What is Microsoft Intune (2024)

  • Article

As organizations support hybrid and remote workforces, they're challenged with managing the different devices that access organization resources. Employees and students need to collaborate, work from anywhere, and securely access and connect to these resources. Admins need to protect organization data, manage end user access, and support users from wherever they work.

To help with these challenges and tasks, use Microsoft Intune.

What is Microsoft Intune (1)

Microsoft Intune is a cloud-based endpoint management solution. It manages user access to organizational resources and simplifies app and device management across your many devices, including mobile devices, desktop computers, and virtual endpoints.

You can protect access and data on organization-owned and users personal devices. And, Intune has compliance and reporting features that support the Zero Trust security model.

This article lists some features and benefits of Microsoft Intune.

Tip

Key features and benefits

Some key features and benefits of Intune include:

Learn how you can benefit from modern endpoint management with Microsoft Intune.

Integrates with other Microsoft services and apps

Microsoft Intune integrates with other Microsoft products and services that focus on endpoint management, including:

Integrates with third party partner devices and apps

The Intune admin center makes it easy to connect to different partner services, including:

With these services, Intune:

  • Gives admins simplified access to third party partner app services.
  • Can manage hundreds of third party partner apps.
  • Supports public retail store apps, line of business (LOB) apps, private apps not available in the public store, custom apps, and more.

For more platform-specific requirements to enroll third party partner devices in Intune, go to:

Enroll in device management, application management, or both

Organization-owned devices are enrolled in Intune for mobile device management (MDM). MDM is device centric, so device features are configured based on who needs them. For example, you can configure a device to allow access to Wi-Fi, but only if the signed-in user is an organization account.

In Intune, you create policies that configure features & settings and provide security & protection. The devices are fully managed by your organization, including the user identities that sign in, the apps that are installed, and the data that's accessed.

When devices enroll, you can deploy your policies during the enrollment process. When enrollment completes, the device is ready to use.

For personal devices in bring-your-own-device (BYOD) scenarios, you can use Intune for mobile application management (MAM). MAM is user centric, so the app data is protected regardless of the device used to access this data. There's a focus on apps, including securely accessing apps and protecting data within the apps.

With MAM, you can:

  • Publish mobile apps to users.
  • Configure apps and automatically update apps.
  • View data reports that focus on app inventory and app usage.

You can also use MDM and MAM together. If your devices are enrolled and there are apps that need extra security, then you can also use MAM app protection policies.

For more information, go to:

Protect data on any device

With Intune, you can protect data on managed devices (enrolled in Intune) and protect data on unmanaged devices (not enrolled in Intune). Intune can isolate organization data from personal data. The idea is to protect your company information by controlling the way users access and share information.

For organization-owned devices, you want full control over the devices, especially security. When devices enroll, they receive your security rules and settings.

On devices enrolled in Intune, you can:

  • Create and deploy policies that configure security settings, set password requirements, deploy certificates, and more.
  • Use mobile threat defense services to scan devices, detect threats, and remediate threats.
  • View data and reports that measure compliance with your security settings and rules.
  • Use conditional access to only allow managed and compliant devices access to organization resources, apps, and data.
  • Remove organization data if a device is lost or stolen.

For personal devices, users might not want their IT admins to have full control. To support a hybrid work environment, give users options. For example, users enroll their devices if they want full access to your organization's resources. Or, if these users only want access to Outlook or Microsoft Teams, then use app protection policies that require multi-factor authentication (MFA).

On devices using application management, you can:

  • Use mobile threat defense services to protect app data by scanning devices, detecting threats, and assessing risk.
  • Prevent organization data from being copied and pasted into personal apps.
  • Use app protection policies on apps and on unmanaged devices enrolled in a third party or partner MDM.
  • Use conditional access to restrict the apps that can access organization email and files.
  • Remove organization data within apps.

