Quick Reference
MDM (Mobile Device Management) manages and secures entire mobile devices — enforce encryption, require PINs, remote wipe, push apps. MAM (Mobile Application Management) manages only specific corporate apps, not the whole device — better for BYOD. BYOD = employee-owned devices on corporate network. COPE = corporate-owned, personal use enabled. CYOD = choose your own device from approved list. Key MDM capabilities: remote wipe, geofencing, screen lock enforcement, certificate deployment, app whitelisting/blacklisting.

The Mobile Security Challenge

Mobile devices present a unique security challenge: they leave the office, connect to untrusted networks, can be lost or stolen, and may be used for both work and personal purposes. Without MDM, each employee's phone is an unmanaged endpoint that can access corporate email, cloud storage, and internal systems with no visibility or control from IT. A lost phone without full-disk encryption and a PIN exposes all its data to whoever finds it. MDM closes this gap by giving IT centralised management and security enforcement over mobile devices, regardless of where those devices are located.

MDM vs MAM — The Key Distinction

MDM (Mobile Device Management) manages the entire device. An MDM solution enrolls the device, installs a management profile, and then IT can: enforce screen lock PINs and biometrics, require full-device encryption, remotely wipe all data if the device is lost, push and remove apps, restrict camera or screenshot capabilities, configure WiFi and VPN profiles automatically, and track device location. MDM gives IT full control — but that full control extends to personal data on personal devices, which creates privacy concerns and employee resistance.

MAM (Mobile Application Management) manages specific corporate apps rather than the entire device. A MAM solution creates a managed container around corporate apps — the corporate email client, document editor, and VPN client are managed and secured, while personal apps are completely untouched by IT. Corporate data within managed apps can be encrypted and remotely wiped; personal photos and messages are never accessible to IT. MAM is the preferred approach for BYOD scenarios because it respects employee privacy while still protecting corporate data.

Many modern solutions are described as EMM (Enterprise Mobility Management) or UEM (Unified Endpoint Management) — these terms describe platforms that handle both MDM and MAM capabilities alongside laptop and desktop management in a single console. On the exam, MDM vs MAM is the key distinction to understand — match the solution to the ownership model and privacy requirements of the scenario.

Device Ownership Models

ModelWho Owns DevicePersonal UseIT Control LevelBest Management Approach
BYODEmployeeYes — primary useLow — privacy concernsMAM — manage apps, not device
COPECorporateYes — allowedHigh — company owns deviceMDM with personal space separation
CYODCorporateLimitedHighMDM — full device management
COBOCorporateNo — work onlyFull — locked downMDM — maximum restrictions

Key MDM Capabilities for the Exam

Remote wipe: Erase all data on a lost or stolen device remotely. Full device wipe removes everything; selective wipe removes only corporate data while preserving personal content (MAM capability). Remote wipe is the primary data protection control for mobile devices — the exam frequently asks "what should an administrator do when an employee reports their company phone lost?" → initiate a remote wipe.

Screen lock and PIN enforcement: MDM can require a PIN, password, or biometric to unlock the device and set maximum inactivity timeout. A device without a screen lock is an open door to corporate data if lost. MDM policies can require minimum PIN complexity (6-digit minimum, no simple patterns) and maximum attempts before wipe.

Encryption enforcement: MDM verifies that full-disk encryption is enabled and can block device enrollment if it's not. Modern Android and iOS devices enable encryption automatically when a screen lock is set, but MDM provides verification and compliance reporting.

Geofencing: Location-based policies that trigger actions when a device enters or leaves a defined geographic boundary. A device that leaves the country might automatically have corporate app access revoked. A device on the corporate campus might automatically connect to the internal WiFi profile. Geofencing requires location services to be enabled on the device.

App management: MDM can push required apps automatically to enrolled devices, remove apps when a device is unenrolled or an employee leaves, and maintain whitelists (only approved apps allowed) or blacklists (specific apps prohibited). Enterprise app stores allow distributing custom internal apps that aren't in public app stores.

Certificate deployment: MDM can automatically deploy authentication certificates to devices for WiFi (WPA2-Enterprise), VPN, and email (S/MIME). Users don't need to manually install certificates — they're pushed silently during enrollment.

