Contact Us      General Enquiries: +44 (0) 1273 834 000   Support / Service Desk: +44 (0) 113 360 9696

PAV IT

  • About Us
    • PAV GDPR Statement
    • Company History
    • Careers
  • IT Certainty
    • Legal Sector
    • Manufacturing Sector
    • Customer Testimonials
    • Case Studies
  • Services
    • IT Support & Monitoring
    • Project Delivery
    • Cloud Services
    • Backup and Disaster Recovery
    • Application Packaging
  • News & Events
    • BLOG
    • Events
    • Newsletters
  • Technology Solutions
    • Communication and Collaboration
    • Modern Workspaces
    • Data and Governance
CONTACT SALESsupport
  • Home
  • Our latest Blogs
  • Blog
  • What is Microsoft Intune?
March 4, 2021

What is Microsoft Intune?

Wednesday, 09 September 2020 / Published in Blog, Microsoft

What is Microsoft Intune?

Microsoft Intune is an MDM and MAM provider for your devices

Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM). You control how your organization’s devices are used, including mobile phones, tablets, and laptops. You can also configure specific policies to control applications. For example, you can prevent emails from being sent to people outside your organization. Intune also allows people in your organization to use their personal devices for school or work. On personal devices, Intune helps make sure your organization data stays protected, and can isolate organization data from personal data.

Intune is part of Microsoft’s Enterprise Mobility + Security (EMS) suite. Intune integrates with Azure Active Directory (Azure AD) to control who has access, and what they can access. It also integrates with Azure Information Protection for data protection. It can be used with the Microsoft 365 suite of products. For example, you can deploy Microsoft Teams, OneNote, and other Microsoft 365 apps to devices. This feature enables people in your organization to be productive on all of their devices, while keeping your organization’s information protected with policies you create.

With Intune, you can:

  • Choose to be 100% cloud with Intune, or be co-managed with Configuration Manager and Intune.
  • Set rules and configure settings on personal and organization-owned devices to access data and networks.
  • Deploy and authenticate apps on devices — on-premises and mobile.
  • Protect your company information by controlling the way users access and share information.
  • Be sure devices and apps are compliant with your security requirements.

Manage Devices

In Intune, you manage devices using an approach that’s right for you. For organization-owned devices, you may want full control on the devices, including settings, features, and security. In this approach, devices and users of these devices “enroll” in Intune. Once enrolled, they receive your rules and settings through policies configured in Intune. For example, you can set password and PIN requirements, create a VPN connection, set up threat protection, and more.
For personal devices, or bring-your-own devices (BYOD), users may not want their organization administrators to have full control. In this approach, give users options. For example, users enroll their devices if they want full access to your organization resources. Or, if these users only want access to email or Microsoft Teams, then use app protection policies that require multi-factor authentication (MFA) to use these apps.

When devices are enrolled and managed in Intune, administrators can:

  • See the devices enrolled, and get an inventory of devices accessing organization resources.
  • Configure devices so they meet your security and health standards. For example, you probably want to block jailbroken devices.
  • Push certificates to devices so users can easily access your Wi-Fi network, or use a VPN to connect to your network.
  • See reports on users and devices that are compliant, and not compliant.
  • Remove organization data if a device is lost, stolen, or not used anymore.

Manage Apps

Mobile application management (MAM) in Intune is designed to protect organization data at the application level, including custom apps and store apps. App management can be used on organization-owned devices, and personal devices.

When apps are managed in Intune, administrators can:

  • Add and assign mobile apps to user groups and devices, including users in specific groups, devices in specific groups, and more.
  • Configure apps to start or run with specific settings enabled, and update existing apps already on the device.
  • See reports on which apps are used, and track their usage.
  • Do a selective wipe by removing only organization data from apps.

One way that Intune provides mobile app security is through app protection policies. App protection policies:

  • Use Azure AD identity to isolate organization data from personal data. So personal information is isolated from organizational IT awareness. Data accessed using organization credentials are given additional security protection.
  • Help secure access on personal devices by restricting actions users can take, such as copy-and-paste, save, and view.
  • Can be created and deployed on devices that are enrolled in Intune, enrolled in another MDM service, or not enrolled in any MDM service. On enrolled devices, app protection policies can add an extra layer of protection.

For example, a user signs in to a device with their organization credentials. Their organization identity allows access to data that’s denied to their personal identity. As that organization data is used, app protection policies control how the data is saved and shared. When users sign in with their personal identity, those same protections aren’t applied. In this way, IT has control of organization data, while end users maintain control and privacy over their personal data.

For more details CLICK HERE

Tagged under: Microsoft

What you can read next

Why Good Network Management Is More Important Than Ever
Integrating Security Products Is Vital For Cyber Resilience
Does your network keep you up at night?

Recent Posts

  • Introducing SecureX

    Making Security an Enabler, so Your Business Ca...
  • The Reality of Delivering Successful Productivity and Automation Projects

    Productivity and Automation projects have been ...
  • Improving Threat Detection Through Integration

    The Value Of Cybersecurity Tools Can Be Greater...
  • Small Businesses are Facing Big Cybersecurity Challenges in 2021

    Lots of things have changed in the past year, b...
  • Designing in Automation and Productivity to Support the Modern Workplace

    With the advent of WFA (work from anywhere), th...

Categories

  • Blog
  • Cisco
  • Events
  • IT Certainty
  • IT's About Time
  • Microsoft
  • Networking
  • News
  • Newsletters
  • Other News

A leading IT infrastructure solution and support provider that has been delivering flexible and modular solutions and consultancy to businesses across the UK since 1988.

GET IN TOUCH

  • General Enquiries: +44 (0)1273 834 000
  • Support Desk: +44 (0)1273 834 433
  • Email: info@pav.co.uk
  • PAV I.T. Services
  • Mending Rooms, Sunny Bank Mills, Farsley,
  • Pudsey, West Yorkshire, LS28 5UJ
  • View on Google Maps
  • About Us
    • PAV GDPR Statement
    • Company History
    • Careers
  • IT Certainty
    • Legal Sector
    • Manufacturing Sector
    • Customer Testimonials
    • Case Studies
  • Services
    • IT Support & Monitoring
    • Project Delivery
    • Cloud Services
    • Backup and Disaster Recovery
    • Application Packaging
  • News & Events
    • BLOG
    • Events
    • Newsletters
  • Technology Solutions
    • Communication and Collaboration
    • Modern Workspaces
    • Data and Governance

Pav IT © 2019 All rights reserved.

  • GET SOCIAL
TOP