Google Factory reset protection is a feature that is enabled by default on your phone or tablet running Android version 5.1 or above to prevent others from using it if it gets reset to factory settings without your permission. If an unauthorized person tries to reset the device, the device would still require log-in using the previously configured Google username and password. This means that if your device is lost or stolen, another person would not be able to reset it and use it.
However, this feature, despite being very useful, can cause some serious problems and put people in a situation in which they need to bypass Google account verification, so they can use the phone. Once enabled, FRP only allows a user with a Google account password to factory reset and activate the device. With enterprises, this is very inconvenient since company provided devices lock into an employee’s Google account. If the employee were to leave the company, then the device becomes unusable as a company asset. With Hexnode MDM, you can add a G Suite email id and google+ profile ID to log in to your devices to bypass FRP in situations where you forget/don’t know the previously configured google account credentials.
What is Factory Reset Protection?
Data protection, or Factory Reset Protection (FRP), is a security feature on Android devices with Lollipop 5.1 and higher. Once FRP is activated, it prevents use of a device after a factory data reset, until you log in using a Google username and password previously set up on the device. When you perform a Factory Data Reset, all settings are returned to the factory default settings. All data is erased, including files and downloaded apps. If you have a Google Account set up on the device, FRP is active. This means that after the reset, you’ll be required to log in to the Google Account using the username and password. If you have multiple Google Accounts set up on the device, you can log in using any of the accounts.
Enable Google Factory Reset Protection using Hexnode MDM
To enable FRP,
- Login to your Hexnode portal.
- Navigate to Policies.
- Select an existing policy or create a new one by clicking on New Policy.
- From Android, select Advanced Restrictions and click on Configure.
- Go to Factory Reset Protection (Google Account Verification).
- There are three options in the drop-down list:
- Default: If this option is selected, the default settings on the device will work.
- Enable Factory Reset Protection: Select this option to enable Factory Reset Protection.
- Disable Factory Reset Protection: You can disable Factory Reset Protection by selecting this option. When this option is selected, user can skip the Google account verification step during the set-up process.
Choose Enable Factory Reset Protection.
- Add a G-suite account and Google+ profile id to sign in to your devices in situations where you forget/don’t know the previously configured google account credentials.
How to find your Google Account ID?
Google Account ID refers to the 21-digit ID of your Google Account.
Here is how you can find it!
- Click on this link.
- Under Request parameters, enter people/me under resourceName and metadata under personFields.
- Click on Execute.
- Login using your Google account.
The 21-digit ID corresponding to id under application/json is your Google Account ID.
How to associate the policy to a device?
If the policy is not saved
- Go to policy targets > Click on Add devices.
- Select the device to which the policy is to be associated > Click OK.
- Save the policy.
If the policy is already saved
- Check the required policy from policies tab.
- Click on Manage > Associate targets.
- Select the device > Associate.
To securely bypass Factory Reset Protection using Hexnode MDM
If you forget or don’t know the credentials of the google account configured on the device before reset, Hexnode provides you options to securely bypass the account verification step during the initial set up process. Use the credentials of the G Suite account or Google plus profile id added on the policy you have configured to bypass FRP.