Mobile Device Security Best Practices

OS and app updates: Mobile OS updates frequently patch security vulnerabilities. MDM can report which devices are running outdated OS versions and can block network access for devices below a minimum version threshold. This compliance checking is a key MDM value proposition beyond just device configuration.

Jailbreaking and rooting detection: Jailbroken iOS devices and rooted Android devices have bypassed security controls and can run unapproved software. MDM platforms detect jailbroken/rooted devices and can automatically quarantine them — blocking corporate email and VPN access until the device is restored to a compliant state.

Containerisation: Rather than managing the entire device, containerisation creates an encrypted, isolated partition for corporate data and apps. Corporate content cannot be copied out of the container (no copy-paste to personal apps, no screenshots in corporate apps). This is MAM in practice — the container is managed by IT, everything outside it is untouched.

Mobile Device Security — Beyond MDM

MDM is the management layer, but mobile device security includes several additional concepts tested on A+ and Security+. Sideloading — installing apps from sources other than the official app store (Google Play, Apple App Store) — bypasses the store's security review process and significantly increases malware risk. MDM policies can disable sideloading on enrolled devices. Carrier unlocking vs jailbreaking/rooting: carrier unlocking allows a phone to be used on different cellular networks — this is legal and doesn't affect security. Jailbreaking (iOS) and rooting (Android) bypass the OS security model and allow apps to gain system-level access — this compromises the device's security posture and should be detected and quarantined by MDM.

Bring Your Own Application (BYOA) extends the BYOD concept to applications — employees use their preferred applications (personal Dropbox, WhatsApp) for work alongside corporate-approved apps. This creates data leakage risk: work files saved to personal Dropbox leave corporate control. DLP integrated with MAM addresses this by preventing corporate data from being opened in or shared with non-managed applications. The container model is the technical enforcement: corporate apps can only share data with other corporate apps within the managed container, not with personal apps outside it.

GPS tracking and remote location: MDM can use the device's GPS to track location. For company-owned devices this is standard practice — enabling recovery of lost/stolen devices and enforcement of geofencing policies. For BYOD devices, GPS tracking raises significant privacy concerns and should be disclosed clearly in the BYOD policy and employee agreement. Some MDM platforms allow location tracking to be disabled for BYOD while still enforcing security policies on managed apps.

Exam Scenarios

A company allows employees to use personal smartphones for corporate email. The security team needs to protect corporate data without accessing employees' personal content. Which solution is most appropriate?
Answer: MAM (Mobile Application Management) with containerisation. MAM manages only the corporate email and collaboration apps, creating an encrypted container that IT can wipe independently of personal data. Full MDM would give IT access to the entire personal device, which is inappropriate for BYOD scenarios with privacy requirements.
An employee reports their company-issued phone stolen. What is the first action the administrator should take?
Answer: Initiate a remote wipe through the MDM console. A company-issued (COPE or COBO) device contains corporate data and the company has both the right and responsibility to erase it. The remote wipe should happen immediately — before the thief can bypass the screen lock or extract data. The administrator should also revoke any VPN certificates and disable the user's mobile email profile.
An MDM policy requires that all enrolled devices have a 6-digit PIN. An employee enrolls a device that currently has no PIN set. What happens?
Answer: The MDM profile enforces the policy — the device prompts the user to set a 6-digit PIN before it completes enrollment and gains access to corporate resources. If the user removes the PIN later, the MDM detects the policy violation and can quarantine the device, sending an alert to IT and blocking corporate app access until compliance is restored.

Mobile Application Management — Technical Architecture

MAM (Mobile Application Management) focuses on managing specific applications rather than the entire device. This distinction is crucial for BYOD environments where full device management is inappropriate or impractical, but some level of control over corporate applications is required.

The technical implementation of MAM relies on an SDK (Software Development Kit) or app wrapping. SDK-based MAM requires apps to be built with the MAM SDK included, giving the MDM vendor programmatic control over the app's behavior — enforcing encryption, preventing copy-paste to non-managed apps, requiring authentication before the app opens, and enabling remote selective wipe of just that app's data. This approach is deep but requires the app developer to integrate the SDK.

