Skip to main content

Shared Device Configuration

Shared device configuration establishes secure multi-user access on tablets, laptops, and mobile devices used by multiple staff members in field operations. This task covers platform-specific setup for shared device modes, user session management, data separation between users, and automatic cleanup procedures that prevent data leakage between sessions.

Field contexts frequently require device sharing due to equipment constraints, mobile team operations, or distribution point workflows where dedicated devices per user are impractical. Shared devices introduce security risks absent from single-user deployments: residual data from previous sessions, cached credentials, and the potential for one user to access another’s information. Proper configuration mitigates these risks while maintaining usability for staff who need rapid access without complex authentication ceremonies.

Prerequisites

Verify the following requirements before beginning shared device configuration.

RequirementDetailVerification
MDM platformIntune, Jamf, or SOTI MobiControl enrolledDevice appears in MDM console with check-in within 24 hours
Identity providerEntra ID, Okta, or Google Workspace with device-scoped policiesIdP admin access to create shared device policies
Device platformiOS 15+, iPadOS 15+, Android 10+, or Windows 10 21H2+Settings > About confirms OS version
Device ownershipOrganisation-owned (not BYOD)Asset register confirms ownership
Network accessConnectivity to MDM and IdP during setupDevice can reach login.microsoftonline.com or equivalent
Admin credentialsMDM administrator roleCan create configuration profiles in MDM console

BYOD exclusion

Shared device mode requires organisation-owned devices. Personal devices cannot be configured for shared use due to privacy and data separation limitations.

Gather the following information before proceeding:

The user population determines session timeout and cleanup aggressiveness. Devices shared among 3-5 known team members can retain more state between sessions than devices used at distribution points by dozens of beneficiaries daily.

The use case affects kiosk mode decisions. Data collection at a single application requires kiosk lockdown; general-purpose shared laptops for field staff need full desktop access.

The connectivity profile influences authentication caching. Devices operating offline for extended periods need longer credential cache validity than devices with consistent connectivity.

Procedure

iOS and iPadOS Shared iPad Configuration

Apple’s Shared iPad feature provides multi-user capability with local data separation. Each user receives a dedicated partition with separate app data, documents, and settings. The device caches credentials for a configurable number of users, enabling rapid sign-in without network dependency after initial authentication.

  1. Create a Shared iPad configuration profile in your MDM. In Intune, navigate to Devices > Configuration profiles > Create profile. Select iOS/iPadOS as the platform and Templates > Device features as the profile type.

    Configure the Shared iPad settings:

Enable Shared iPad: Yes
Maximum cached users: 10
Maximum seconds of inactivity before user logout: 300
Maximum seconds after screen lock before logout: 120
Require Shared iPad temporary session only: No

The Maximum cached users value determines how many user partitions the device retains. Set this to match your expected concurrent user count plus a buffer. A 256GB iPad supports approximately 24 cached users with 10GB per partition; a 64GB iPad supports 6 users comfortably.

  1. Assign the profile to a device group containing your shared iPads. Create a dynamic group in Entra ID using the query:
(device.devicePhysicalIds -any _ -contains "[OrderID]:SharediPad")

This matches devices tagged during Apple Business Manager enrolment with the OrderID prefix SharediPad.

  1. Configure user assignment for the shared devices. In Apple Business Manager, navigate to Devices and select your shared iPad fleet. Under User Assignment, select “Shared iPad” as the device type.

  2. Enrol the device through Apple Configurator or Automated Device Enrolment. During Setup Assistant, the device recognises the Shared iPad configuration and formats storage with user partitioning. This process takes 10-20 minutes depending on storage size.

  3. Verify Shared iPad activation by checking the lock screen. A properly configured Shared iPad displays “Press Home to Unlock” with a user icon, not the standard “Press Home to Open” message.

  4. Test user sign-in with a pilot user account. The first sign-in requires network connectivity and takes 2-3 minutes as the device creates the user partition. Subsequent cached user sign-ins complete in 10-15 seconds even offline.

  5. Configure app deployment for shared mode. In Intune, set app assignments to “Available for enrolled devices” rather than user-targeted deployment. Device-licensed apps from Apple Business Manager work across all user sessions without per-user licence consumption.

