Blog Post

Intune Customer Success
5 MIN READ

Migrating Frontline Mobile Devices: Understanding the reality of your estate

Intune_Support_Team's avatar
Intune_Support_Team
Silver Contributor
Apr 15, 2026

By: Carol Burns - Principal Product Manager | Microsoft Intune and Sucheta Gawade, Microsoft MVP (Azure & Security / Intune)

Practitioner perspective from Sucheta Gawade, Microsoft MVP (Azure & Security / Intune), with deep experience in secure frontline mobility, including regulated healthcare environments.

 

Frontline devices have evolved from a small set of task-specific tools into the way day-to-day work gets done. As new workflows, apps, locations, and teams get added over time, device estates expand quickly, making it harder to maintain consistency and visibility.

For many organizations, the reality of the estate isn't easy to keep track of. Devices may have been purchased locally, inherited through acquisitions, shared across teams, or left unused in lockers. They may be repurposed for new workflows or kept running far longer than originally planned.

This creates a gap between what teams think they have, how they expect devices to be used, and what happens in the field.

“Frontline estates aren’t complex because teams don’t care, they’re complex because operations evolve faster than governance.” -Sucheta Gawade, Microsoft MVP

If teams don’t close this gap early, it tends to show up during pilots and cutover: devices fail in real conditions, frontline teams revert to workarounds, and the migration slows down through rework, exceptions, and avoidable disruption.

To understand the estate, teams need to start by determining what the business needs devices to do and not just who happens to use them.

Start with what devices need to do

While some devices are assigned to individual users, many are shared across shifts, used for specific tasks, or operate without a fixed user at all.

Designing a migration around users or roles can obscure what really matters: the job the device must perform, when it must be available, and the impact if it isn’t.

Anchoring on business needs helps teams:

  • Focus on outcomes rather than ownership models
  • Simplify stakeholder conversations
  • Make clearer tradeoffs, when required, around user experience, productivity and security

One simple way for teams to gather this information is by mapping business tasks to what devices must reliably do.

Business Task

What the device must do

When it must work

Impact if unavailable

Take payment for goods

Run secure POS applications

Store open hours

Lost revenue

Pick inventory

Scan bar codes quickly and accurately

During shifts

Orders delayed

Document patient observations

Capture and submit clinical data

During care delivery

Delayed or incomplete care

 

This framing applies equally across retail, healthcare, manufacturing, transport, logistics and utilities. It creates a shared language between IT, operations, and security - one that is grounded in business impact rather than tooling.

Once business needs and intended device usage are clear, the next step is understanding how those devices support frontline work day to day.

Understand how devices are used in practice

Frontline usage patterns often diverge from what business owners and IT expect. Devices may be shared across shifts or used by alternate users. They may also be repurposed to support new workflows or kept running beyond their intended lifecycle, all without IT or executive oversight.

These gaps are best identified by partnering with operational and business owners to validate real-world usage through quick workflow walk-throughs, targeted questions, and a review of how devices are accessed and supported day-to-day. Some helpful questions:

  • How are devices shared?
  • When are they offline or unavailable?
  • What workarounds exist to keep critical tasks moving?

It’s also critical to confirm whether corporate-assigned devices have been used for personal activity. Personally used devices may also be treated as work devices, whether authorized or otherwise. This affects wipe and re-enroll decisions because personal use can introduce data retention, user impact, and acceptance risks.

Intended usage

Actual observed use

Notes/Workarounds

Assigned device

Shared across the shift

Shared credentials used

Always connected

Intermittent Wi-Fi

Offline workarounds

Single-app device

Multi-app usage

Local exceptions for multiple apps

 

This is also where identity assumptions surface, particularly in environments where devices are shared but access shouldn’t be.

“Identity reality matters: shared devices should not mean shared credentials. Migration is often the right moment to address this. Otherwise, teams simply replatform the same risks.” -Sucheta Gawade, Microsoft MVP

Teams often uncover important dependencies at this stage. For example, some frontline workflows rely on constant connectivity, while others must function reliably in low‑bandwidth or offline conditions. Similarly, older operating systems or unsupported device models may still be in active use because replacing them has operational or budgetary implications.

Understanding these realities early helps teams avoid designing for ideal conditions that don’t exist in the field.

Ground plans in device inventory

Inventory is most valuable when it supports planning decisions, not when it aims for completeness. For frontline migrations, teams need decision relevant information rather than a perfect asset register.

Understanding how devices are procured and funded across the organization is important. For example, whether devices are purchased centrally through IT or sourced locally by business/departments. Procurement paths often explain why inventory is fragmented and help determine who owns refresh cycles, warranties, and enrollment readiness.

At a minimum, this includes:

  • Device types and OEMs
  • OS version ranges and supportability
  • Whether devices are active, dormant, or missing
  • How devices align to business-critical tasks
  • Where specialist or certified devices are required such as intrinsically safe or ruggedized devices

This helps surface ecosystem considerations early:

  • Are required apps and services supported on the OS versions in use today?
  • Do OEMs still support the hardware?
  • Do environment constraints affect enrollment, updates, or day‑to‑day operation?

These questions are not about selecting solutions yet. They’re about understanding constraints that will shape options later.

With business needs understood, usage patterns mapped, and inventory validated, teams are ready to start designing approaches that work in frontline conditions.

Migration is also a good opportunity to plan for standardization and set a future procurement standard. Even if you migrate the current estate as-is, defining an approved OEM or model catalog for future purchases improves consistency. It can also accelerate troubleshooting and strengthen lifecycle governance as devices reach end of support.

What we’ve learned

The key lesson is simple: validate reality before designing anything.

Teams that invest time here:

  • Reduce rework during pilots
  • Avoid late‑stage surprises
  • Have stronger conversations with operational, security, and platform stakeholders

“We don’t declare success at enrollment. We declare success when a frontline workflow can run end-to-end with predictable support.” -Sucheta Gawade, Microsoft MVP

In future articles, we’ll look at how these insights shape design decisions. In the meantime, we’re interested in hearing what gaps you’ve uncovered between intended and actual device usage in your frontline environments. Leave a comment below or reach out on X @IntuneSupportTeam.

Updated Apr 15, 2026
Version 2.0

3 Comments

  • SATCHEL's avatar
    SATCHEL
    Copper Contributor

    My career spanning 41 years in the railroad industry as a front line worker was encapsulated in the article.  Now retired, I just wanted to say the article was spot on for management success and more importantly give credit to the author.

  • rahuljindal's avatar
    rahuljindal
    Bronze Contributor

    So in summary, if you don’t deeply understand your frontline estate, Intune can quickly expose every underlying flaw. This is because Intune is policy-driven, identity-dependent, and connectivity sensitive, areas that are often the most challenging in frontline environments.

    However, it’s also true that many organisations struggle with messy inventories, a drift between design and reality, and a near constant lag in governance. Viewed in that light, these challenges are not unique to frontline environments, despite how they are positioned in the article.

    I’d be interested to see how the next article in the series ties these realities back to Intune Customer Success.