8+ Easy Ways to Enroll Android Device in Intune


8+ Easy Ways to Enroll Android Device in Intune

The method of registering a Google-operated cell phone or pill with Microsoft’s endpoint administration platform permits organizations to handle and safe these gadgets. This registration establishes a connection between the system and the Intune service, enabling directors to implement insurance policies, deploy purposes, and defend company knowledge. For instance, an organization may require workers to register their private Android gadgets with the service earlier than accessing firm electronic mail.

System registration with the administration platform is essential for sustaining safety and compliance inside a corporation. It offers a centralized management level for managing entry to company assets, guaranteeing that gadgets meet safety requirements (comparable to password complexity and encryption), and permitting for distant wiping of knowledge if a tool is misplaced or stolen. The adoption of cell system administration options like Intune has grown considerably with the growing prevalence of bring-your-own-device (BYOD) insurance policies and the necessity to safe delicate knowledge on employee-owned gadgets.

The following sections will element the precise steps concerned on this registration process, discover frequent troubleshooting eventualities, and talk about the completely different enrollment strategies obtainable, offering a radical understanding of learn how to efficiently combine these gadgets right into a managed surroundings.

1. System compatibility

System compatibility types the muse upon which the profitable integration of Android gadgets with the Intune administration platform is constructed. With out sufficient system assist, the enrollment course of will fail, rendering the system unmanageable and unable to entry company assets securely.

  • Android OS Model

    The Android working system model is a major determinant of compatibility. Intune helps particular Android variations, sometimes these actively maintained by Google. Older, unsupported variations could lack the required APIs or safety features for correct administration, stopping enrollment or limiting obtainable functionalities. For instance, gadgets operating Android variations older than Android 8.0 could not assist trendy administration capabilities, impacting knowledge safety and coverage enforcement.

  • Producer and Mannequin Approval

    Whereas Intune goals for broad Android assist, particular producers or system fashions could current distinctive challenges. Some producers implement customized Android distributions or lack vital certifications, resulting in compatibility points. Organizations ought to keep an inventory of accredited system fashions to make sure seamless enrollment and administration. For example, sure ruggedized Android gadgets utilized in industrial settings may require particular configurations or administration brokers past commonplace Intune assist.

  • Google Cell Companies (GMS) Requirement

    Intune’s full administration capabilities usually depend on Google Cell Companies (GMS), a collection of Google purposes and APIs pre-installed on most Android gadgets. Units with out GMS, comparable to these in sure areas or operating customized ROMs, could have restricted performance inside Intune. Core Intune options like app deployment via Managed Google Play and superior safety insurance policies depend upon the presence and correct functioning of GMS. A tool missing GMS could solely assist primary administration options, compromising safety and management.

  • System Rooting or Jailbreaking

    Units which were rooted (Android) or jailbroken (iOS) are thought-about high-risk as a consequence of compromised safety. Intune can detect rooted/jailbroken gadgets and block their enrollment or prohibit entry to company assets. Rooting bypasses safety restrictions, making the system weak to malware and knowledge breaches. Enrolling a rooted system would defeat the aim of Intune’s safety insurance policies and probably expose company knowledge to unauthorized entry.

These sides of system compatibility straight affect the feasibility and effectiveness of enrolling Android gadgets into Intune. Organizations should rigorously assess system compatibility earlier than deploying Intune, guaranteeing that gadgets meet the minimal necessities for safe and dependable administration. Addressing compatibility points proactively minimizes enrollment failures and maximizes the advantages of the Intune platform.

2. Intune Firm Portal

The Intune Firm Portal software serves as the first interface via which end-users provoke and full the method of registering an Android system with the Microsoft Intune cell system administration platform. With out the appliance, the enrollment process can’t be totally executed, thus hindering the flexibility to handle and safe the system.

  • Enrollment Initiation

    The Firm Portal offers the preliminary gateway for initiating enrollment. Customers obtain and set up the appliance from the Google Play Retailer. Upon launching the appliance, customers are prompted to authenticate with their company credentials, thereby establishing their identification and associating the system with the group’s Intune tenant. With out the Firm Portal, there isn’t a mechanism for customers to set off the enrollment course of straight on the system. For instance, a brand new worker could be directed to obtain the appliance and register to start integrating their private system into the managed surroundings.