+-------------------------------------------------------------------+
| SHARED iPAD ARCHITECTURE |
+--------------------------------------------------------------------+
| |
| +------------------------+ +------------------------+ |
| | DEVICE PARTITION | | DEVICE PARTITION | |
| | (System) | | (Shared Apps) | |
| | | | | |
| | iOS Operating System | | Device-licensed apps | |
| | MDM Agent | | Configuration | |
| | System Apps | | profiles | |
| +------------------------+ +------------------------+ |
| |
| +------------------+ +------------------+ +------------------+ |
| | USER PARTITION | | USER PARTITION | | USER PARTITION | |
| | (User A) | | (User B) | | (User C) | |
| | | | | | | |
| | App data | | App data | | App data | |
| | Documents | | Documents | | Documents | |
| | Cached creds | | Cached creds | | Cached creds | |
| | Settings | | Settings | | Settings | |
| +------------------+ +------------------+ +------------------+ |
| |
| +-------------------------------------------------------------+ |
| | TEMPORARY SESSION | |
| | (No persistent data - cleared on logout) | |
| +-------------------------------------------------------------+ |
| |
+--------------------------------------------------------------------+

Figure 1: Shared iPad storage architecture showing system, shared app, and user partitions

Android Shared Device Mode

Android Enterprise provides dedicated device mode with multi-user support through work profiles. Unlike Shared iPad’s user-partitioned storage, Android shared devices use session-based isolation where the work profile clears between users.

  1. Configure your MDM for Android Enterprise dedicated device enrolment. In Intune, navigate to Devices > Enrol devices > Android enrolment > Corporate-owned dedicated devices. Create an enrolment profile with:
Enrolment mode: Corporate-owned dedicated device
Device sharing: Multiple users can sign in
Maximum users on device: 10
  1. Create a device configuration profile for shared device settings. Select Android Enterprise > Device restrictions (Dedicated devices):
Device experience:
Enrolment profile type: Dedicated device
User can share a device: Allow
Users and Accounts:
Add and remove accounts: Allow
Account changes: Allow
System security:
Factory reset: Block
Safe boot: Block
  1. Generate an enrolment token or QR code from the MDM console. The token encodes your organisation’s managed Google Play account and device policy.

  2. Factory reset the Android device and proceed through initial setup. At the “Copy apps & data” screen, tap “Next” without restoring. At the Google sign-in screen, enter afw#setup to initiate Android Enterprise enrolment.

  3. Scan the enrolment QR code or enter the token manually. The device downloads the MDM agent and applies the dedicated device configuration. This process requires network connectivity and takes 5-15 minutes.

  4. Verify multi-user mode activation. Navigate to Settings > System > Multiple users. The setting should show “On” with options to add users. If this setting is absent or disabled, re-verify the MDM configuration profile assignment.

  5. Test session switching by tapping the user icon in the quick settings panel. Create a new user session and verify that apps and data from the previous session are not accessible.

  6. Configure session cleanup by creating a device compliance policy:

Session inactivity timeout: 300 seconds
Session cleanup: Delete all user data
Retain device policies: Yes

Samsung Knox shared device mode

Samsung devices with Knox 3.0+ support enhanced shared device features including faster session switching and hardware-backed user isolation. Configure Knox Shared Device Mode through Samsung Knox Suite in addition to standard Android Enterprise settings for Samsung hardware.

Windows Shared PC Mode

Windows Shared PC mode transforms a standard Windows installation into a multi-user environment with automatic account management, storage optimisation, and session cleanup. The feature manages local account creation, temporary profile cleanup, and disk space recovery without administrator intervention.

  1. Create a Windows configuration profile in Intune. Navigate to Devices > Configuration profiles > Create profile. Select Windows 10 and later as the platform and Settings catalog as the profile type.

    Add the SharedPC settings category and configure:

Enable shared PC mode: Enabled
Account management:
Account deletion policy: Delete at disk space threshold and inactive threshold
Disk level deletion: 25
Disk level caching: 50
Inactive threshold: 30
Cache accounts above disk level: Enabled
Maintenance:
Maintenance start time: 0 (midnight)
Sign in on resume: Enabled
Power policies:
Sleep timeout on AC: 60
Sleep timeout on battery: 30
Education:
Set education environment: Disabled

The Disk level deletion of 25 means Windows deletes cached accounts when free disk space falls below 25%. The Disk level caching of 50 means Windows stops creating new cached accounts when free space falls below 50%. Setting Inactive threshold to 30 deletes accounts unused for 30 days.

