The Android Filter app provides real-time filtering that seamlessly integrates with Smoothwall Cloud Filter, ensuring your policies are consistently applied.
This guide outlines the steps to install the Android Filter app on devices used by a single user with the Microsoft Intune Admin Center.
Alternatively, see how to install the Android Filter app on devices in Shared Device Mode (SDM).
Before you begin
- Ensure you have managed Android devices.
- Your devices must meet the Android Filter app's minimum device requirements.
Step 1: Add the Android Filter app
- Go to Apps > Android.
- Select Add.
- Under App Type, select Managed Google Play App from the dropdown.
- Search for and select Qoria Filter.
Tip
If you can’t see the app, search for com.qoria.uc.android.edu instead.
- Select Sync in the App pane to sync with the Managed Google Play service.
- Go to Apps > Android, select the Qoria Android Filter app from the list.
- Go to Properties > Edit.
- Select Add group, select the User Group’s checkbox, then choose Select.
- Review the settings before selecting Create.
Step 2: Create the App Configuration Policy
- Go to Apps > App configuration policies.
- Select Add > Managed Devices.
- In the Basics step:
- Add a name, such as Filter Configuration Policy.
- For Platform, select Android Enterprise.
- For Profile Type, select Fully Managed, Dedicated and Corporate-Owned Work Profile Only.
- For Targeted app, select Qoria Filter.
- In the Settings step:
- For Configuration settings format, select Use configuration designer.
- Select the checkbox for Serial Id, select string and add the serial number.
- For the Tenant ID checkbox:
- If you have a multi-tenant setup and don’t want to use the Default Tenant, select the checkbox. Select string and enter the Tenant ID.
- If you don’t have a multi-tenant setup, or you want to use the Default Tenant, don’t select the checkbox.
- Select the checkbox for User Id:
- If you have domain-joined devices, select variable as the value type and select the username variable.
- If you have devices that are not domain-joined, set the device to a single user. Select string as the value type and enter the specific username or email address of a valid user synced to Cloud Filter.
- Select the checkbox for Hardware Id. Select your identifier from one of two types:
- Select string as the value type. Enter an identifier to be used in reporting, such as your device’s serial number.
- Choose variable as the value type and select ‘Intune Device ID’ from the dropdown menu.
- In the Assignments step, select Add groups, then select the checkbox for the User Group.
- Review the settings before selecting Create.
Step 3: Create the Device Configuration Policies
Create an Always-on VPN Policy
- Go to Devices > Android devices > Configuration.
- Select Create > New Policy.
- For Platform, select Android Enterprise.
- For Profile type, select Device Restrictions.
- In the Basics step, add a name, such as Android Always On VPN Filter.
- In the Configuration settings step, select the Connectivity dropdown.
- For Always-on VPN (work profile-level), select Enable.
- For VPN Client, select Custom.
- For Package ID, enter com.qoria.uc.android.edu
- In the Assignments step, select Add groups, then select the checkbox for the User Group.
- Review the settings before selecting Create.
Upload the Trusted Certificate
- Go to Devices > Android devices > Configuration.
- Select Create > New Policy.
- For Platform, select Android Enterprise
- For Profile type, select Trusted certificate.
- In the Basics step, add a name, such as Android Filter Certificate.
- In the Configuration settings step:
- Download the qoria_pub_cert.cer file.
- Return to your Microsoft Intune Admin Center.
- For Certificate file, select the qoria_pub_cert.cer file.
- In the Assignments step, select Add groups, then select the checkbox for the User Group.
- Review the settings before selecting Create.
Next steps
Check the installation is working as expected:
- Check that your Web Filter policies apply correctly.
- Open the app and confirm it says ‘This device is being protected’.
- Check the last Secret Knock and the Directory Groups or Group Mappings to which the user belongs using the Diagnostics page.