For more information, go to:

Simplify access

Intune helps organizations support employees who can work from anywhere. There are features you can configure that allow users to connect to an organization, wherever they might be.

This section includes some common features that you can configure in Intune.

Use Windows Hello for Business instead of passwords

Windows Hello for Business helps protect against phishing attacks and other security threats. It also helps users sign in to their devices and apps more quickly and easily.

Windows Hello for Business replaces passwords with a PIN or biometric, such as fingerprint or facial recognition. This biometric information is stored locally on the devices and is never sent to external devices or servers.

For more information, go to:

Create a VPN connection for remote users

VPN policies give users secure remote access to your organization network.

Using common VPN connection partners, including Check Point, Cisco, Microsoft Tunnel, NetMotion, Pulse Secure, and more, you can create a VPN policy with your network settings. When the policy is ready, you deploy this policy to your users and devices that need to connect to your network remotely.

In the VPN policy, you can use certificates to authenticate the VPN connection. When you use certificates, your end users don't need to enter usernames and passwords.

For more information, go to:

Create a Wi-Fi connection for on-premises users

For users who need to connect to your organization network on-premises, you can create a Wi-Fi policy with your network settings. You can connect to a specific SSID, select an authentication method, use a proxy, and more. You can also configure the policy to automatically connect to Wi-Fi when the device is in range.

In the Wi-Fi policy, you can use certificates to authenticate the Wi-Fi connection. When you use certificates, your end users don't need to enter usernames and passwords.

When the policy is ready, you deploy this policy to your on-premises users and devices that need to connect to your on-premises network.

For more information, go to:

Enable single sign-on (SSO) to your apps and services

When you enable SSO, users can automatically sign in to apps and services using their Microsoft Entra organization account, including some mobile threat defense partner apps.

Specifically:

Next steps

I'm a seasoned expert in endpoint management and cloud-based solutions, particularly Microsoft Intune. My extensive knowledge stems from hands-on experience and a deep understanding of the evolving landscape of remote and hybrid workforces.

The article dated 09/05/2023 discusses the challenges organizations face in managing diverse devices accessing organizational resources in the context of hybrid and remote work environments. To address these challenges, the article recommends using Microsoft Intune, a cloud-based endpoint management solution. Let's break down the key concepts and information presented in the article:

  1. Microsoft Intune Overview:

    • Microsoft Intune is a cloud-based endpoint management solution designed to manage user access to organizational resources and simplify app and device management across various devices.
    • It supports a wide range of operating systems, including Android, iOS/iPadOS, Linux Ubuntu Desktop, macOS, and Windows client devices.
  2. Key Features and Benefits:

    • Manages both organization-owned and personally owned devices.
    • Simplifies app management with features such as app deployment, updates, and removal.
    • Automates policy deployment for apps, security, device configuration, compliance, conditional access, and more.
    • Offers self-service features through the Company Portal app for users to perform tasks like password resets and app installations.
    • Integrates with mobile threat defense services, including Microsoft Defender for Endpoint, for enhanced endpoint security.
  3. Admin Center and Microsoft Graph Integration:

    • Utilizes a web-based admin center for endpoint management, accessible from any device with internet access.
    • Relies on Microsoft Graph REST APIs for programmatic access to the Intune service, making every action in the admin center a Microsoft Graph call.
  4. Microsoft Intune Suite:

    • The Microsoft Intune Suite provides advanced endpoint management and security, offering optional add-on features such as Remote Help, Endpoint Privilege Management, Microsoft Tunnel for MAM, and more.
  5. Integration with Other Microsoft Services:

    • Integrates with other Microsoft services like Configuration Manager, Windows Autopilot, Endpoint analytics, Microsoft 365, and Microsoft Defender for Endpoint.
  6. Third-Party Integrations:

    • Connects with third-party partner devices and apps, including Managed Google Play, Apple tokens and certificates, and TeamViewer.
  7. Device Management and Application Management:

    • Supports device enrollment for organization-owned devices using mobile device management (MDM).
    • Offers mobile application management (MAM) for personal devices in bring-your-own-device (BYOD) scenarios, focusing on app data protection.
  8. Data Protection:

    • Allows the protection of data on both managed and unmanaged devices by isolating organization data from personal data.
    • Implements security rules, conditional access, and compliance policies to ensure data security.
  9. Access Management:

    • Configures features like Windows Hello for Business, VPN connections, Wi-Fi connections, and single sign-on (SSO) to simplify user access to organizational resources.