  • Certificates Set up and Configuration

    Throughout enrollment, the Firm Portal handles the set up of vital certificates and configuration profiles. These elements are essential for establishing a safe connection between the system and Intune, enabling coverage enforcement and knowledge safety. The applying guides customers via the certificates set up course of, guaranteeing that the system is correctly configured to speak with the Intune service. An occasion of this could be the set up of a root certificates that validates the group’s VPN server, permitting safe entry to inside assets.

  • Compliance Standing and Remediation

    The Firm Portal shows the system’s compliance standing based mostly on the insurance policies configured inside Intune. It informs customers whether or not their system meets the group’s safety necessities, comparable to password complexity, encryption, and working system model. If the system is non-compliant, the appliance offers directions on learn how to remediate the problem, guiding customers to replace their settings or set up required software program. For instance, if a consumer’s system lacks a sufficiently robust password, the Firm Portal will alert the consumer and immediate them to alter it.

  • Software Entry and Administration

    As soon as enrolled, the Firm Portal acts as a central hub for accessing and managing company purposes. It lists the purposes made obtainable by the group and permits customers to put in them straight onto their system. The applying additionally handles updates and uninstallation of managed purposes, guaranteeing that gadgets stay safe and compliant. This performance permits the group to make sure workers have the required purposes to carry out their job features, comparable to a CRM or venture administration software.

In conclusion, the Firm Portal is indispensable for registering Android gadgets with Intune. It acts because the interface for enrollment initiation, certificates set up, compliance monitoring, and software administration. Its absence renders the system incapable of being included into the organizations managed ecosystem. The effectiveness of cell system administration closely depends on the right set up and utilization of the Intune Firm Portal software.

3. Enrollment profile

An enrollment profile serves as a essential configuration part inside the technique of registering Android gadgets with the Intune administration platform. This profile defines the precise settings and procedures that govern how a tool is registered and managed, straight influencing the safety posture and administration capabilities relevant to that system. The enrollment profile dictates the required authentication strategies, the kind of administration (system administrator vs. Android Enterprise), and the purposes or configurations deployed through the registration. For instance, a profile may require multi-factor authentication and robotically set up a VPN configuration upon enrollment. With out a correctly configured enrollment profile, the registration could fail, or the system might not be topic to the supposed safety insurance policies.

See also  Fix: Android Auto Not Displaying Text Messages? 8+ Tips

The selection of enrollment profile is dependent upon components such because the system possession mannequin (corporate-owned vs. personally-owned) and the extent of management required by the group. Company-owned gadgets sometimes make the most of enrollment profiles that allow full system administration, permitting directors to remotely configure settings, deploy purposes, and wipe knowledge. Conversely, personally-owned gadgets could make the most of enrollment profiles that present a extra restricted scope of administration to guard consumer privateness whereas nonetheless guaranteeing compliance with company safety insurance policies. For example, a personally-owned system is likely to be enrolled utilizing a profile that separates company knowledge from private knowledge, permitting directors to wipe solely the company knowledge if the system is misplaced or stolen.

In abstract, the enrollment profile is integral to the Android system registration course of with Intune. It determines how the system is managed, the extent of management exerted by the group, and the safety insurance policies enforced. Cautious consideration of the system possession mannequin, the specified stage of management, and the group’s safety necessities is important when creating and assigning enrollment profiles. Deciding on an insufficient profile can result in both inadequate safety or a very intrusive administration expertise, underscoring the significance of aligning enrollment profile configurations with organizational wants.

4. Conditional Entry

Conditional Entry serves as a essential mechanism for safeguarding company knowledge accessed from Android gadgets enrolled inside the Intune administration platform. These insurance policies act as gatekeepers, evaluating particular circumstances earlier than granting entry to organizational assets, thereby mitigating potential safety dangers related to system enrollment.

  • System Compliance Analysis

    Conditional Entry insurance policies generally consider the compliance standing of enrolled Android gadgets. This includes verifying that the system meets pre-defined standards comparable to working system model, encryption standing, and the presence of a passcode. If a tool is deemed non-compliant, entry to company assets might be blocked or restricted. For instance, a coverage may require that each one enrolled gadgets have a minimal Android OS model put in to guard in opposition to recognized vulnerabilities. This ensures that solely safe and correctly configured gadgets can entry delicate organizational knowledge.

