The method of registering a Google-operated cell phone or pill with Microsoft’s endpoint administration platform permits organizations to handle and safe these gadgets. This registration establishes a connection between the gadget and the Intune service, enabling directors to implement insurance policies, deploy functions, and defend company knowledge. For instance, an organization may require workers to register their private Android gadgets with the service earlier than accessing firm electronic mail.
Machine registration with the administration platform is essential for sustaining safety and compliance inside a company. It gives a centralized management level for managing entry to company assets, guaranteeing that gadgets meet safety requirements (equivalent to password complexity and encryption), and permitting for distant wiping of knowledge if a tool is misplaced or stolen. The adoption of cell gadget administration options like Intune has grown considerably with the growing prevalence of bring-your-own-device (BYOD) insurance policies and the necessity to safe delicate knowledge on employee-owned gadgets.
The following sections will element the precise steps concerned on this registration process, discover frequent troubleshooting eventualities, and talk about the totally different enrollment strategies out there, offering a radical understanding of how one can efficiently combine these gadgets right into a managed atmosphere.
1. Machine compatibility
Machine compatibility varieties the muse upon which the profitable integration of Android gadgets with the Intune administration platform is constructed. With out sufficient gadget assist, the enrollment course of will fail, rendering the gadget unmanageable and unable to entry company assets securely.
-
Android OS Model
The Android working system model is a main determinant of compatibility. Intune helps particular Android variations, usually these actively maintained by Google. Older, unsupported variations might lack the mandatory APIs or security measures for correct administration, stopping enrollment or limiting out there functionalities. For instance, gadgets working Android variations older than Android 8.0 might not assist fashionable administration capabilities, impacting knowledge safety and coverage enforcement.
-
Producer and Mannequin Approval
Whereas Intune goals for broad Android assist, particular producers or gadget fashions might current distinctive challenges. Some producers implement customized Android distributions or lack essential certifications, resulting in compatibility points. Organizations ought to keep a listing of authorised gadget fashions to make sure seamless enrollment and administration. As an example, sure ruggedized Android gadgets utilized in industrial settings may require particular configurations or administration brokers past normal Intune assist.
-
Google Cellular Companies (GMS) Requirement
Intune’s full administration capabilities typically depend on Google Cellular Companies (GMS), a collection of Google functions and APIs pre-installed on most Android gadgets. Gadgets with out GMS, equivalent to these in sure areas or working customized ROMs, might have restricted performance inside Intune. Core Intune options like app deployment by Managed Google Play and superior safety insurance policies rely upon the presence and correct functioning of GMS. A tool missing GMS might solely assist primary administration options, compromising safety and management.
-
Machine Rooting or Jailbreaking
Gadgets which have been rooted (Android) or jailbroken (iOS) are thought-about high-risk as a result of compromised safety. Intune can detect rooted/jailbroken gadgets and block their enrollment or limit entry to company assets. Rooting bypasses safety restrictions, making the gadget weak to malware and knowledge breaches. Enrolling a rooted gadget would defeat the aim of Intune’s safety insurance policies and doubtlessly expose company knowledge to unauthorized entry.
These aspects of gadget compatibility immediately impression the feasibility and effectiveness of enrolling Android gadgets into Intune. Organizations should rigorously assess gadget compatibility earlier than deploying Intune, guaranteeing that gadgets meet the minimal necessities for safe and dependable administration. Addressing compatibility points proactively minimizes enrollment failures and maximizes the advantages of the Intune platform.
2. Intune Firm Portal
The Intune Firm Portal utility serves as the first interface by which end-users provoke and full the method of registering an Android gadget with the Microsoft Intune cell gadget administration platform. With out the appliance, the enrollment process can’t be totally executed, thus hindering the power to handle and safe the gadget.
-
Enrollment Initiation
The Firm Portal gives the preliminary gateway for initiating enrollment. Customers obtain and set up the appliance from the Google Play Retailer. Upon launching the appliance, customers are prompted to authenticate with their company credentials, thereby establishing their id and associating the gadget with the group’s Intune tenant. With out the Firm Portal, there isn’t any mechanism for customers to set off the enrollment course of immediately on the gadget. For instance, a brand new worker could be directed to obtain the appliance and register to start integrating their private gadget into the managed atmosphere.
