Set up unmanaged (BYOD) devices

Diagram with Set Up Unmanaged Devices highlighted.

Every device, whether managed or unmanaged, is a possible attack avenue into your network. Fortunately, there are steps that everyone can take to protect their devices. In this critical mission, train everyone to protect unmanaged devices (also referred to as bring-your-own devices, or BYODs). It's important to help everyone get their devices protected as soon as possible.

Note

This article applies primarily to unmanaged (or BYOD) devices. Guidance for protecting managed devices is available here: Set up and secure managed devices.

Learn more about managed and unmanaged devices.

Your objectives are to:

Once you've achieved these objectives, proceed to Use email securely.