  • Location-Primarily based Entry Management

    Conditional Entry can implement location-based restrictions, limiting entry to company assets based mostly on the geographical location of the enrolled Android system. That is notably helpful for organizations that function inside particular areas or want to forestall entry from untrusted areas. For example, a coverage may block entry to company electronic mail from gadgets positioned exterior the group’s house nation, lowering the chance of unauthorized entry and knowledge breaches. This provides a further layer of safety based mostly on bodily location.

  • Software-Particular Insurance policies

    Conditional Entry permits for the implementation of application-specific insurance policies, governing entry to particular person purposes on enrolled Android gadgets. This allows organizations to tailor safety controls based mostly on the sensitivity of the info dealt with by every software. For instance, entry to a monetary software may require a better stage of authentication, comparable to multi-factor authentication, in comparison with entry to a much less delicate software. This granular management over software entry ensures that delicate knowledge is satisfactorily protected.

  • Threat-Primarily based Entry Management

    Superior Conditional Entry insurance policies can incorporate risk-based evaluation to dynamically modify entry controls based mostly on the perceived danger related to a consumer or system. This includes evaluating components comparable to sign-in location, system well being, and consumer conduct to detect anomalous exercise. If a excessive stage of danger is detected, entry might be blocked or restricted till the consumer takes corrective motion, comparable to verifying their identification. This proactive strategy helps to forestall unauthorized entry and knowledge breaches in real-time.

These sides of Conditional Entry are integral to the safe and compliant integration of Android gadgets inside an Intune-managed surroundings. By implementing stringent entry controls based mostly on system compliance, location, software utilization, and danger evaluation, organizations can considerably cut back the chance of knowledge breaches and make sure the confidentiality, integrity, and availability of company data. The synergistic interaction between enrollment and Conditional Entry types a strong safety framework.

5. Compliance insurance policies

Compliance insurance policies function a cornerstone within the complete administration technique when integrating Android gadgets with Microsoft Intune. These insurance policies outline the safety and configuration requirements that gadgets should meet to be thought-about compliant and granted entry to company assets. The enrollment course of, in essence, lays the muse for these insurance policies to be enforced; with out correct registration, there isn’t a mechanism to evaluate or mandate compliance. A tool missing a passcode, or having an outdated working system, will likely be deemed non-compliant, demonstrating the direct consequence of non-adherence. Subsequently, the enrollment course of turns into the preliminary level of contact, establishing the hyperlink between the system and the compliance necessities. Compliance coverage, is a key part for profitable and safe.

The sensible significance lies within the capability to implement a constant safety posture throughout all enrolled Android gadgets. For example, a monetary establishment may require gadgets accessing buyer knowledge to have disk encryption enabled and to be operating a minimal model of the working system to mitigate vulnerabilities. Compliance insurance policies inside Intune can robotically assess and remediate gadgets that deviate from these requirements. Units discovered to be non-compliant might be blocked from accessing company electronic mail, SharePoint websites, or different delicate assets, thereby minimizing the chance of knowledge breaches or unauthorized entry. Moreover, the automated nature of compliance checks reduces the executive overhead related to manually verifying system safety. It offers an environment friendly and scalable answer for managing a various fleet of Android gadgets.

In abstract, compliance insurance policies symbolize an indispensable ingredient inside the Intune-managed Android surroundings. They furnish a way to articulate and implement safety requirements, safeguarding organizational knowledge and assets. The enrollment process establishes the required connection for these insurance policies to take impact. Challenges could come up from evolving safety threats or various system configurations, necessitating steady coverage refinement. Comprehending this hyperlink is significant for deploying a strong and safe cell system administration technique, underlining the significance of configuring applicable compliance guidelines to keep up a safe and compliant cell fleet.

6. Configuration profiles

Configuration profiles are integral to the excellent administration of Android gadgets built-in into the Intune ecosystem. Following system registration, these profiles allow the customization and standardization of system settings to align with organizational necessities and safety insurance policies.

See also  Fix: Android DNS Address Could Not Be Found! 9+ Tips

  • Wi-Fi Configuration

    Configuration profiles facilitate the streamlined deployment of Wi-Fi settings throughout enrolled Android gadgets. Organizations can centrally handle and distribute Wi-Fi community configurations, together with SSID, safety protocols, and password data. This ensures that gadgets robotically hook up with accredited wi-fi networks, enhancing consumer comfort whereas sustaining community safety. For instance, a college can deploy a configuration profile that robotically connects scholar and school gadgets to the campus Wi-Fi community, eliminating the necessity for handbook configuration.