-
Certificates Set up and Configuration
Throughout enrollment, the Firm Portal handles the set up of essential certificates and configuration profiles. These parts are essential for establishing a safe connection between the gadget and Intune, enabling coverage enforcement and knowledge safety. The appliance guides customers by the certificates set up course of, guaranteeing that the gadget is correctly configured to speak with the Intune service. An occasion of this could be the set up of a root certificates that validates the group’s VPN server, permitting safe entry to inside assets.
-
Compliance Standing and Remediation
The Firm Portal shows the gadget’s compliance standing primarily based on the insurance policies configured inside Intune. It informs customers whether or not their gadget meets the group’s safety necessities, equivalent to password complexity, encryption, and working system model. If the gadget is non-compliant, the appliance gives directions on how one can remediate the difficulty, guiding customers to replace their settings or set up required software program. For instance, if a person’s gadget lacks a sufficiently robust password, the Firm Portal will alert the person and immediate them to alter it.
-
Software Entry and Administration
As soon as enrolled, the Firm Portal acts as a central hub for accessing and managing company functions. It lists the functions made out there by the group and permits customers to put in them immediately onto their gadget. The appliance additionally handles updates and uninstallation of managed functions, guaranteeing that gadgets stay safe and compliant. This performance permits the group to make sure workers have the mandatory functions to carry out their job features, equivalent to a CRM or venture administration utility.
In conclusion, the Firm Portal is indispensable for registering Android gadgets with Intune. It acts because the interface for enrollment initiation, certificates set up, compliance monitoring, and utility administration. Its absence renders the gadget incapable of being integrated into the organizations managed ecosystem. The effectiveness of cell gadget administration closely depends on the right set up and utilization of the Intune Firm Portal utility.
3. Enrollment profile
An enrollment profile serves as a vital configuration part inside the strategy of registering Android gadgets with the Intune administration platform. This profile defines the precise settings and procedures that govern how a tool is registered and managed, immediately influencing the safety posture and administration capabilities relevant to that gadget. The enrollment profile dictates the required authentication strategies, the kind of administration (gadget administrator vs. Android Enterprise), and the functions or configurations deployed through the registration. For instance, a profile may require multi-factor authentication and mechanically set up a VPN configuration upon enrollment. With out a correctly configured enrollment profile, the registration might fail, or the gadget is probably not topic to the supposed safety insurance policies.
The selection of enrollment profile is determined by elements such because the gadget possession mannequin (corporate-owned vs. personally-owned) and the extent of management required by the group. Company-owned gadgets usually make the most of enrollment profiles that allow full gadget administration, permitting directors to remotely configure settings, deploy functions, and wipe knowledge. Conversely, personally-owned gadgets might make the most of enrollment profiles that present a extra restricted scope of administration to guard person privateness whereas nonetheless guaranteeing compliance with company safety insurance policies. As an example, a personally-owned gadget is perhaps enrolled utilizing a profile that separates company knowledge from private knowledge, permitting directors to wipe solely the company knowledge if the gadget is misplaced or stolen.
In abstract, the enrollment profile is integral to the Android gadget registration course of with Intune. It determines how the gadget is managed, the extent of management exerted by the group, and the safety insurance policies enforced. Cautious consideration of the gadget possession mannequin, the specified stage of management, and the group’s safety necessities is important when creating and assigning enrollment profiles. Choosing an insufficient profile can result in both inadequate safety or a very intrusive administration expertise, underscoring the significance of aligning enrollment profile configurations with organizational wants.
4. Conditional Entry
Conditional Entry serves as a vital mechanism for safeguarding company knowledge accessed from Android gadgets enrolled inside the Intune administration platform. These insurance policies act as gatekeepers, evaluating particular circumstances earlier than granting entry to organizational assets, thereby mitigating potential safety dangers related to gadget enrollment.
-
Machine Compliance Analysis
Conditional Entry insurance policies generally consider the compliance standing of enrolled Android gadgets. This entails verifying that the gadget meets pre-defined standards equivalent to working system model, encryption standing, and the presence of a passcode. If a tool is deemed non-compliant, entry to company assets may be blocked or restricted. For instance, a coverage may require that every one enrolled gadgets have a minimal Android OS model put in to guard in opposition to recognized vulnerabilities. This ensures that solely safe and correctly configured gadgets can entry delicate organizational knowledge.
