Category filter
Hexnode Planning & Deployment Guide
The trajectory of modern IT requires a unified solution to manage heterogeneous devices across different geolocations. Hexnode UEM bridges the gap between modern and legacy management, offering a central workplace to secure assets, enforce compliance, and manage apps. This guide serves as your detailed mdm planning and deployment checklist.
What are the key capabilities of Hexnode UEM?
Hexnode provides a robust feature set designed to manage the entire device lifecycle. Key capabilities include:
- Device Enrollment: No-touch, out-of-the-box bulk enrollment for rapid deployment.
- Security & Compliance: Establish device trust, enforce security policies, and automate compliance monitoring.
- Management:
- App Management: Deploy Store, Private, and Enterprise apps.
- Content Management: Securely distribute corporate files.
- Kiosk Lockdown: Restrict devices to specific apps or websites (supports almost every platform).
- Expense Management: Monitor data usage to control costs.
- Maintenance: Remote OS updates, Patch & Update management, and Incident management.
- Remote Actions: Execute one-time commands like Remote Wipe, Lock, or Location Scan.
Why is a strategic UEM deployment plan necessary?
Before deployment, you must identify your objectives and deployment model.
1. Identify Strategic Objectives
- IT Delegation: Delegate workloads by creating “Technician” roles with limited access, allowing specific staff to manage subsets of devices.
- Secure Access: Secure work resources on any network (zero-trust approach) to mitigate threats from remote work.
- Data Privacy: Use features like Managed Domains and Business Containers to segregate corporate data from personal user data.
- Minimal Disruption: Use restriction profiles to limit distractions (e.g., blocking non-work apps) and maximize employee productivity.
2. Define Deployment Scenarios
Hexnode supports various ownership models. Decide which fits your workforce:
- Work-Only: Dedicated devices locked down for specific tasks.
- BYOD (Bring Your Own Device): Personal devices used for work; managed via a Work Profile to ensure privacy.
- COPE (Corporate-Owned, Personally Enabled): Corporate devices that allow personal use.
- WP-C (Work Profile on Company Owned): Strict separation of data on company hardware.
3. Select the Right License
Hexnode follows a pay-as-you-grow pricing philosophy.
- Editions: Features are tiered; you only pay for the capabilities you need.
- Trial: A 14-day free trial allows you to enroll up to 100 devices to test features before subscribing.
Which platforms and versions does Hexnode support?
Verify your inventory against Hexnode’s supported platforms.
| Platform | Supported Version |
|---|---|
| Android / Android Enterprise | Version 5.0 and later |
| iOS / iPadOS | Version 11.0 and later for iOS Version 13.0 and later for iPadOS |
| macOS | Version 10.7 and later |
| tvOS | Version 6.0 and later |
| Windows | Windows 10 or later |
| Fire OS | Version 4.5.5.3 and later |
| visionOS | Version 1.1 and later |
| Linux | Fedora 36+, Ubuntu 18.04+, Debian 10+ |
| ChromeOS |
What is the step-by-step UEM planning and deployment checklist?
Follow this step-by-step UEM planning and deployment checklist for a successful rollout.
| Phase | Action Item | Details |
|---|---|---|
| Setup | Configure Portal |
|
| Integration | Sync Directories |
|
| Policy | Create Policies |
Draft policies for Passcodes, Wi-Fi, VPN, and Kiosk modes.
Pro Tip: Use Hexnode’s multi-platform policy workflow to target devices irrespective of OS. |
| Testing | Deploy Pilot Groups |
|
| Migration | Disenrollment |
|
| Execution | Enroll Devices |
|
| Validation | Audit & Validation |
|
Refer to this help documentation on getting started with Hexnode SaaS UEM to learn more.
How should admins communicate the change to users?
- Educate Users: Communicate with the benefits of UEM. Explain how it separates their personal data from corporate data to reduce privacy concerns.
- One-Time Actions: Familiarize yourself with emergency commands like Corporate Wipe (removes only work data) and Complete Wipe (factory reset) for lost devices.
- Compliance Monitoring: Set up automated alerts to notify IT admins immediately if a device falls out of compliance (e.g., jailbroken, missing encryption).