  • VPN Configuration

    VPN configuration profiles allow the safe entry to company assets from enrolled Android gadgets, no matter location. These profiles automate the setup of VPN connections, together with server addresses, authentication strategies, and tunneling protocols. This ensures that each one community visitors is encrypted and protected against unauthorized entry. A worldwide company, for example, may use a configuration profile to provision VPN settings on worker gadgets, permitting them to securely entry inside purposes and knowledge whereas touring internationally.

  • Electronic mail Configuration

    Configuration profiles streamline the configuration of electronic mail accounts on enrolled Android gadgets. These profiles robotically configure electronic mail settings, together with server addresses, port numbers, and authentication strategies, lowering the necessity for handbook setup by end-users. This enhances consumer productiveness whereas guaranteeing that electronic mail communication is carried out securely and in compliance with organizational insurance policies. A healthcare supplier, for example, might deploy a configuration profile that configures worker gadgets with entry to the company electronic mail system, guaranteeing that delicate affected person data is dealt with securely.

  • Restrictions and Safety Settings

    Configuration profiles permit for the enforcement of system restrictions and safety settings on enrolled Android gadgets. These profiles can disable options comparable to digital camera entry, Bluetooth connectivity, and app set up from unknown sources, lowering the chance of knowledge breaches and unauthorized entry. They’ll additionally implement password complexity necessities, display screen lock timeouts, and different safety measures to guard delicate knowledge. A authorities company, for instance, may use a configuration profile to disable digital camera entry on gadgets utilized in safe services, stopping the unauthorized seize and transmission of delicate data.

In summation, configuration profiles are important instruments for organizations in search of to standardize and safe the configurations of Android gadgets enrolled with Intune. By automating the deployment of settings and restrictions, these profiles improve consumer productiveness, streamline system administration, and defend delicate knowledge.

7. Safety posture

The combination of Android gadgets inside an Intune-managed surroundings basically goals to reinforce the general safety posture of a corporation. System registration, a essential first step, establishes the muse upon which subsequent safety controls are constructed and enforced. The safety posture is straight influenced by how successfully gadgets are onboarded and subsequently managed.

  • Conditional Entry Enforcement

    System enrollment in Intune allows the enforcement of Conditional Entry insurance policies, a cornerstone of a strong safety posture. These insurance policies consider components comparable to system compliance, consumer location, and software danger earlier than granting entry to company assets. An unenrolled system bypasses these checks, probably permitting unauthorized or compromised gadgets to entry delicate knowledge. For example, a Conditional Entry coverage may mandate that solely enrolled gadgets with up-to-date safety patches can entry company electronic mail, thus stopping weak gadgets from exposing the group to safety threats.

  • Compliance Coverage Adherence

    Enrollment is a prerequisite for implementing compliance insurance policies, which outline the minimal safety requirements that gadgets should meet. These insurance policies usually require options comparable to password safety, encryption, and the absence of jailbreaking or rooting. Unenrolled gadgets aren’t topic to those necessities, probably introducing vulnerabilities. Contemplate a situation the place an organization mandates that each one gadgets accessing buyer knowledge will need to have disk encryption enabled. With out enrollment, this coverage can’t be successfully enforced, leaving the info in danger.

  • Managed Software Deployment

    System enrollment facilitates the managed deployment and administration of purposes via the Managed Google Play retailer. This ensures that solely accredited purposes are put in on gadgets, lowering the chance of malware and unauthorized software program. An unenrolled system is prone to the set up of malicious or unapproved purposes, probably compromising safety. For instance, a corporation may use Intune to deploy a safe browser or collaboration instrument, guaranteeing that workers use solely accredited and safe purposes for work-related duties.

  • Distant Wipe and Information Safety

    Enrollment allows distant wipe capabilities, a essential safeguard in opposition to knowledge loss within the occasion of system theft or loss. If a tool is unenrolled, the group lacks the flexibility to remotely erase company knowledge, probably exposing delicate data. Think about an worker shedding a tool containing confidential monetary knowledge. With enrollment, the group can remotely wipe the system, stopping unauthorized entry to the info. With out enrollment, this safety is absent.

