You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/fundamentals/get-started-with-intune.md
+44-26Lines changed: 44 additions & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,13 +1,13 @@
1
1
---
2
2
# required metadata
3
3
4
-
title: Getting started with Microsoft Intune
5
-
description: Learn about the Microsoft Intunedeployment, enrollment, configuration, policies, service updates, and more.
4
+
title: Get started with Microsoft Intune
5
+
description: See an overview of the steps to start using Intune. Plan your move and deployment of Intune, determine your licensing needs and any platform requirements, use compliance and conditional access, deploy apps, create device configuration profiles, and enroll your devices to be managed. Get more information on mobile application management for BYOD or personal devices.
6
6
keywords:
7
7
author: MandiOhlinger
8
8
ms.author: mandia
9
9
manager: dougeby
10
-
ms.date: 09/29/2022
10
+
ms.date: 09/30/2022
11
11
ms.topic: overview
12
12
ms.service: mem
13
13
ms.subservice: fundamentals
@@ -34,12 +34,20 @@ ms.collection:
34
34
35
35
# Get started with Microsoft Intune
36
36
37
-
As part of your Microsoft 365 license, you also get Microsoft Intune for cloud-based app management, device management, and security.
37
+
Microsoft Intune is a cloud-based service that helps you manage your devices and apps. For more information about what Microsoft Intune can do for your organization, go to [What is Microsoft Intune](what-is-intune.md).
38
38
39
-
This article provides an overview of the Microsoft Intune architecture, deployment, enrollment, configuration, policies, service updates, and more.
39
+
This article provides an overview of the steps so you can start using Intune, including:
40
40
41
+
- Step 1: Plan your move and deployment of Intune
42
+
- Step 2: Determine your licensing needs and any platform requirements
43
+
- Step 3: Set up Intune
44
+
- Step 4: Use compliance and conditional access
45
+
- Step 5: Deploy apps
46
+
- Step 6: Create device configuration profiles
47
+
- Step 7: Enroll your devices to be managed
48
+
- Protect organization app data on personal devices
41
49
42
-
For more information about what Microsoft Intune can do for your organization, go to [What is Microsoft Intune](what-is-intune.md).
50
+
It's also a good practice to review the [Planning guide to move to Microsoft Intune](intune-planning-guide.md) before you get started.
43
51
44
52
## Cloud attach with Configuration Manager
45
53
@@ -50,15 +58,15 @@ There are two steps to cloud attach your on-premises devices:
50
58
1.[Tenant attach](../../configmgr/tenant-attach): Register your Intune tenant with your Configuration Manager deployment. Your Configuration Manager devices are shown in the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431). On these devices, you can run different actions, including installing apps and run Windows PowerShell scripts using the admin center.
51
59
2.[Co-management](../../configmgr/comanage): Manage Windows client devices with Configuration Manager and Microsoft Intune. Some workloads are managed by Configuration Manager, and some workloads are managed by Intune. For example, you can use Configuration Manager to manage Windows updates, and use Intune to manage conditional access policies.
52
60
53
-
If you currently use Configuration Manager, you get immediate value through tenant attach and you get more value through co-management.
61
+
If you currently use Configuration Manager, you get immediate value through tenant attach, and you get more value through co-management.
54
62
55
63
## Step 1 - Plan your Intune deployment
56
64
57
65
A successful adoption or migration to Microsoft Intune starts with a plan. Your plan depends on your organization's current device management solution, business goals, and technical requirements.
58
66
59
-
Intune gives you options to manage access to your organization using Mobile Device Management (MDM) or Mobile Application Management (MAM). MDM is when users "enroll" their devices in Intune. Once enrolled, they are managed devices, and can receive any policies, rules, and settings used by your organization. For example, you can install specifics apps, create a password policy, install a VPN connection, and more.
67
+
Intune gives you options to manage access to your organization using Mobile Device Management (MDM) or Mobile Application Management (MAM). MDM is when users "enroll" their devices in Intune. Once enrolled, they're managed devices, and can receive any policies, rules, and settings used by your organization. For example, you can install specifics apps, create a password policy, install a VPN connection, and more.
60
68
61
-
If users with their own personal devices will access organization resources, then you need to protect any apps that access your organization data using MAM, at the very least. You can create MAM policies for Outlook, Teams, SharePoint, and other apps.
69
+
If users with their own personal devices will access organization resources, then you need to protect any apps that access your organization data using MAM, at a minimum. You can create MAM policies for Outlook, Teams, SharePoint, and other apps.
62
70
63
71
To help you plan your Intune deployment, use the [Planning guide to move to Microsoft Intune](intune-planning-guide.md). It covers personal devices, licensing considerations, creating a rollout plan, communicating changes to your users, and more.
