This guidance is for organisations deploying or redeploying mobile devices onto their networks. It describes the ways in which individual platforms can be restored from a misconfigured or potentially compromised state to a known-good state, using each platform's native functionality.
For each platform, the most useful restore methods are explained in full, alongside the risks of using them. We then recommend one of the methods to use for the following four common scenarios:
- Scenario 1: Sanitising a device believed to be compromised with malware
- Scenario 2: Preparing a device which has not previously been managed
- Scenario 3: Reissuing a device to a different user in the same security environment
- Scenario 4: Sanitising a device for release to lower security domain or sale