The sides detailed above illustrate the integral relationship between enrollment and a corporation’s safety posture. The act of system registration lays the groundwork for subsequent safety controls and administration capabilities. With out this preliminary step, the group’s capability to safe and defend its knowledge is considerably compromised, underlining the significance of a well-defined and executed enrollment technique.

8. Managed Google Play

Managed Google Play serves as a essential part within the safe and managed deployment of purposes to Android gadgets enrolled via Microsoft Intune. Its integration streamlines app administration, guaranteeing that solely accredited purposes can be found to customers, whereas concurrently safeguarding company knowledge.

  • Software Approval and Distribution

    Managed Google Play permits organizations to curate a catalog of accredited purposes for distribution to enrolled Android gadgets. Directors can choose purposes from the general public Google Play Retailer and add them to the managed retailer. These purposes are then obtainable for customers to put in on their gadgets via the Intune Firm Portal. This course of prevents customers from putting in unauthorized or probably malicious purposes, thus enhancing the general safety of the managed surroundings. For instance, an organization may approve solely particular productiveness purposes, comparable to Microsoft Workplace or Adobe Acrobat, to be used on worker gadgets, whereas blocking entry to video games or social media purposes.

  • Silent Software Set up

    For corporate-owned gadgets, Managed Google Play allows the silent set up of purposes with out requiring consumer interplay. This simplifies the deployment course of and ensures that important purposes are put in robotically on all managed gadgets. Directors can push purposes to gadgets within the background, minimizing disruption to the consumer expertise. Contemplate a situation the place a corporation must deploy a essential safety software to all worker gadgets. With Managed Google Play, this software might be silently put in with out requiring every consumer to manually obtain and set up it.

  • Software Configuration Administration

    Managed Google Play helps the administration of software configurations, permitting directors to customise software settings for enrolled Android gadgets. This allows organizations to pre-configure purposes with particular settings, comparable to server addresses, authentication strategies, and safety insurance policies. This streamlines the appliance setup course of and ensures that purposes are configured persistently throughout all managed gadgets. For example, an organization may use Managed Google Play to pre-configure a cell CRM software with the proper server settings and consumer credentials, eliminating the necessity for every consumer to manually configure the appliance.

  • Software Replace Management

    Managed Google Play offers granular management over software updates, permitting directors to handle when and the way purposes are up to date on enrolled Android gadgets. This ensures that purposes are up to date in a managed method, minimizing the chance of compatibility points or disruptions to enterprise operations. Organizations can schedule software updates to happen throughout off-peak hours or take a look at updates on a subset of gadgets earlier than rolling them out to the whole fleet. A monetary establishment, for instance, may delay updates to its cell banking software till they’ve been totally examined, guaranteeing that the updates don’t introduce any safety vulnerabilities or disrupt buyer entry.

See also  7+ Ways: Change Facebook Layout on Android (Easy!)

The utilization of Managed Google Play considerably enhances the safety and manageability of Android gadgets enrolled via Intune. By offering a managed surroundings for software deployment and administration, organizations can cut back the chance of malware, implement safety insurance policies, and streamline the consumer expertise, guaranteeing that enrolled gadgets are each safe and productive.

Regularly Requested Questions

The next questions deal with frequent considerations and misconceptions concerning the method of registering Android gadgets with the Microsoft Intune administration platform.

Query 1: Is it obligatory to enroll an Android system to entry company electronic mail?

Enrollment is commonly a requirement for accessing company electronic mail. The group’s safety insurance policies could dictate that solely managed gadgets can entry delicate company knowledge. With out enrollment, the system could not meet the safety necessities mandated for knowledge entry.

Query 2: What knowledge is collected when an Android system is enrolled?

The information collected sometimes consists of system {hardware} data, working system model, put in purposes, and community particulars. The group can view this data to implement safety insurance policies and guarantee compliance. Private knowledge, comparable to images and private emails, are usually not accessed or monitored.

Query 3: What occurs if an enrolled Android system turns into non-compliant?

If a tool turns into non-compliant, entry to company assets could also be restricted or blocked. The system could also be flagged as non-compliant as a consequence of outdated working techniques, lacking safety patches, or the absence of a passcode. The consumer will sometimes obtain directions on learn how to remediate the problem and regain compliance.