App wrapping is a post-development technique where the MDM vendor wraps an existing app binary with a layer that intercepts its API calls and applies MAM policies without modifying the source code. This allows MAM policies to be applied to third-party apps (corporate email clients, CRM apps) without requiring the vendor to integrate an SDK. The trade-off is that app wrapping may not work reliably with all apps, particularly those with anti-tampering protections.

The concept of the managed app container is central to BYOD MAM. Corporate apps write their data into an encrypted container (a protected area within the app's sandbox) that is separate from personal app data. The container can be remotely wiped (deleting only corporate data) without affecting personal photos, messages, or personal apps. From the user's perspective, they see two email apps — their personal Gmail and the corporate managed email — and the corporate one simply disappears (along with its cached emails) if their employment ends. This clean separation addresses both security requirements (company can wipe its data) and privacy requirements (company cannot see personal content).

Mobile Device Enrollment Methods

Getting devices into MDM management requires an enrollment process, and the method differs significantly between corporate-owned and BYOD scenarios. Understanding enrollment methods is relevant for Security+ scenarios about MDM deployment.

User-initiated enrollment is the standard BYOD approach. The employee downloads the company's MDM enrollment profile from a self-service portal (or receives an enrollment email), installs the MDM profile, and accepts the management permissions. The employee can see exactly what the MDM can and cannot access — typically displayed during enrollment. On iOS, MDM profiles installed this way can manage apps and settings but cannot access personal data. The user can remove the MDM profile at any time (which triggers revocation of corporate access and, for MAM, a wipe of the corporate data container).

Zero-touch enrollment (Apple Business Manager, Android Zero-Touch, Windows Autopilot) pre-configures corporate-owned devices to automatically enroll into MDM when first powered on, without any IT department hands-on time. When a new device is purchased through an approved reseller and registered in the zero-touch program, it comes out of the box knowing it belongs to the organization. The employee powers it on, signs in with their corporate credentials, and the device automatically downloads and applies all MDM policies, installs required apps, and configures settings — without IT needing to physically touch the device. This dramatically scales device deployment: a company rolling out 500 laptops can ship them directly from the vendor to employees' homes and have them fully configured without IT involvement.

Apple DEP (Device Enrollment Program), now part of Apple Business Manager, provides supervised mode enrollment for corporate iOS devices. Supervised mode gives MDM significantly greater control than standard enrollment: the ability to prevent users from removing the MDM profile, disable AirDrop, restrict app installations more granularly, and enable single-app mode (where the device can only run one specific app — used for kiosk deployments). For exam scenarios: supervised mode is only available for COBO corporate-owned devices, not for BYOD personal devices.

MDM Policy Enforcement — What Gets Enforced

MDM policies define the security and configuration baseline that every managed device must meet. Understanding which policies are enforceable through MDM is tested on Security+ and is essential for practical mobile security deployments.

PIN and password complexity policies are the most fundamental. MDM can enforce minimum PIN length (6 digits vs 4 digits), require alphanumeric passwords instead of numeric PINs, set maximum failed attempts before the device wipes itself, and enforce minimum time before the screen locks automatically. These policies are enforced at the OS level through the MDM profile — a user cannot bypass them without removing the MDM enrollment entirely (which can itself trigger a wipe of corporate data).

Encryption policies require device storage to be encrypted. Modern iOS and Android devices encrypt storage by default, but MDM can verify that encryption is enabled and refuse to grant access to corporate resources if it's not. For enterprise applications, MDM can enforce that the app's own data container is encrypted independently with a separate key.

Application allow and block lists control which apps can be installed. An allow list restricts devices to only approved applications — useful for COBO devices where employees should only run specific corporate apps. A block list prevents specific apps from being installed — commonly used to prohibit consumer cloud storage apps (Dropbox, personal Google Drive) that could be used for data exfiltration on BYOD devices.