  1. Configure user sign-in restrictions. In the same profile, add Windows sign-in options:
Sign-in options:
Only allow approved users to sign in: Enabled
Approved user list: field-staff-shared-pc@example.org

The approved user list references an Entra ID group. Only members of this group can sign in to shared PCs.

  1. Deploy the profile to your shared PC device group. Allow 1-2 hours for policy sync and device restart to apply Shared PC mode.

  2. Verify Shared PC mode activation. Open Registry Editor and navigate to:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedPC

Confirm EnableSharedPCMode equals 1 and AccountManagement equals 1.

  1. Test account lifecycle by signing in with a test user. Sign out and observe the temporary profile cleanup in Event Viewer under Applications and Services Logs > Microsoft > Windows > SharedAccess > Operational. Events 2001 and 2002 confirm account caching and cleanup operations.

  2. Configure BitLocker for shared PC scenarios. Shared PCs require network unlock or PIN authentication since TPM-only protection does not prompt on account switch:

Terminal window
Enable-BitLocker -MountPoint "C:" -EncryptionMethod XtsAes256 -UsedSpaceOnly -Pin (ConvertTo-SecureString "123456" -AsPlainText -Force) -TPMandPinProtector

For devices with network unlock configured, the PIN prompt does not appear when connected to the organisational network.

+------------------------------------------------------------------+
| WINDOWS SHARED PC SESSION FLOW |
+------------------------------------------------------------------+
|
+-------v-------+
| Lock Screen |
| (Ctrl+Alt+ |
| Del or tap) |
+-------+-------+
|
+---------------+---------------+
| |
+--------v--------+ +--------v--------+
| Existing cached | | New user |
| user sign-in | | (Entra ID auth) |
+--------+--------+ +--------+--------+
| |
| +--------v--------+
| | Create local |
| | profile |
| | (2-5 minutes) |
| +--------+--------+
| |
+---------------+---------------+
|
+-------v-------+
| Desktop |
| Session |
+-------+-------+
|
+-------v-------+
| Sign Out |
+-------+-------+
|
+---------------+---------------+
| |
+--------v--------+ +--------v--------+
| Keep cached | | Delete profile |
| profile | | (disk pressure |
| (recent user) | | or inactive) |
+--------+--------+ +--------+--------+
| |
+---------------+---------------+
|
+-------v-------+
| Return to |
| Lock Screen |
+---------------+

Figure 2: Windows Shared PC session lifecycle showing account caching and cleanup decisions

Kiosk Mode Configuration

Kiosk mode locks a device to a single application or limited set of applications. This configuration suits data collection scenarios, information displays, or controlled access points where users should not access the full device interface.

  1. Determine your kiosk type. Single-app kiosk restricts the device to one application with no access to device settings or other apps. Multi-app kiosk presents a launcher with 2-10 approved applications. Decide based on your use case:

    Use caseKiosk typePlatform support
    Data collection (KoboToolbox, ODK)Single-appiOS, Android, Windows
    Distribution point registrationSingle-appiOS, Android
    Field office shared workstationMulti-appWindows, Android
    Information displaySingle-appAll platforms
  2. For iOS single-app kiosk, create an App Lock payload in your MDM. In Intune, create a device configuration profile with Device restrictions > App Lock enabled:

App Lock:
Enabled: Yes
App: com.example.datacollection (bundle ID)
Disable touch: No
Disable auto-lock: Yes
Disable device rotation: No
Disable volume buttons: No

Supervised iOS devices enter Guided Access mode, locking to the specified application. Exit requires the MDM admin to remove the App Lock payload.

  1. For Android kiosk mode, configure dedicated device with lock task mode. In the device restrictions profile:
Kiosk mode:
Kiosk mode type: Single app or Multi-app
Single app settings:
Managed home screen app: com.microsoft.launcher.enterprise
Lock task mode apps: com.example.datacollection
Multi-app settings:
Managed home screen app: com.microsoft.launcher.enterprise
Lock task mode apps:
- com.example.datacollection
- com.example.camera
- com.example.calculator
  1. For Windows kiosk mode, create an assigned access configuration. Use the Settings catalog to configure:
Assigned access:
Configuration type: Single app kiosk or Multi-app kiosk
Single app:
Account name: KioskUser
Application type: Win32 app
Application path: C:\Program Files\DataCollection\collect.exe
Multi-app:
Kiosk profile:
Account: SharedKiosk
Applications:
- Microsoft Edge
- File Explorer (restricted)
- Data Collection App
Start layout: Custom (specify XML)
  1. Test kiosk mode by restarting the device and verifying it boots directly into the kiosk application or launcher. Verify that standard escape methods (Ctrl+Alt+Del on Windows, five-finger tap on iOS) do not exit kiosk mode.