This comprehensive overview showcases Microsoft Intune's capabilities in addressing the complexities of managing devices in a hybrid and remote work environment. The platform's integration with various Microsoft services and third-party solutions makes it a robust choice for organizations seeking efficient endpoint management and data protection.

What is Microsoft Intune (2024)

FAQs

What is the purpose of Microsoft Intune? ›

Microsoft Intune is a cloud-based endpoint management solution. It manages user access to organizational resources and simplifies app and device management across your many devices, including mobile devices, desktop computers, and virtual endpoints.

What can Microsoft Intune be used for? ›

The service allows you to set rules and configure settings on personal and organization-owned devices to access data and networks. Intune also integrates with Microsoft Entra ID (formerly Azure Active Directory) for identity and access management and Azure Information Protection for data protection.

Why is Intune required? ›

Intune enables organizations to manage and secure mobile devices used by employees to access corporate resources. IT administrators can enforce security policies, deploy business applications, and protect sensitive data on managed mobile devices, ensuring compliance with corporate standards and regulatory requirements.

What is Microsoft Intune for dummies? ›

Microsoft Intune is a strategic infrastructure for managing and protecting an organization's endpoints, which include the organization's devices, apps, and data.

Can Intune track browsing history? ›

Intune doesn't collect nor allow an Admin to see the following data: An end users' calling or web browsing history. Personal email. Text messages.

What happens if I delete Intune? ›

The most important and direct effect of removing a user from Intune is that the user isn't able to access corporate data via that device. Besides that, that device is no longer available in the Company Portal app for the user, and the user isn't able to install any corporate apps on it.

Is Microsoft Intune a monitoring tool? ›

In Intune, you can create a Windows Health Monitoring device configuration profile to enable this data collection, and then deploy this profile to your devices. Use this profile as part of your mobile device management (MDM) solution to optimize your Windows devices.

Why would a company choose to use Microsoft Intune? ›

☑️ Microsoft Intune helps you keep your employees secure while staying productive. ☑️ Through Office 365 mobile app management, you can set policies to control access to your corporate data. ☑️ Microsoft Intune provides flexibility and control for securing your data, regardless of the device.

Does Intune track app usage? ›

To view the App usage report:

Go to the Microsoft Intune admin center. Select Reports. Navigate to Microsoft Managed Desktop > Managed devices. Then, select the Reports tab.

Does Intune control your phone? ›

Intune is a cloud-based service that can control devices through policy, including security policies.

Can you turn off Intune? ›

Navigate to the Microsoft Intune admin center and go to the “Devices” page. Next, go to the “Enrollment device platform restrictions” policy page and click on the “All Users” policy to change the global policy or create a new one to disable device enrollments for a specific user group.

Is Microsoft Intune free? ›

Trying out Intune is free for 30 days. If you already have a work or school account, sign in with that account and add Intune to your subscription. Otherwise, you can sign up for a new account to use Intune for your organization. You can't combine an existing work or school account after you sign up for a new account.

What is the objective of Microsoft Intune? ›

Microsoft Intune helps you and your organization by increasing security and productivity, providing flexibility, and maximizing your management investment. Microsoft Intune provides the following: Intelligent and unified endpoint security. Flexible and unified endpoint management.