Network policies include forcing VPN connections when on untrusted networks (always-on VPN), blocking personal Wi-Fi hotspot functionality on corporate-owned devices, and preventing connection to unknown Wi-Fi networks. Per-app VPN is a particularly useful feature — only specific corporate apps tunnel their traffic through VPN, while personal apps use direct internet access, protecting privacy on BYOD devices while ensuring corporate app traffic is secured.

Mobile Threat Categories

Mobile devices face a distinct set of threats compared to traditional endpoints, and the Security+ exam tests several mobile-specific attack categories. Understanding these helps you choose the correct MDM controls in exam scenarios.

Malicious apps are the primary mobile malware vector. Unlike traditional malware that exploits OS vulnerabilities, mobile malware is often installed deliberately by the user from unofficial app stores, sideloaded APKs (Android Package files), or through apps that hide malicious functionality behind a legitimate-seeming surface. MDM policies that restrict sideloading (installation from outside official app stores) and require apps to be sourced only from approved corporate app stores mitigate this threat.

Jailbreaking (iOS) and rooting (Android) remove the operating system's security restrictions, giving apps and users privileges beyond what the OS normally allows. Jailbroken and rooted devices can bypass MDM controls, install unapproved apps, and expose the underlying OS in ways that normal devices cannot. MDM platforms detect jailbroken/rooted devices during enrollment and can refuse to enroll them or quarantine them upon detection — this is a standard compliance policy in regulated environments.

SMS phishing (smishing) uses text messages to deliver malicious links, often impersonating banks, delivery services, or government agencies. Vishing uses voice calls. These attacks target users rather than the device OS, making them difficult to block technically — user awareness training is the primary control. MDM can block specific SMS applications or restrict browser access to only known-good domains, but these controls have limitations on personal devices.

Bluetooth attacks — including bluejacking (sending unsolicited messages to Bluetooth devices) and bluesnarfing (unauthorized access to a device's data via Bluetooth) — target devices with Bluetooth left discoverable. The security control is simple: configure devices to be non-discoverable by default and turn off Bluetooth when not in use. MDM can enforce this policy across all managed devices.

Unified Endpoint Management (UEM)

UEM (Unified Endpoint Management) is the evolution of MDM — a single platform that manages all endpoint types including traditional Windows/macOS laptops and desktops, smartphones, tablets, IoT devices, and even rugged devices like barcode scanners. The convergence is driven by the reality that IT departments need to enforce consistent security policies across all devices regardless of form factor, and managing separate MDM, PC management, and IoT solutions creates operational complexity and security gaps.

For exam purposes, UEM represents the current direction of mobile and endpoint management. When Security+ scenarios ask about managing a "mixed fleet of laptops, smartphones, and tablets with consistent security policies," the modern answer is a UEM platform. Major UEM vendors include Microsoft Endpoint Manager (Intune + Configuration Manager), VMware Workspace ONE, Jamf (Mac/iOS focused), and Ivanti. The underlying capabilities — profile management, app distribution, compliance enforcement, remote wipe — are the same as traditional MDM but extended to all endpoint categories.

Mobile Certificate Management

Certificates play an important role in mobile security, particularly for Wi-Fi authentication (802.1X EAP-TLS), VPN client authentication, and S/MIME email signing. Manually distributing and renewing certificates to hundreds or thousands of mobile devices is impractical — MDM automates this through integration with enterprise PKI (Public Key Infrastructure).

MDM platforms integrate with SCEP (Simple Certificate Enrollment Protocol) or NDES (Network Device Enrollment Service, Microsoft's SCEP implementation) to automatically request, distribute, and renew certificates on managed devices. When a device enrolls in MDM, it can automatically receive a client certificate for Wi-Fi authentication — users connect to 802.1X enterprise Wi-Fi automatically without being prompted for credentials. When the certificate approaches expiration, the MDM renews it silently in the background. This is a significant advantage over password-based Wi-Fi authentication from both a security and user experience perspective.

IH
IT Study Hub Editorial Team
CompTIA A+ · Network+ · Security+

Our content is written and reviewed by IT professionals holding active CompTIA certifications. Every article is grounded in current exam objectives and cross-checked against official CompTIA documentation and authoritative primary sources. About us →

Related Articles