  2. Configure a break-out mechanism for administrators. On Windows, create a local admin account excluded from assigned access. On iOS and Android, MDM removal commands can exit kiosk mode for maintenance.

Data Separation Configuration

Data separation prevents information leakage between user sessions. The mechanism varies by platform: iOS uses partitioned storage, Android uses work profile isolation, and Windows uses separate user profiles. Additional configuration strengthens separation beyond platform defaults.

  1. Configure browser data handling. Shared devices accumulate browsing data including cached pages, cookies, saved passwords, and form autofill. Create a browser configuration policy:

    For Microsoft Edge (all platforms):

{
"ClearBrowsingDataOnExit": true,
"BrowserSignin": 2,
"SyncDisabled": true,
"PasswordManagerEnabled": false,
"AutofillAddressEnabled": false,
"AutofillCreditCardEnabled": false,
"ClearCachedImagesAndFilesOnExit": true
}

The ClearBrowsingDataOnExit setting removes all browsing data when the user closes Edge, not when they sign out of the device. Configure the app to close on session end for complete cleanup.

  1. Configure application data cleanup. Some applications cache user data outside the standard profile location. Create a script or management extension to clear known cache locations on sign-out:

    Windows sign-out script (cleanup.ps1):

Terminal window
# Clear common application caches
$cachePaths = @(
"$env:LOCALAPPDATA\Microsoft\Teams\Cache",
"$env:LOCALAPPDATA\Microsoft\Teams\blob_storage",
"$env:LOCALAPPDATA\Microsoft\Teams\databases",
"$env:LOCALAPPDATA\Packages\*\LocalCache",
"$env:TEMP\*"
)
foreach ($path in $cachePaths) {
if (Test-Path $path) {
Remove-Item -Path $path -Recurse -Force -ErrorAction SilentlyContinue
}
}

Deploy via Group Policy logoff script or Intune Proactive Remediation.

  1. Disable clipboard sharing and universal clipboard features that persist across sessions:

    Windows:

Clipboard history: Disabled
Sync across devices: Disabled

iOS (via MDM restrictions):

Allow Handoff: No
Allow iCloud Keychain sync: No
  1. Configure print queue cleanup. Print jobs queued by previous users may contain sensitive information:

    Windows:

Terminal window
# Add to cleanup script
Stop-Service -Name Spooler -Force
Remove-Item -Path "$env:SystemRoot\System32\spool\PRINTERS\*" -Force
Start-Service -Name Spooler
  1. Verify data separation by creating test data in one user session (documents, browser bookmarks, application settings), signing out, signing in as a different user, and confirming no access to the previous user’s data.
+------------------------------------------------------------------+
| DATA SEPARATION VERIFICATION |
+------------------------------------------------------------------+
| |
| USER A SESSION USER B SESSION |
| +------------------+ +------------------+ |
| | Creates: | | Should NOT see: | |
| | - Document.docx | Sign out | - Document.docx | |
| | - Browser prefs +--------------->| - Browser prefs | |
| | - App settings | Sign in | - App settings | |
| | - Cached creds | as User B | - Cached creds | |
| +------------------+ +------------------+ |
| |
| VERIFICATION POINTS: |
| +----------------------------------------------------------+ |
| | 1. Documents folder empty or shows only User B content | |
| | 2. Browser shows default homepage, no bookmarks | |
| | 3. Applications require fresh login | |
| | 4. Recent files list empty | |
| | 5. Clipboard empty | |
| | 6. No WiFi passwords from User A session | |
| +----------------------------------------------------------+ |
| |
+------------------------------------------------------------------+

Figure 3: Data separation verification checklist between user sessions

Physical Security Configuration

Physical security settings protect shared devices from tampering, theft, and unauthorised access when unattended. These settings complement data separation by preventing bypass of session isolation through physical device access.