Who uses Intune? ›

Companies Currently Using Microsoft Intune
Company NameWebsiteTop Level Industry
7-Eleven7-eleven.comRetail
Walmartwalmart.comRetail
Humanahumana.comInsurance
Restaurant365restaurant365.comTechnical
2 more rows

What is Microsoft Intune called now? ›

Effective October 12, 2022, Microsoft Intune becomes the name of the endpoint management family with the name Microsoft Endpoint Manager no longer being used. Going forward, Microsoft will refer to cloud management as Microsoft Intune and on-premises management as Microsoft Configuration Manager.

What is the purpose of the Intune company portal? ›

The Intune Company Portal is a valuable tool that empowers businesses to efficiently manage devices, secure data, and improve productivity. By understanding its functions, benefits, and installation requirements, businesses can make the most of it within the Microsoft Intune ecosystem.

What does syncing with Intune do? ›

Sync the enrolled device you're using for work to get the latest updates, requirements, and communications from your organization.

What is the purpose of the Intune connector? ›

The Intune Connector for Active Directory creates autopilot-enrolled computers in the on-premises Active Directory domain. The computer that hosts the Intune Connector must have the rights to create the computer objects within the domain. In some domains, computers aren't granted the rights to create computers.

Top Articles
Fast Fashion: How It Impacts Retail Manufacturing
10 Ways To Fix A Toxic Work Environment
Toa Guide Osrs
It may surround a charged particle Crossword Clue
Shoe Game Lit Svg
Wordscapes Level 6030
80 For Brady Showtimes Near Marcus Point Cinema
The Best Classes in WoW War Within - Best Class in 11.0.2 | Dving Guides
Devourer Of Gods Resprite
The Wicked Lady | Rotten Tomatoes
Danielle Longet
Osrs Blessed Axe
Dusk
This Modern World Daily Kos
Price Of Gas At Sam's
Mbta Commuter Rail Lowell Line Schedule
2 Corinthians 6 Nlt
Free Online Games on CrazyGames | Play Now!
Copart Atlanta South Ga
Tamilyogi Proxy
Zoe Mintz Adam Duritz
Juicy Deal D-Art
U Of Arizona Phonebook
Bn9 Weather Radar
Used Patio Furniture - Craigslist
Urban Dictionary Fov
Soul Eater Resonance Wavelength Tier List
Cowboy Pozisyon
Restored Republic
Yu-Gi-Oh Card Database
lol Did he score on me ?
T&J Agnes Theaters
4083519708
KITCHENAID Tilt-Head Stand Mixer Set 4.8L (Blue) + Balmuda The Pot (White) 5KSM175PSEIC | 31.33% Off | Central Online
Honda Ruckus Fuse Box Diagram
Fifty Shades Of Gray 123Movies
Husker Football
Janaki Kalaganaledu Serial Today Episode Written Update
Www Craigslist Com Atlanta Ga
Babykeilani
Dontrell Nelson - 2016 - Football - University of Memphis Athletics
Hawkview Retreat Pa Cost
Craigslist St Helens
Vci Classified Paducah
Gander Mountain Mastercard Login
Stephen Dilbeck, The First Hicks Baby: 5 Fast Facts You Need to Know
Michaelangelo's Monkey Junction
Sams La Habra Gas Price
Is Chanel West Coast Pregnant Due Date
Scholar Dollar Nmsu
Les BABAS EXOTIQUES façon Amaury Guichon
Latest Posts
Article information

Author: Fredrick Kertzmann

Last Updated:

Views: 6306

Rating: 4.6 / 5 (66 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Fredrick Kertzmann

Birthday: 2000-04-29

Address: Apt. 203 613 Huels Gateway, Ralphtown, LA 40204

Phone: +2135150832870

Job: Regional Design Producer

Hobby: Nordic skating, Lacemaking, Mountain biking, Rowing, Gardening, Water sports, role-playing games

Introduction: My name is Fredrick Kertzmann, I am a gleaming, encouraging, inexpensive, thankful, tender, quaint, precious person who loves writing and wants to share my knowledge and understanding with you.