-
Location-Primarily based Entry Management
Conditional Entry can implement location-based restrictions, limiting entry to company assets primarily based on the geographical location of the enrolled Android gadget. That is notably helpful for organizations that function inside particular areas or want to stop entry from untrusted areas. As an example, a coverage may block entry to company electronic mail from gadgets positioned outdoors the group’s dwelling nation, decreasing the danger of unauthorized entry and knowledge breaches. This provides an extra layer of safety primarily based on bodily location.
-
Software-Particular Insurance policies
Conditional Entry permits for the implementation of application-specific insurance policies, governing entry to particular person functions on enrolled Android gadgets. This allows organizations to tailor safety controls primarily based on the sensitivity of the info dealt with by every utility. For instance, entry to a monetary utility may require the next stage of authentication, equivalent to multi-factor authentication, in comparison with entry to a much less delicate utility. This granular management over utility entry ensures that delicate knowledge is sufficiently protected.
-
Danger-Primarily based Entry Management
Superior Conditional Entry insurance policies can incorporate risk-based evaluation to dynamically regulate entry controls primarily based on the perceived threat related to a person or gadget. This entails evaluating elements equivalent to sign-in location, gadget well being, and person habits to detect anomalous exercise. If a excessive stage of threat is detected, entry may be blocked or restricted till the person takes corrective motion, equivalent to verifying their id. This proactive method helps to stop unauthorized entry and knowledge breaches in real-time.
These aspects of Conditional Entry are integral to the safe and compliant integration of Android gadgets inside an Intune-managed atmosphere. By implementing stringent entry controls primarily based on gadget compliance, location, utility utilization, and threat evaluation, organizations can considerably scale back the danger of knowledge breaches and make sure the confidentiality, integrity, and availability of company data. The synergistic interaction between enrollment and Conditional Entry varieties a strong safety framework.
5. Compliance insurance policies
Compliance insurance policies function a cornerstone within the complete administration technique when integrating Android gadgets with Microsoft Intune. These insurance policies outline the safety and configuration requirements that gadgets should meet to be thought-about compliant and granted entry to company assets. The enrollment course of, in essence, lays the muse for these insurance policies to be enforced; with out correct registration, there isn’t any mechanism to evaluate or mandate compliance. A tool missing a passcode, or having an outdated working system, will likely be deemed non-compliant, demonstrating the direct consequence of non-adherence. Due to this fact, the enrollment course of turns into the preliminary level of contact, establishing the hyperlink between the gadget and the compliance necessities. Compliance coverage, is a key part for profitable and safe.
The sensible significance lies within the capacity to implement a constant safety posture throughout all enrolled Android gadgets. As an example, a monetary establishment may require gadgets accessing buyer knowledge to have disk encryption enabled and to be working a minimal model of the working system to mitigate vulnerabilities. Compliance insurance policies inside Intune can mechanically assess and remediate gadgets that deviate from these requirements. Gadgets discovered to be non-compliant may be blocked from accessing company electronic mail, SharePoint websites, or different delicate assets, thereby minimizing the danger of knowledge breaches or unauthorized entry. Moreover, the automated nature of compliance checks reduces the executive overhead related to manually verifying gadget safety. It gives an environment friendly and scalable resolution for managing a various fleet of Android gadgets.
In abstract, compliance insurance policies symbolize an indispensable factor inside the Intune-managed Android atmosphere. They furnish a method to articulate and implement safety requirements, safeguarding organizational knowledge and assets. The enrollment process establishes the mandatory connection for these insurance policies to take impact. Challenges might come up from evolving safety threats or various gadget configurations, necessitating steady coverage refinement. Comprehending this hyperlink is significant for deploying a strong and safe cell gadget administration technique, underlining the significance of configuring acceptable compliance guidelines to keep up a safe and compliant cell fleet.
6. Configuration profiles
Configuration profiles are integral to the excellent administration of Android gadgets built-in into the Intune ecosystem. Following gadget registration, these profiles allow the customization and standardization of gadget settings to align with organizational necessities and safety insurance policies.
-
Wi-Fi Configuration
Configuration profiles facilitate the streamlined deployment of Wi-Fi settings throughout enrolled Android gadgets. Organizations can centrally handle and distribute Wi-Fi community configurations, together with SSID, safety protocols, and password data. This ensures that gadgets mechanically connect with authorised wi-fi networks, enhancing person comfort whereas sustaining community safety. For instance, a college can deploy a configuration profile that mechanically connects pupil and school gadgets to the campus Wi-Fi community, eliminating the necessity for handbook configuration.
