigurationAll Devices with filter
3Compliance PolicyDevices › Android › ComplianceAll Devices with filter
4Kiosk ApplicationApps › AndroidAll Devices with filter (Required)

Android Enterprise Management Modes Quick Comparison

FeatureBYODCOPECOBODedicated
User identityRequiredRequiredRequiredNot required
Personal spaceYesYesNoNo
Kiosk modeNoNoNoYes
App deploymentWork profile onlyWork + PersonalFull deviceFull device
Primary userEmployeeEmployeeEmployeeNone (device-based)
Best forPersonal phonesCompany phones + personal useCorporate-only phonesTask devices, kiosks, shared tablets

Wrapping Up the Series

Dedicated Device is simply the most locked-down model in Android Enterprise.

Throughout this series, we looked at different enrollment types and where they make sense. BYOD works when users bring their own phones. COPE fits when you want corporate ownership but still allow some personal use. COBO removes that personal layer. Dedicated Device removes the user entirely.

There’s no perfect model. It always depends on the scenario. A warehouse tablet doesn’t need the same setup as a sales manager’s phone. A shared kiosk doesn’t need user sign-in. Once you understand that, choosing the right model becomes straightforward.

The good thing is that all of these options live inside the same Intune framework. The same Managed Google Play connection, the same policy engine, the same assignment logic. Once you get comfortable with that structure, moving between models isn’t complicated.

If you’ve gone through the whole series, you now know how each enrollment type behaves in practice not just in theory. And that’s usually what makes the difference when you’re deploying in a real environment.

References

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *