Mcore not working in BYOD mode
Mcore BYOD mode has strict baseline requirements. Confirm all of the following before proceeding.
Required checks
-
Operating system versionWindows 10 22H2+ / macOS 13+ / iOS 16+ / Android 12+. Older versions are blocked at enrollment.
-
Disk encryption enabledBitLocker (Windows), FileVault (macOS), or device encryption (mobile) must be active. Mcore will not load on unencrypted devices.
-
Screen lock / PIN setA passcode or biometric lock must be configured in device settings.
-
No jailbreak / root detectedRooted or jailbroken devices are blocked by policy. Mcore will exit silently without error.
-
Device registered in the IT portalLog in atportal.company.com/byodand confirm your device UDID/serial appears under "My Devices".
Mcore requires a valid MDM (Mobile Device Management) profile to operate in BYOD mode. A missing or expired profile is a common root cause.
Windows
- OpenSettings → Accounts → Access work or school.
- Confirm your work account appears and showsConnected to [Company] MDM.
- If missing, clickConnectand follow the enrollment flow.
- If present but showing an error, click the account →Info→Sync. Wait 60 seconds and retry Mcore.
macOS
- Go toSystem Settings → Privacy & Security → Profiles.
- A profile namedMcore BYOD Profile(or your company name) must be listed.
- If absent, re-download the enrollment package from the IT portal and run it.
- If present and markedNot Verified, remove it and re-enroll.
iOS / Android
- Open your MDM app (e.g., Intune Company Portal, Workspace ONE).
- Check that device status showsCompliant.
- If status isPendingorNon-compliant, tapCheck StatusorSync Device.
Mcore BYOD requires access to specific internal endpoints. Connectivity issues are often masked by generic "service unavailable" errors.
Required endpoints
| Endpoint | Port | Protocol | Purpose |
|---|---|---|---|
mcore-auth.company.com |
443 | HTTPS | Authentication |
mcore-api.company.com |
443 | HTTPS | Core API |
mcore-update.company.com |
443 | HTTPS | Agent updates |
ntp.company.com |
123 | UDP | Time sync (required for cert validation) |
Test connectivity
curl -v https://mcore-auth.company.com/health curl -v https://mcore-api.company.com/healthA healthy response returns HTTP 200. Any other response (timeout, SSL error, 503) indicates a network or certificate issue — not an Mcore application fault.
VPN requirements
-
Split-tunnel VPN enabledMcore BYOD traffic must route through the corporate VPN. Confirm the VPN profile includes mcore-*.company.com in its included routes.
-
VPN connected before launching McoreMcore reads network configuration at startup. Connecting VPN after launch will not work — fully close and reopen Mcore.
-
No conflicting personal VPN or proxyDisable any personal VPN or browser proxy before connecting. Conflicts cause certificate validation failures.
A corrupted or outdated Mcore agent installation can cause intermittent failures in BYOD mode that are hard to reproduce.
Check running agent version
Get-ItemProperty HKLM:\Software\Mcore | Select-Object Version, InstallDatemcore --version # Expected: mcore/4.x.x (byod-enabled)If the output does not include byod-enabled, the agent was installed without BYOD support. Uninstall and reinstall using the BYOD-specific package from the IT portal.
Verify agent service is running
Get-Service -Name "McoreAgent" | Select-Object Status, StartTypelaunchctl list | grep mcoreThe service must show as Running. If stopped, restart it:
Restart-Service McoreAgentsudo launchctl kickstart -k system/com.mcore.agentBYOD mode uses certificate-based authentication alongside your SSO credentials. Expired or missing certificates cause login failures even when credentials are correct.
Check certificate validity
security find-certificate -a -c "Mcore BYOD" ~/Library/Keychains/login.keychain-dbGet-ChildItem Cert:\CurrentUser\My | Where-Object {$_.Subject -like "*Mcore*"} | Select-Object Subject, NotAfterIf the NotAfter date has passed, or no certificate is found, request a new one from the IT portal under My Devices → Renew Certificate.
SSO / MFA issues
-
Confirm SSO session is validSign in to your SSO portal (e.g., Okta, Entra ID) in a browser first. If that fails, resolve SSO access before troubleshooting Mcore.
-
MFA method is up to dateIf you recently changed your phone or authenticator app, re-register your MFA device in the identity portal.
-
Device clock is accurateCertificate validation requires correct system time. Enable automatic time synchronisation and ensure timezone is correct.
If steps 1–5 have not resolved the issue, a stale local state or corrupted registration token is likely the cause. This step resets Mcore's BYOD identity on the device.
Full reset procedure
- Quit Mcore completely (confirm it is not running in the system tray / menu bar).
- Stop the Mcore agent service (see Step 4 commands above).
- Delete the local BYOD token store:
Remove-Item "$env:APPDATA\Mcore\byod-token" -Recurse -Force Remove-Item "$env:LOCALAPPDATA\Mcore\cache" -Recurse -Forcerm -rf ~/Library/Application\ Support/Mcore/byod-token rm -rf ~/Library/Caches/com.mcore.agent- Restart the Mcore agent service.
- Launch Mcore and sign in. The agent will automatically re-register the device.
- If prompted by MDM for device approval, check your IT portal for a pending approval notification.
Our SPORTrack platform gives you the ability to remotely monitor and manage all of your devices, across the globe. Check out the SPORTrack platform here.