The Android Filter app provides real-time filtering that seamlessly integrates with Smoothwall Cloud Filter, ensuring your policies are consistently applied.
This guide outlines the steps to install the Android Filter app on devices in Shared Device Mode.
Alternatively, see how to install the Android Filter app on single-user devices.
Before you begin
- Ensure you have managed Android devices.
- Your devices must meet the Android Filter app's minimum device requirements.
- You must have access to your organisation’s Microsoft Entra account at a minimum as an Application Developer.
Step 1: Create an enrolment policy
- Sign in to the Microsoft Intune Admin Center.
- Go to Devices > Android > Device onboarding > Enrolment.
- Select Corporate-owned dedicated devices.
- Select Create policy to create a profile with the Token type set to Corporate-owned dedicated device with Microsoft Entra shared mode.
(Optional) Step 2: Create Groups
You can use any Intune Groups for app configuration and deployment. Dynamic Groups automatically add devices to the Group upon enrolment, removing the need to add devices manually.
Add Dynamic Groups, with the Property set to the name of the enrolment policy created in Step 1.
Step 3: Set the device mode
- Go to Devices > Android devices > Configuration.
- Select Create to create a new profile.
- For Platform, select Android Enterprise.
- For Profile type, select Templates > Device restrictions.
- In Configuration settings > Device experience:
- For Device experience type, select Kiosk mode (dedicated and fully managed).
- For Kiosk mode, select Multi-app.
- (optional) To add the Android Filter app to the device’s home screen:
- Select Add.
- Search for and select Qoria Filter.
- Select to add the app to the home screen.
- In the Dedicated devices section, change the MHS sign-in screen toggle from Not configured to Enabled.
- In the Assignments step, select Add groups and select the Group set up in Step 2.
- Review the settings before selecting Create.
Step 4: Deploy the Android Filter app deployment rules
- Go to Devices > Android Apps.
- Assign these apps to the Group you set up in Step 2:
- Managed Home Screen: Allows the Android Filter app to run.
- Microsoft Authenticator: Enables the Android Filter app to query the Entra user and retrieve credentials for authentication.
- Qoria Filter: Filters the traffic from the installed browser.
- Any browser that will be used.
Step 5: Create the application registration
- Sign in to the Microsoft Entra Admin Center.
- Create an application registration with Qoria Filter as the Name.
- Copy the Application (client) ID from the Overview page.
-
Add a redirect URI:
- For Configure platforms, select Android.
- For Package name, enter com.qoria.uc.android.edu
- For Signature hash, enter DerKHNf9otWK42NDRZp3lshQ5sQ=
Step 6: Create the App Configuration Policy
- Sign in to the Microsoft Intune Admin Center.
- Go to Apps > App configuration policies.
- Select Add > Managed Devices.
- In the Basics step:
- Add a name, such as Filter Configuration Profile.
- For Platform, select Android Enterprise.
- For Profile Type, select Fully Managed, Dedicated and Corporate-Owned Work Profile Only.
- For Targeted app, select the Qoria Filter app.
- In the Settings step:
- For Configuration settings format, select Use configuration designer.
- For Tenant ID:
- If you have a multi-tenant setup and don’t want to use the Default Tenant, select the checkbox. Select string and enter the Tenant ID.
- If you don’t have a multi-tenant setup, or you want to use the Default Tenant, don’t select the checkbox.
- Select the checkbox for Hardware Id. Select your identifier from one of two types:
- Select string as the value type. Enter an identifier to be used in reporting, such as your device’s serial number.
- Choose variable as the value type and select ‘Intune Device ID’ from the dropdown menu.
- Select the checkbox for Serial Id, select string and add the serial number.
- Select the checkbox for Microsoft Entra Application (client) Id, and enter the Application (client) ID from Step 5.
- In the Assignments step, select Add groups and select the Group set up in Step 2.
- Review the settings before selecting Create.
Step 7: Add the Android Filter app
- Go to Apps > Android.
- Select Add.
- Under App Type, select Managed Google Play App from the dropdown.
-
Search for and select Qoria Filter.
Tip
If you can’t see the app, search for com.qoria.uc.android.edu instead.
- Select Sync in the App pane to sync with the Managed Google Play service.
- Go to Apps > Android, select the Qoria Android Filter app from the list.
- Go to Properties > Edit.
- Select Add groups and select the Group set up in Step 2.
- Review the settings before selecting Create.
Step 8: Create the Device Configuration Policies
Create an Always-on VPN Policy
- Go to Devices > Android devices > Configuration.
- Select Create > New Policy.
- For Platform, select Android Enterprise.
- For Profile type, select Device Restrictions.
- In the Basics step, add a name, such as Android Always On VPN Filter.
- In the Configuration settings step, select the Connectivity dropdown.
- For Always-on VPN (work profile-level), select Enable.
- For VPN Client, select Custom.
- For Package ID, enter com.qoria.uc.android.edu
- In the Assignments step, select Add groups and select the Group set up in Step 2.
- Review the settings before selecting Create.
Upload the Trusted Certificate
- Go to Devices > Android devices > Configuration.
- Select Create > New Policy.
- For Platform, select Android Enterprise.
- For Profile type, select Trusted certificate.
- In the Basics step, add a name, such as Android Filter Certificate.
- In the Configuration settings step:
- Download the qoria_pub_cert.cer file.
- Return to your Microsoft Intune Admin Center.
- For Certificate file, select the qoria_pub_cert.cer file.
- In the Assignments step, select Add groups and select the Group set up in Step 2.
- Review the settings before selecting Create.
Next steps
Check the installation is working as expected:
- Check that your Web Filter policies apply correctly.
- Open the app and confirm it says ‘This device is being protected’.
- Check the last Secret Knock and the Directory Groups or Group Mappings to which the user belongs using the Diagnostics page.