-
VPN Configuration
VPN configuration profiles allow the safe entry to company assets from enrolled Android gadgets, no matter location. These profiles automate the setup of VPN connections, together with server addresses, authentication strategies, and tunneling protocols. This ensures that every one community visitors is encrypted and shielded from unauthorized entry. A worldwide company, as an illustration, may use a configuration profile to provision VPN settings on worker gadgets, permitting them to securely entry inside functions and knowledge whereas touring internationally.
-
Electronic mail Configuration
Configuration profiles streamline the configuration of electronic mail accounts on enrolled Android gadgets. These profiles mechanically configure electronic mail settings, together with server addresses, port numbers, and authentication strategies, decreasing the necessity for handbook setup by end-users. This enhances person productiveness whereas guaranteeing that electronic mail communication is performed securely and in compliance with organizational insurance policies. A healthcare supplier, as an illustration, may deploy a configuration profile that configures worker gadgets with entry to the company electronic mail system, guaranteeing that delicate affected person data is dealt with securely.
-
Restrictions and Safety Settings
Configuration profiles permit for the enforcement of gadget restrictions and safety settings on enrolled Android gadgets. These profiles can disable options equivalent to digital camera entry, Bluetooth connectivity, and app set up from unknown sources, decreasing the danger of knowledge breaches and unauthorized entry. They’ll additionally implement password complexity necessities, display screen lock timeouts, and different safety measures to guard delicate knowledge. A authorities company, for instance, may use a configuration profile to disable digital camera entry on gadgets utilized in safe services, stopping the unauthorized seize and transmission of delicate data.
In summation, configuration profiles are important instruments for organizations looking for to standardize and safe the configurations of Android gadgets enrolled with Intune. By automating the deployment of settings and restrictions, these profiles improve person productiveness, streamline gadget administration, and defend delicate knowledge.
7. Safety posture
The combination of Android gadgets inside an Intune-managed atmosphere basically goals to reinforce the general safety posture of a company. Machine registration, a vital first step, establishes the muse upon which subsequent safety controls are constructed and enforced. The safety posture is immediately influenced by how successfully gadgets are onboarded and subsequently managed.
-
Conditional Entry Enforcement
Machine enrollment in Intune allows the enforcement of Conditional Entry insurance policies, a cornerstone of a strong safety posture. These insurance policies consider elements equivalent to gadget compliance, person location, and utility threat earlier than granting entry to company assets. An unenrolled gadget bypasses these checks, doubtlessly permitting unauthorized or compromised gadgets to entry delicate knowledge. As an example, a Conditional Entry coverage may mandate that solely enrolled gadgets with up-to-date safety patches can entry company electronic mail, thus stopping weak gadgets from exposing the group to safety threats.
-
Compliance Coverage Adherence
Enrollment is a prerequisite for implementing compliance insurance policies, which outline the minimal safety requirements that gadgets should meet. These insurance policies typically require options equivalent to password safety, encryption, and the absence of jailbreaking or rooting. Unenrolled gadgets are usually not topic to those necessities, doubtlessly introducing vulnerabilities. Contemplate a situation the place an organization mandates that every one gadgets accessing buyer knowledge should have disk encryption enabled. With out enrollment, this coverage can’t be successfully enforced, leaving the info in danger.
-
Managed Software Deployment
Machine enrollment facilitates the managed deployment and administration of functions by the Managed Google Play retailer. This ensures that solely authorised functions are put in on gadgets, decreasing the danger of malware and unauthorized software program. An unenrolled gadget is inclined to the set up of malicious or unapproved functions, doubtlessly compromising safety. For instance, a company may use Intune to deploy a safe browser or collaboration software, guaranteeing that workers use solely authorised and safe functions for work-related duties.
-
Distant Wipe and Information Safety
Enrollment allows distant wipe capabilities, a vital safeguard in opposition to knowledge loss within the occasion of gadget theft or loss. If a tool is unenrolled, the group lacks the power to remotely erase company knowledge, doubtlessly exposing delicate data. Think about an worker shedding a tool containing confidential monetary knowledge. With enrollment, the group can remotely wipe the gadget, stopping unauthorized entry to the info. With out enrollment, this safety is absent.