  1. Configure automatic screen lock with aggressive timeouts. Shared devices in public or semi-public locations should lock after 60 seconds of inactivity; those in controlled environments can extend to 300 seconds:
iOS/iPadOS:
Auto-Lock: 1 minute (or 2 minutes minimum for Shared iPad)
Require passcode: Immediately
Android:
Screen timeout: 60 seconds
Lock after timeout: Immediately
Windows:
Screen saver timeout: 60 seconds
Require password on wake: Yes
  1. Disable USB access to prevent data exfiltration or malware introduction:

    Windows (via MDM or Group Policy):

Removable storage access:
All removable storage classes: Deny all access
CD and DVD: Deny write access

iOS (via MDM restrictions):

Allow USB connections when locked: No

Android (via device restrictions):

USB file transfer: Block
USB tethering: Block
  1. Enable firmware and boot protection where available:

    Windows:

Secure Boot: Enabled
UEFI password: Set (store securely)
Boot from USB: Disabled

iOS and Android devices with recent hardware enforce secure boot by default.

  1. Configure device tracking and remote management capabilities:

    iOS:

Find My: Enabled (organisation-controlled)
Activation Lock: Organisation bypass configured
Lost Mode: Available to MDM administrators

Android:

Google Find My Device: Enabled
Factory reset protection: Organisation account

Windows:

Find My Device: Enabled
BitLocker recovery: Escrowed to Entra ID
  1. Attach physical security devices for high-risk locations. Cable locks for laptops and tablet enclosures or stands for iPads reduce opportunistic theft.

Session Monitoring Configuration

Session monitoring provides visibility into shared device usage patterns, security events, and potential misuse. Configure logging and alerting to detect anomalous behaviour while respecting user privacy.

  1. Enable sign-in event logging. Configure your identity provider to log shared device authentication events:

    Entra ID: Navigate to Entra ID > Monitoring > Diagnostic settings. Create a setting to send SignInLogs to your SIEM or Log Analytics workspace. Filter for shared device sign-ins using device compliance state or device group membership.

  2. Create alerts for anomalous usage patterns:

Alert: Excessive sign-in failures on shared device
Condition: > 5 failed sign-ins within 15 minutes
Severity: Medium
Action: Notify IT support
Alert: Sign-in outside operating hours
Condition: Successful sign-in between 22:00-06:00 local time
Severity: Low (informational)
Action: Log for review
Alert: Unfamiliar user on shared device
Condition: Sign-in by user not in approved group
Severity: High
Action: Notify security team, consider device wipe
  1. Configure device compliance reporting. Schedule weekly reports showing:

    • Devices not checking in (potential theft or loss)
    • Compliance policy failures
    • Users accessing shared devices
    • Session duration statistics
  2. Respect privacy boundaries. Shared device monitoring should focus on device security and usage patterns, not individual user behaviour. Avoid:

    • Application usage tracking beyond security-relevant apps
    • Keystroke logging
    • Screenshot capture
    • Location tracking beyond device recovery needs

    Inform users that shared device usage is logged for security purposes per your acceptable use policy.

Verification

After completing shared device configuration, verify correct operation through these tests.

Execute each verification step with a non-administrator test account to confirm the end-user experience.

Session creation and isolation:

  1. Sign in as User A and create a test document in the Documents folder. Note the document name and content.
  2. Sign out completely (not switch user, but full sign-out).
  3. Sign in as User B and navigate to Documents. The folder should be empty or contain only User B’s existing files.
  4. Create a different document as User B.
  5. Sign out and sign back in as User A. Only User A’s original document should be visible.

Automatic session cleanup:

  1. Sign in as a test user.
  2. Leave the device idle beyond the configured timeout (wait 5+ minutes for a 300-second timeout).
  3. Verify the device has locked and requires re-authentication.
  4. For Windows Shared PC, verify temporary profile cleanup by checking Event Viewer after a second user signs in.

Kiosk mode enforcement (if configured):

  1. Restart the device and verify it boots into the kiosk application.
  2. Attempt standard escape methods:
    • Windows: Ctrl+Alt+Del, Win key, Alt+F4
    • iOS: Five-finger gesture, Home button triple-click
    • Android: Recent apps button, Home button long-press
  3. Confirm escape methods are blocked or require administrator credentials.

