|
2 | 2 |
|
3 | 3 | Many organizations need a reliable way to secure email access for employees using internet-connected devices. With Intune’s Conditional Access solution, email stays protected by ensuring only devices enrolled in Intune can access it—and there’s no need to set up a gateway machine at the edge of the network to make this happen. |
4 | 4 |
|
5 | | -Intune also supports secure access to services and apps through Intune-managed certificates, a standard VPN gateway or proxy, and [Microsoft Entra Private Access](/entra/global-secure-access/concept-private-access). There are also non-Microsoft options available, often referred to as Zero Trust Network Access (ZTNA) or Secure Access Service Edge (SASE) solutions—all helping to maintain robust security while providing flexible and secure access to resources. |
| 5 | +Intune also supports secure access to services and apps using Intune-managed certificates, a standard VPN gateway or proxy, and [Microsoft Entra Private Access](/entra/global-secure-access/concept-private-access). There are also non-Microsoft options available, often referred to as Zero Trust Network Access (ZTNA) or Secure Access Service Edge (SASE) solutions—all helping to maintain robust security while providing flexible and secure access to resources. |
6 | 6 |
|
7 | | -## Offer a BYOD policy to employees |
| 7 | + |
8 | 8 |
|
9 | | -Device enrollment isn’t practical when employees want to retain control over their personal devices, which is often the case with Bring Your Own Device (BYOD) policies. |
| 9 | +## Issue corporate-owned devices to employees |
10 | 10 |
|
11 | | -Fortunately, you can still manage apps that handle corporate data without fully controlling the employee’s device, even if those apps access both corporate and personal information. *On Windows, this capability is available exclusively through Microsoft Edge.* |
| 11 | +Windows Autopilot provides bulk provisioning and integrates with Intune for ongoing device management—streamlining deployment and management processes for large numbers of devices. For instance, when an employee powers on their new company-owned device, they go through a corporate-branded setup process where they must authenticate themselves. Once authenticated, the device is seamlessly configured with the necessary security policies, apps, and other admin configured settings. After this, the employee can launch the Intune Company Portal app to install the optional corporate apps available to them. |
12 | 12 |
|
13 | | -[App protection policies](/mem/intune/apps/app-protection-policy) help prevent data loss from unmanaged apps and storage locations. For example, Intune can block users from copying text from a corporate email profile to a personal email profile, even when both profiles are configured in Outlook Mobile. |
| 13 | +## Issue limited-use shared devices to employees |
14 | 14 |
|
15 | | - |
| 15 | +Employees sometimes use shared devices for tasks like processing sales or checking inventory. These devices typically run in kiosk mode, which restricts what the user can interact with to just a single line-of-business app. By using Intune, you can easily secure and centrally manage these devices, ensuring they’re configured to operate in kiosk mode. This provides greater control over how devices are used—giving you confidence that your systems are protected. |
16 | 16 |
|
17 | | -## Issue corporate-owned devices to employees |
| 17 | +## Explore Intune data using natural language |
18 | 18 |
|
19 | | -Windows Autopilot provides bulk provisioning and integrates with Intune for ongoing device management—streamlining deployment and management processes for large numbers of devices. For instance, when an employee powers on their new company-owned device, they go through a corporate-branded setup process where they must authenticate themselves. Once authenticated, the device is seamlessly configured with the necessary security policies. After this, the employee can launch the Intune Company Portal app to access the optional corporate apps available to them. |
| 19 | +Using natural language—in your own words—you can query and explore your Intune data. An intelligent search matches your request to query views available in Intune. |
20 | 20 |
|
21 | | -## Issue limited-use shared devices to employees |
| 21 | +Some queries can have parameter inputs that you enter, such as platform type or specific device details. Copilot provides a summary of the results and might offer recommendations based on what it finds. |
| 22 | + |
| 23 | +This feature is helpful for tasks like locating specific devices, identifying users with compliance issues, finding devices that need updates, or finding particular apps or policies. You can use these insights to support troubleshooting and decision-making. |
| 24 | + |
| 25 | +You can also take action from the query results, such as adding users or devices to groups or creating custom reports. For example, you might find devices that are noncompliant and past their grace period, add them to a group, and then target apps or policies to that group. |
| 26 | + |
| 27 | +Learn more about [Explore Intune data using natural language](/intune/intune-service/copilot/copilot-intune-explorer). |
| 28 | + |
| 29 | +## Security Copilot agents in Intune |
| 30 | + |
| 31 | +Security Copilot agents in Intune are AI-powered assistants that enhance enterprise security. They automate tasks for endpoint protection, identity management, threat intelligence, and device configuration. They help IT teams quickly address vulnerabilities, policy gaps, and emerging threats. |
| 32 | + |
| 33 | +Agents are built on Microsoft Security Copilot's generative AI and automation capabilities. They observe, reason, and act with oversight and review from your administrators. Each agent is tailored to a specific use case, operates within the Intune admin center, and uses role-based access controls. |
| 34 | + |
| 35 | +The following agents are available: |
| 36 | + |
| 37 | +- **Change Review Agent**: Evaluates the impact of approval requests in Intune and provides recommendations for actions you can take. |
| 38 | + |
| 39 | +- **Device Offboarding Agent**: Identifies stale or misaligned devices across Intune and Microsoft Entra ID, delivers actionable insights, and requires admin approval before offboarding any devices. |
22 | 40 |
|
23 | | -Employees sometimes use shared devices for tasks like processing sales or checking inventory. These devices typically run in limited-use mode, which restricts what the user can interact with to just a single line-of-business app. By using Intune, you can easily secure and centrally manage these devices, ensuring they’re configured to operate in limited-use mode. This provides greater control over how devices are used—giving you confidence that your systems are protected. |
| 41 | +- **Policy Configuration Agent**: Allows you to import documents or write instructions in plain language. The agent matches this input to settings in the Intune settings catalog, recommends appropriate values, and can help you create a policy using those settings. |
24 | 42 |
|
25 | | -## Access Microsoft 365 from unmanaged public kiosks |
| 43 | +- **Vulnerability Remediation Agent**: Uses Microsoft Defender data to monitor vulnerabilities and prioritize remediation through AI-driven risk assessments. |
26 | 44 |
|
27 | | -Sometimes employees need to use devices, apps, or browsers that you can’t manage, such as public computers at trade shows and hotel lobbies. With Intune, access to corporate email is restricted on unmanaged devices. This means that authenticated employees can't inadvertently leave corporate data on untrusted computers, helping ensure that sensitive information remains secure. |
| 45 | +Learn more about [Security Copilot agents in Intune](/intune/agents/). |
0 commit comments