Get a high-level overview of Microsoft Intune. Explore the Intune life cycle, device compliance policies, and app management.
- [Narrator] In this chapter we are going to explore Microsoft Intune, which is part of the EMS offering, but it can also be purchased a separate subscription. When we use Intune we can allow our users to use almost any device and platform to securely access our company resources and we as the IT administrators can manage this entire ecosystem. The easiest way to think about Intune is to understand the Intune lifecycle, which starts off with enrolling our devices and these can be corporate devices or your users devices.
Once the devices are enrolled we can then manage those devices, as well as the apps that are on those devices, because we managed that entire device and the apps, we can protect our data and resources, and when necessary we can delete that corporate data from the device and if the device is no longer needed we can retire it. I referred to managing the device, let's look at some of the way we can do that. Through device compliance policies we can manage the device settings, we can manage the number of devices a user can enroll.
In Intune, we may only want them to be able to enroll one device or maybe we'll allow up to five. We can require a password or PIN on the device because we know not all of our users are going to have a PIN on their device. We can encrypt the device, ensuring that that data can never be accessed by someone who is not authorized to do so. We can prevent jailbroken devices for being registered in Intune that can possibly open up some security holes that we're unaware of, and finally we can specify not only the minimum Operating System version on that device, we can also specify the maximum, reducing the burden on IT to learn a new Operating System very quickly.
Not only can we manage the device we can also manage the apps that are on that device. We can do so by assigning apps to our users and updating those apps, as well. Some applications will require configuration, when we use Intune we can supply that configuration on behalf of the user, reducing errors and calls to the help desk. Intune will allow us to keep our corporate data secure on that personal device and we can remove that corporate data when required. This is a very quick overview of Intune.
During the next several lessons we'll be exploring Intune, in depth.
- Configuring Azure Multi-Factor Authentication
- Configuring conditional access
- Managing roles in Privileged Identity Management
- Using Azure Information Protection to protect Word documents
- Tracking and revoking documents
- Configuring mobile apps
- Configuring device compliance policies
- Reviewing device settings in Intune