The aspects detailed above illustrate the integral relationship between enrollment and a company’s safety posture. The act of gadget registration lays the groundwork for subsequent safety controls and administration capabilities. With out this preliminary step, the group’s capacity to safe and defend its knowledge is considerably compromised, underlining the significance of a well-defined and executed enrollment technique.
8. Managed Google Play
Managed Google Play serves as a vital part within the safe and managed deployment of functions to Android gadgets enrolled by Microsoft Intune. Its integration streamlines app administration, guaranteeing that solely authorised functions can be found to customers, whereas concurrently safeguarding company knowledge.
-
Software Approval and Distribution
Managed Google Play permits organizations to curate a catalog of authorised functions for distribution to enrolled Android gadgets. Directors can choose functions from the general public Google Play Retailer and add them to the managed retailer. These functions are then out there for customers to put in on their gadgets by the Intune Firm Portal. This course of prevents customers from putting in unauthorized or doubtlessly malicious functions, thus enhancing the general safety of the managed atmosphere. For instance, an organization may approve solely particular productiveness functions, equivalent to Microsoft Workplace or Adobe Acrobat, to be used on worker gadgets, whereas blocking entry to video games or social media functions.
-
Silent Software Set up
For corporate-owned gadgets, Managed Google Play allows the silent set up of functions with out requiring person interplay. This simplifies the deployment course of and ensures that important functions are put in mechanically on all managed gadgets. Directors can push functions to gadgets within the background, minimizing disruption to the person expertise. Contemplate a situation the place a company must deploy a vital safety utility to all worker gadgets. With Managed Google Play, this utility may be silently put in with out requiring every person to manually obtain and set up it.
-
Software Configuration Administration
Managed Google Play helps the administration of utility configurations, permitting directors to customise utility settings for enrolled Android gadgets. This allows organizations to pre-configure functions with particular settings, equivalent to server addresses, authentication strategies, and safety insurance policies. This streamlines the appliance setup course of and ensures that functions are configured constantly throughout all managed gadgets. As an example, an organization may use Managed Google Play to pre-configure a cell CRM utility with the proper server settings and person credentials, eliminating the necessity for every person to manually configure the appliance.
-
Software Replace Management
Managed Google Play gives granular management over utility updates, permitting directors to handle when and the way functions are up to date on enrolled Android gadgets. This ensures that functions are up to date in a managed method, minimizing the danger of compatibility points or disruptions to enterprise operations. Organizations can schedule utility updates to happen throughout off-peak hours or take a look at updates on a subset of gadgets earlier than rolling them out to the whole fleet. A monetary establishment, for instance, may delay updates to its cell banking utility till they’ve been totally examined, guaranteeing that the updates don’t introduce any safety vulnerabilities or disrupt buyer entry.
The utilization of Managed Google Play considerably enhances the safety and manageability of Android gadgets enrolled by Intune. By offering a managed atmosphere for utility deployment and administration, organizations can scale back the danger of malware, implement safety insurance policies, and streamline the person expertise, guaranteeing that enrolled gadgets are each safe and productive.
Regularly Requested Questions
The next questions handle frequent considerations and misconceptions concerning the method of registering Android gadgets with the Microsoft Intune administration platform.
Query 1: Is it necessary to enroll an Android gadget to entry company electronic mail?
Enrollment is commonly a requirement for accessing company electronic mail. The group’s safety insurance policies might dictate that solely managed gadgets can entry delicate company knowledge. With out enrollment, the gadget might not meet the safety necessities mandated for knowledge entry.
Query 2: What knowledge is collected when an Android gadget is enrolled?
The information collected usually contains gadget {hardware} data, working system model, put in functions, and community particulars. The group can view this data to implement safety insurance policies and guarantee compliance. Private knowledge, equivalent to photographs and private emails, are typically not accessed or monitored.
Query 3: What occurs if an enrolled Android gadget turns into non-compliant?
If a tool turns into non-compliant, entry to company assets could also be restricted or blocked. The gadget could also be flagged as non-compliant as a result of outdated working techniques, lacking safety patches, or the absence of a passcode. The person will usually obtain directions on how one can remediate the difficulty and regain compliance.
