5.7 inch HD display
Dual 13/2MP + 8MP Cameras
Work profile (BYOD)
Fully managed (COBO)
Fully managed with work profile (COPE)
How to read this report. This device has been tested against the public validation process, in which all provisioning methods and deployment scenarios have been tested across at least two EMM platforms.
Where a feature works with one EMM, but does not with another (consider Enforce max failed attempts in the report below) this is considered a pass (green) as it’s likely an EMM issue. Where it does not work, partly or fully, across two or more EMMs this will be flagged as a warn (yellow), or a fail (red).
Some features aren’t supported or set up across EMMs, or don’t work with the device (consider KME below), where this is the case the feature will be marked as untested (purple).
While passcode policies were enforced, in testing some EMMs would read an unset passcode as set on the device and therefore not mandate a passcode is setup.
This is a device issue.
Despite the single setting and multiple settings applied in MobileIron and VMware respectively, when plugged into multiple power sources the screen ultimately turned off.
As passcode policies were applied including mandated timeout, these could have clashed however this hasn’t been the case with other devices.
Via AMAPI the policy appears to enforce, but not properly given the screen dims.
This can be replicated. This may be a device issue.
Not unique to the L3, at the moment when deployed as a COPE device (fully managed device with work profile) and a personal account is added to the parent profile, should the device be reset in an unauthorised manner, for example:
- Incorrect passcode entered too many times
- Wipe command from some EMMs
The device will lock to the personal Google account residing in the parent profile. This is irrespective of any FRP bypass in place, though it hasn’t been tested as to whether FRP whitelist would override this behaviour.
Replicated across two EMMs. This is a device issue, but appears to be more OS-level as it affects other devices also.
This is not done. Running Oreo the device doesn’t support a tabbed launcher introduced in Pie, so should create the work folder.
Although system updates are managed, it’s possible to freely access the system update settings on the device. Normally this is blocked when under management.
Sony use a proprietary wallpaper picker through their custom launcher. It was not possible to prevent the change of wallpaper in MobileIron, while the other EMMs did prevent it at the point of applying the wallpaper, but didn’t prevent access to the picker itself as would normally happen.
Via AMAPI the L3 maintained use of the system navigation keys in locktask (kiosk) mode, and escaping the kiosk is as easy as tapping the home button.
As this is AMAPI, this is considered a device issue.
The following weren’t replicated issues, but were flagged as the device didn’t behave as expected when tested. They are described below to offer context for why a warn or fail was registered during testing.
Under COPE in VMware, max failed attempts incorrectly enforces against the work profile rather than the device in the device passcode policy. As such, once a maximum has been reached, VMware removes the work profile instead of resetting the device, leaving it in a partially broken state.
This is a VMware issue.
It was not possible to provision the device as fully managed with a work profile (COPE) when initiating via NFC using VMware’s AirWatch Relay application.
Fully managed provisioning completes successfully, however in all tested cases the device times out or fails to create the work profile, requesting an existing profile is deleted in order to try again. This process repeats indefinitely.
This was not replicated with MobileIron.
The two settings:
- Disallow work apps to access documents from personal apps
- Disallow personal apps to share documents with work apps
In MobileIron there are no explicit options to prevent this and is therefore on by default.
In VMware the options are present, but not reliably enforced.
These two APIs in MobileIron don’t appear to fully enforce, allowing the end-user to toggle these on as desired. These settings will be turned off if pushed via policy, but not restricted from being turned back on.
MobileIron Core issue.
With the notes above, this is a device that should be tested with an EMM prior to rolling out. Primary concerns are passcode and kiosk related, though any of the above may impact UX in a mixed environment.