Query 4: Can the group remotely wipe an enrolled Android system?

Distant wipe capabilities can be found for enrolled gadgets, permitting the group to erase company knowledge within the occasion of loss, theft, or termination of employment. This performance helps defend delicate knowledge from unauthorized entry. The group could have the choice to carry out a full wipe (manufacturing facility reset) or a selective wipe (eradicating solely company knowledge).

Query 5: What occurs to the Android system whether it is unenrolled from Intune?

Unenrolling the system removes it from the group’s administration. Company knowledge and purposes could also be faraway from the system. The system will now not be topic to the group’s safety insurance policies or configuration profiles. Entry to company assets will likely be revoked.

Query 6: Is it doable to enroll a number of Android gadgets beneath a single consumer account?

The power to enroll a number of gadgets beneath a single consumer account is usually supported, though a corporation could impose restrictions. Every enrolled system is managed independently, and insurance policies are utilized to every system based mostly on its configuration and compliance standing.

Profitable registration of Android gadgets inside Intune is pivotal to safeguarding a corporation’s assets and data. Understanding the small print concerning registration, gathered data, repercussions for non-adherence, distant wiping capabilities, and administration of software upgrades and safety is key. It’s important to have the ability to effectively handle cell gadgets and supply a protected surroundings.

The succeeding part will discover superior troubleshooting steps for frequent enrollment errors and configuration points.

Suggestions for Profitable Android System Enrollment with Intune

Reaching seamless Android system registration with Microsoft Intune requires cautious planning and execution. The following tips supply steerage to reduce disruptions and maximize the effectiveness of the enrollment course of.

Tip 1: Confirm System Compatibility Previous to Enrollment: Make sure the goal Android system meets the minimal working system necessities and {hardware} specs outlined by Microsoft Intune. Incompatible gadgets will possible encounter enrollment failures or restricted administration capabilities.

Tip 2: Make the most of a Staging Atmosphere for Testing: Implement a staging surroundings to pilot enrollment procedures and take a look at configuration profiles earlier than deploying them to the whole group. This permits for the identification and determination of potential points in a managed setting.

Tip 3: Correctly Configure Enrollment Restrictions: Outline enrollment restrictions to regulate which system sorts and working techniques might be registered with Intune. This prevents the enrollment of unauthorized gadgets and maintains a constant safety posture.

Tip 4: Leverage Enrollment Profiles for Automation: Make the most of enrollment profiles to automate the configuration course of and cut back the necessity for handbook intervention. These profiles streamline system configuration and guarantee adherence to organizational requirements.

Tip 5: Educate Finish-Customers on the Enrollment Course of: Present clear and concise directions to end-users on learn how to enroll their Android gadgets. This minimizes consumer errors and reduces the burden on IT assist assets.

Tip 6: Implement Conditional Entry Insurance policies: Implement Conditional Entry insurance policies to limit entry to company assets based mostly on system compliance and consumer identification. This protects delicate knowledge from unauthorized entry and ensures that solely compliant gadgets can entry organizational assets.

Tip 7: Frequently Monitor System Compliance: Set up a monitoring system to trace system compliance and establish gadgets that fall exterior of established safety requirements. Promptly deal with non-compliant gadgets to mitigate potential safety dangers.

The following tips present a framework for optimizing the Android system enrollment course of with Intune. Implementing these suggestions will contribute to a safer and effectively managed cell surroundings.

The ultimate part of this text will discover superior configurations for enhancing safety.

Conclusion

The profitable execution of “enroll android system intune” is paramount for organizations in search of to safe and handle their cell workforce. This text has explored the multifaceted elements of this course of, from system compatibility and the essential function of the Firm Portal, to the enforcement of compliance insurance policies and the strategic implementation of configuration profiles. Key concerns embody a strong understanding of Conditional Entry and the importance of a well-defined safety posture, all underpinned by the managed surroundings supplied by Managed Google Play.

The complexities inherent in cell system administration necessitate a proactive and knowledgeable strategy. Organizations should regularly adapt their methods to deal with evolving safety threats and make sure the ongoing safety of delicate knowledge. The diligent implementation of those pointers and a dedication to steady monitoring will empower organizations to confidently navigate the challenges of a mobile-first world and keep a safe and productive surroundings.

Leave a Comment