Microsoft-Intune

Securely manage identities apps and devices

Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM). You control how your organization’s devices are used, including mobile phones, tablets, and laptops.


Intune allows the people in your organization to use their personal devices for school or work. On personal devices, Intune helps make sure your organization data stays protected, and can isolate organization data from personal data. You can also configure specific policies to control applications. For example, you can prevent emails from being sent to people outside your organization.

Intune is part of Microsoft’s Enterprise Mobility + Security (EMS) suite. Intune integrates with Azure Active Directory (Azure AD) to control who has access, and what they can access. It also integrates with Azure Information Protection for data protection. It can be used with the Microsoft 365 suite of products. For example, you can deploy Microsoft Teams, OneNote, and other Microsoft 365 apps to devices. This feature enables people in your organization to be productive on all of their devices, while keeping your organization’s information protected with policies you create.

Reduce the risk of a data breach and data loss by containing the valuable customer, employee and payment information hackers are after, and simplify the processes required to make security a Business-As-Usual practice for your organisation.


Features:

When devices are enrolled and managed in Intune, administrators can:

  • See the devices enrolled, and get an inventory of devices accessing organization resources.

  • Configure devices so they meet your security and health standards. For example, you probably want to block jailbroken devices.

  • Push certificates to devices so users can easily access your Wi-Fi network, or use a VPN to connect to your network.

  • See reports on users and devices that are compliant, and not compliant.

  • Remove organization data if a device is lost, stolen, or not used anymore.