For MSPs, mobile device management (MDM) is crucial for securing and managing the growing number of employee-owned and remote devices accessing company data. With BYOD and remote work becoming standard practice, ensuring secure access to workplace information across various devices and operating systems is vital.
MDM software enables MSPs to scale operations, control device functionality, and mitigate security risks associated with personal devices connecting to company networks, protecting both the MSP's and their clients' sensitive data, including emails and documents. Endpoint Central MSP's unified MDM module offers MSPs tools to onboard, track, configure, harden, and patch mobile devices remotely, optimizing mobile security and management.

Device enrollment
To manage devices using MDM, the initial step is device enrollment. This process involves two key actions: onboarding devices to the MDM server and then assigning users to these devices. The first step is essential for managing the devices, while the second allows for applying personalized settings and policies to each user's device.

Workspace management
When personal or BYOD devices are added to a corporate network, a separate work space called a work profile is created. This space keeps personal and work apps segregated. MSPs will have full control over the work profile but cannot access or control the device's personal area.
Full device management
This is typically used for corporate-owned devices that are deployed for employees who use them in a limited, kiosk-like manner and only for work purposes. When enrolling these devices, administrators can have full control over their settings and data.
MDM supports various enrollment methods to accommodate the diverse needs of your clients:
-
Over-the-air (OTA) enrollment
-
Manual enrollment for management
-
Bulk enrollment using a CSV file
-
Authenticated enrollment with an OTP or AD credential
Advanced security with remote commands
Endpoint Central MSP can be used to remotely secure data in mobile devices even if the device becomes lost or missing. The following operations can be done using the security commands in MDM:
- Remote lock
Prevent misuse of misplaced or lost devices.
- Complete wipe
Prevent data loss or theft by erasing all the device data.
- Corporate or selective wipe
Remove only the corporate data, leaving personal data, like contacts and photos, intact. This is useful for BYOD environments.
- Remote alarm
Trigger an alarm on the mobile device if it is lost or stolen. The alarm will sound even if the device is in silent mode and will stop ringing only when the device is unlocked.
- Geofencing
Create virtual boundaries around specific geographic areas, such as company premises. This enables administrators to restrict the use of corporate devices to these authorized locations.
- Geotracking
Keep tabs on the whereabouts of company-issued devices.

Mobile application distribution
For today's increasingly mobile-first workforce, corporate apps are central to business operations, making it crucial for MSPs to ensure their clients' employees have the right apps that are always updated. Our MDM module empowers IT administrators with complete control over app life cycles—from OTA installation and updates to deletion and license management—for both public and enterprise apps.
Automating app updates on all groups and devices
Keeping the apps up to date can be a tedious task. The administrator must ensure that the available updates are compliant with policies and that all the critical updates are completed. Managing apps not only involves distributing the apps to devices, it also includes ensuring they remain up to date with all the required updates installed. The MDM server contacts the public store every day to check if new updates for apps have been released. If a new update is available, it will be notified on the MDM server as well.
Kiosk mode management
For scenarios where devices need to serve a specific purpose, such as public kiosks or shared workstations, Endpoint Central MSP offers a robust kiosk mode. This feature locks down the device to a predefined set of apps or functionalities, preventing unauthorized access while maintaining a controlled user experience.
With kiosk mode, turn your clients' smartphones, tablets, laptops, desktops, and TVs into secure, single-purpose devices. It is a valuable tool for any MSP looking to enhance security and manage public-facing endpoints.
Automate device lockdown
For conducting time-bound assessments and surveys or gathering information on demand, put an app in the foreground. This allows the kiosk to lock itself down into single-app mode on its own for a specific duration, and the launched autonomous app will exit kiosk mode once the purpose is served.
Secure browsing
Define regulated access to a handful of websites by allowing only enterprise-approved websites.
Secure devices
Push digital certificates for authenticating connections to enterprise Wi-Fi, VPN, and more. Create and apply virtual location boundaries and receive alerts when a device enters or exits a geofence.
Automate app installation and updates
Ensure seamless kiosk profile association with the automatic installation of apps provisioned in kiosk mode.
Centralized content management
Distribute content for your clients in various file formats, automate updates, enforce access controls, and protect against data breaches—all while managing content in BYOD environments and securing downloads.
Content distribution
For employees to be productive on their mobile devices, it is essential that they have access to all the necessary resources, like important documents and files. Endpoint Central MSP makes content distribution simple by allowing documents and media to be distributed in bulk, all in a few simple steps.
Certificate management
While passwords are commonly used for security and authentication purposes, many clients now prefer using digitally signed certificates to authenticate users before accessing Exchange Server, Wi-Fi, VPN, etc. This reduces the chances of forgotten passwords and numerous password resets.
There are two types of certificates that are commonly used:
- Trust certificates
A single trust certificate is used by admins to authenticate all users in their organization. The certificate must be present on the device for the user to be able to authenticate it. This can be done by distributing the certificate using Endpoint Central MSP.
- User-specific certificates
Certificate authorities (CAs) are responsible for issuing certificates to organizations and creating certificates for each user. When integrated with Endpoint Central MSP, the CA creates and distributes these certificates.

Telecom expense management
Monitoring data usage is an important factor in telecom expense management. Yet manual tracking is challenging due to numerous devices and background processes. The Telecom Expense Management policy in Endpoint Central MSP helps track data usage, alerts admins and users about excessive usage, and generates reports for better resource management.
Conditional access
Employees tend to access corporate resources from various locations on multiple devices. Manually authenticating users and devices across multiple locations and platforms is a time-consuming and error-prone task for IT administrators. MDM simplifies this by automating user and device verification and enforcing conditional access, ensuring only authorized, compliant users can access resources.
Master streamlined client management workflow. Learn more on Account Management.
"Endpoint central MSP is like a Swiss army knife. Can't live without it. All [my] tools are integrated in one central management plane."
Shawn G,
Systems administrator.