Microsoft Intune

Microsoft Intune is a cloud-based mobile device management and mobile application management solution. Available through Microsoft Endpoint Manager, Intune is part of Microsoft’s Enterprise Mobility + Security suite, which provides intelligent security and endpoint management.

Microsoft Intune supports laptops, desktops, tablets, and mobile phones with the following operating systems:

What does Microsoft Intune do?

As a mobile device and application management solution, Microsoft Intune:

  • Isolates personal data from company data on BYOD technology
  • Allows admins to configure and assign device usage policies with certain commands for applications
  • Deploys the Microsoft 365 suite to enrolled devices, allowing all employees to access Microsoft’s office applications
  • Enforces compliance with data protection policies and tracks whether each device is compliant with the policies it’s been assigned
  • Configures application policies and endpoint security
  • Lists all enrolled devices 
  • Provides views of device ownership, primary user, and serial number

Enterprises use Intune for company-owned devices and personal devices. To enroll a personal device as BYOD, users need to install the Company Portal application on their device. They can download it from the Microsoft Store. Microsoft Intune offers multiple ways to enroll devices, but a BYOD device will not be wiped upon enrollment, because it belongs to the employee. This necessary feature allows employees to retain all other personal data on their device.

What are the benefits of Microsoft Intune?

Intune reveals plenty of valuable information about both company devices and personal devices, including storage space, operating system version, and installed software. That allows administrators to know the device’s capacity and capabilities—for example, if they want to download more applications to a device but want to know how much more it can handle. 

Admins can remotely wipe or restart each device using Intune. If a device is reported lost or stolen, admins can protect company data by rendering the device unusable.

Intune separates personal data from company data on an employee’s personal computer or phone. Companies that employ BYOD policies avoid the costs associated with purchasing new devices for their workforce, but BYOD is also a security risk because sensitive company data resides on an outside device. The ability to contain all business applications provides better safety and flexibility for remote workers. 

Alternatives to Intune

Intune competitors and MDM providers include:

  • Jamf Pro
  • ManageEngine Mobile Device Manager Plus
  • Citrix Endpoint Management
  • Cisco Meraki
  • Miradore
  • Rippling 
  • Hexnode UEM
Jenna Phipps
Jenna Phipps
Jenna Phipps is a writer for Webopedia.com, Enterprise Storage Forum, and CIO Insight. She covers data storage systems and data management, information technology security, and enterprise software solutions.

Top Articles

List of Windows Operating System Versions & History [In Order]

The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows...

How to Create a Website Shortcut on Your Desktop

Website Shortcut on Your Desktop reviewed by Web Webster   This Webopedia guide will show you how to create a website shortcut on your desktop using...

What are the Five Generations of Computers? (1st to 5th)

Reviewed by Web Webster Each generation of computer has brought significant advances in speed and power to computing tasks. Learn about each of the...

Hotmail [Outlook] Email Accounts

Launched in 1996, Hotmail was one of the first public webmail services that could be accessed from any web browser. At its peak in...

MDM vs. MAM

The bring your own device (BYOD) phenomenon has changed how businesses interact with...

CRM Manager

A customer relationship management (CRM) manager is a person that oversees all customer...

AdamLocker Ransomware

AdamLocker ransomware, or RW.adm_64, is a screen-locking virus designed to prevent access to...