I’ve written this small guide to help and maybe improve the security process in preparation of Android devices.
Common tablets and smartphones are widely used in a Company and Professional environment, so it’s good that the IT Department enforce the security of these devices before deploying them to the employees.
This small guide will help Sys Admins, working like a checklist to the most common security enforcing operations. The scenario analyzed is the setup of a secure tablet for an employee that have to keep this device with him in a job travel.
Please, contact me to signal eventual errors or to give me advices to improve this guide.