Query 4: Can the group remotely wipe an enrolled Android gadget?
Distant wipe capabilities can be found for enrolled gadgets, permitting the group to erase company knowledge within the occasion of loss, theft, or termination of employment. This performance helps defend delicate knowledge from unauthorized entry. The group might have the choice to carry out a full wipe (manufacturing unit reset) or a selective wipe (eradicating solely company knowledge).
Query 5: What occurs to the Android gadget whether it is unenrolled from Intune?
Unenrolling the gadget removes it from the group’s administration. Company knowledge and functions could also be faraway from the gadget. The gadget will not be topic to the group’s safety insurance policies or configuration profiles. Entry to company assets will likely be revoked.
Query 6: Is it doable to enroll a number of Android gadgets underneath a single person account?
The power to enroll a number of gadgets underneath a single person account is mostly supported, though a company might impose restrictions. Every enrolled gadget is managed independently, and insurance policies are utilized to every gadget primarily based on its configuration and compliance standing.
Profitable registration of Android gadgets inside Intune is pivotal to safeguarding a company’s assets and data. Understanding the main points concerning registration, gathered data, repercussions for non-adherence, distant wiping capabilities, and administration of utility upgrades and safety is key. It’s important to have the ability to effectively handle cell gadgets and supply a secure atmosphere.
The succeeding part will discover superior troubleshooting steps for frequent enrollment errors and configuration points.
Ideas for Profitable Android Machine Enrollment with Intune
Reaching seamless Android gadget registration with Microsoft Intune requires cautious planning and execution. The following pointers supply steerage to reduce disruptions and maximize the effectiveness of the enrollment course of.
Tip 1: Confirm Machine Compatibility Previous to Enrollment: Make sure the goal Android gadget meets the minimal working system necessities and {hardware} specs outlined by Microsoft Intune. Incompatible gadgets will doubtless encounter enrollment failures or restricted administration capabilities.
Tip 2: Make the most of a Staging Atmosphere for Testing: Implement a staging atmosphere to pilot enrollment procedures and take a look at configuration profiles earlier than deploying them to the whole group. This permits for the identification and determination of potential points in a managed setting.
Tip 3: Correctly Configure Enrollment Restrictions: Outline enrollment restrictions to regulate which gadget sorts and working techniques may be registered with Intune. This prevents the enrollment of unauthorized gadgets and maintains a constant safety posture.
Tip 4: Leverage Enrollment Profiles for Automation: Make the most of enrollment profiles to automate the configuration course of and scale back the necessity for handbook intervention. These profiles streamline gadget configuration and guarantee adherence to organizational requirements.
Tip 5: Educate Finish-Customers on the Enrollment Course of: Present clear and concise directions to end-users on how one can enroll their Android gadgets. This minimizes person errors and reduces the burden on IT assist assets.
Tip 6: Implement Conditional Entry Insurance policies: Implement Conditional Entry insurance policies to limit entry to company assets primarily based on gadget compliance and person id. This protects delicate knowledge from unauthorized entry and ensures that solely compliant gadgets can entry organizational assets.
Tip 7: Usually Monitor Machine Compliance: Set up a monitoring system to trace gadget compliance and establish gadgets that fall outdoors of established safety requirements. Promptly handle non-compliant gadgets to mitigate potential safety dangers.
The following pointers present a framework for optimizing the Android gadget enrollment course of with Intune. Implementing these suggestions will contribute to a safer and effectively managed cell atmosphere.
The ultimate part of this text will discover superior configurations for enhancing safety.
Conclusion
The profitable execution of “enroll android gadget intune” is paramount for organizations looking for to safe and handle their cell workforce. This text has explored the multifaceted points of this course of, from gadget compatibility and the essential function of the Firm Portal, to the enforcement of compliance insurance policies and the strategic implementation of configuration profiles. Key issues embody a strong understanding of Conditional Entry and the importance of a well-defined safety posture, all underpinned by the managed atmosphere offered by Managed Google Play.
The complexities inherent in cell gadget administration necessitate a proactive and knowledgeable method. Organizations should frequently adapt their methods to deal with evolving safety threats and make sure the ongoing safety of delicate knowledge. The diligent implementation of those pointers and a dedication to steady monitoring will empower organizations to confidently navigate the challenges of a mobile-first world and keep a safe and productive atmosphere.