Data separation verification:

  1. Sign in as User A and save credentials in an application.
  2. Sign out and sign in as User B.
  3. Open the same application and verify it prompts for credentials rather than using User A’s saved credentials.
  4. Repeat for browser bookmarks, WiFi passwords (if applicable), and clipboard content.

Physical security:

  1. Lock the screen and verify correct timeout behaviour.
  2. Connect a USB drive and verify access is blocked per configuration.
  3. Verify Find My Device shows the correct device location.

Troubleshooting

SymptomCauseResolution
Shared iPad shows single-user lock screen instead of multi-userShared iPad configuration profile not applied or device not supervisedVerify profile assignment in MDM; confirm device supervision status in Settings > General > About; re-enrol if necessary
User sign-in takes over 5 minutes on Shared iPadSlow network during user partition creation; large app deploymentFirst sign-in requires network for partition setup; ensure stable connectivity; reduce per-user app deployments
Cached user limit reached; oldest user evicted unexpectedlyMaximum cached users set too low for actual usageIncrease cached user count in MDM profile; consider higher capacity device storage
Windows Shared PC not cleaning up profilesMaintenance window not occurring; disk thresholds not reachedCheck maintenance start time setting; manually trigger cleanup with cleanmgr /sageset:1; verify SharedPC registry settings
Android session data persists between usersWork profile not clearing; app stores data outside managed contextVerify dedicated device mode is active; check that apps are deployed as managed Play apps; create compliance policy to clear work profile on sign-out
Kiosk mode exits unexpectedlyLock task mode not properly configured; app crashVerify lock task mode app list includes all required app package names; check app logs for crashes; ensure app handles exceptions gracefully
Browser retains previous user’s dataClearBrowsingDataOnExit not enforced; browser not fully closingVerify browser policy application via edge://policy; configure session end to force browser closure; check for multiple browser profiles
User cannot sign in; “This device is not shared” errorShared device configuration not applied to this specific deviceVerify device group membership; check MDM profile assignment; force device sync with MDM
Device stuck on “Preparing your device” during sign-inNetwork timeout during profile creation; Azure AD connectivity issueVerify network connectivity to login.microsoftonline.com; check firewall rules; increase connection timeouts in MDM
Physical security features disabled after sign-inUser policy overriding device policy; conflicting configuration profilesReview policy precedence; ensure device-level policies cannot be overridden by user-level settings; check for conflicting profiles
Session timeout not workingConflicting power settings; display never sleepingVerify power policy assignments; check that screen saver settings align with lock timeout; disable user ability to change power settings
USB access working despite block policyPolicy not applying to all USB classes; driver-level bypassVerify removable storage policy covers all classes; check for BitLocker To Go policy conflicts; use device installation restrictions as backup

Advanced Troubleshooting

Shared iPad diagnostic collection:

Terminal window
# On Mac with Apple Configurator 2
cfgutil -v get SharedDeviceConfiguration
cfgutil -v get SharedDeviceConfiguration-UsersInfo

This outputs current shared device state including cached user count and partition allocation.

Windows Shared PC event analysis:

Terminal window
# View SharedAccess events
Get-WinEvent -LogName "Microsoft-Windows-SharedAccess/Operational" |
Select-Object TimeCreated, Id, Message |
Format-Table -AutoSize
# Event ID reference:
# 2001 - Account added to cache
# 2002 - Account removed from cache
# 2003 - Maintenance started
# 2004 - Maintenance completed

Android Enterprise dedicated device verification:

Terminal window
# Via ADB (requires USB debugging enabled)
adb shell dumpsys device_policy | grep -A5 "Dedicated Device"

Output confirms dedicated device mode activation and policy application.

User Training Requirements

Shared device deployment requires user training to ensure correct session handling and security compliance. Cover these topics in user briefings:

Sign-out procedures: Users must sign out completely, not merely lock the screen. Demonstrate the difference between locking (session remains active) and signing out (session ends, data cleared). Emphasise that failure to sign out exposes their data to the next user.

Data storage limitations: Explain that documents saved locally may be deleted during cleanup. Direct users to save work to cloud storage (SharePoint, OneDrive, Google Drive) rather than local device storage.

Application sessions: Some applications maintain their own sessions independent of device sign-out. Train users to sign out of applications (especially email, messaging, and financial systems) before signing out of the device.

Reporting procedures: Users should report suspected data leakage, unusual device behaviour, or inability to sign in. Provide a clear escalation path to IT support.

See also