64
72
@@ -81,7 +89,7 @@ The next step is to determine your license needs and any other prerequisites for
81
89
82
90
-**Intune subscription**: Included with some Microsoft 365 subscriptions. It also gives you access to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), which is a web-based console for managing your devices, apps, and users.
83
91
-**Microsoft 365 apps**: Included with Microsoft 365 and is used for productivity apps, including Outlook and Teams.
84
-
-**Azure Active Directory (Azure AD) premium**: Included with some Microsoft 365 subscriptions. Azure AD is used for the identity management for users, groups, and devices, which comes with your Intune and Microsoft 365 subscription. Azure AD Premium gives you additional features commonly used by organizations, including conditional access, multi factor authentication (MFA), and dynamic groups.
92
+
-**Azure Active Directory (Azure AD) premium**: Included with some Microsoft 365 subscriptions. Azure AD is used for the identity management for users, groups, and devices, which comes with your Intune and Microsoft 365 subscription. Azure AD Premium gives you more features commonly used by organizations, including conditional access, multi factor authentication (MFA), and dynamic groups.
85
93
-**Windows Autopilot**: Included with some Microsoft 365 subscriptions. Windows Autopilot gives you modern OS deployment for Windows 10/11 client devices.
86
94
-**Platform specific prerequisites**: Depending on the platforms of your devices, there will probably be other requirements. For example, if you manage iOS/iPadOS and macOS devices, you need an Apple MDM push certificate and possibly an Apple token. If you're managing Android devices, you may need a managed Google Play account. If you're using certificate authentication, you may need a SCEP or PKCS certificate.
87
95
@@ -109,7 +117,7 @@ This step focuses on setting up Intune and getting it ready for you to manage yo
109
117
110
118
3.**[Sign in to Intune](account-sign-up.md)**. When you sign in, you may be prompted to enter information about your organization. Intune can be opened directly from the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) or the [Microsoft 365 admin center](https://go.microsoft.com/fwlink/p/?linkid=2024339).
111
119
112
-
4.**[Choose your mobile device management configuration](mdm-authority-set.md)**. The first time you use Intune, you must enable device management. Intune can be used as a cloud-only service, a hybrid with Intune and Microsoft Endpoint Configuration Manager, or Basic Mobility and Security for Microsoft 365. You can choose the setup that works best for your organization.
120
+
4.**[Choose your mobile device management configuration](mdm-authority-set.md)**. The first time you use Intune, you must enable device management. Intune can be used as a cloud-only service, hybrid with Intune and Configuration Manager, or Basic Mobility and Security for Microsoft 365. You can choose the setup that works best for your organization.
113
121
114
122
5.**[Add users](users-add.md)** and **[add groups](groups-add.md)**.
115
123
@@ -135,7 +143,7 @@ If you prefer, you can enroll your devices before checking compliance. It's up t
135
143
136
144
In the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), you create your policies and assign them to your groups. As a best practice, start small, and use a staged approach. For example, create an iOS/iPadOS policy that blocks jailbroken devices. Apply the policy to a pilot or test group. After initial testing, add more users to the pilot group. For more guidance, go to the [Microsoft Intune planning guide](intune-planning-guide.md).
137
145
138
-
The following articles can help you understand how to create & monitor compliance policies in Intune, how to integrate with mobile threat defense (MTD) services & network access control (NAC) solutions, and use conditional access:
146
+
The following articles can help:
139
147
140
148
-[Get started with device compliance policies in Microsoft Intune](../protect/device-compliance-get-started.md)
141
149
-[Create a compliance policy in Microsoft Intune](../protect/create-compliance-policy.md)
@@ -169,9 +177,9 @@ The following articles can help:
169
177
170
178
## Step 6 - Configure device features
171
179
172
-
Your organization may have a base set of device features that should be configured or should be blocked. These are called device configuration policies or profiles. You can create device configuration policies that add a VPN connection, block access to personal cloud storage, turn off bluetooth discovery, and more. You can also configure device features that help protect your organization's devices, including requiring device encryption and requiring strong passcodes.
180
+
Your organization may have a base set of device features that should be configured or should be blocked. These settings are added to device configuration policies. You can create device configuration policies that add a VPN connection, block access to personal cloud storage, turn off bluetooth discovery, and more. You can also configure device features that help protect your organization's devices, including requiring device encryption and requiring strong passcodes.
173
181
174
-
You can use Intune to configure these device features before users enroll their devices. When users enroll their devices, these device features can be automatically configured and ready to use.
182
+
You can use Intune to configure these device features before users enroll their devices. When users enroll their devices, these device features can be automatically configured, and ready to use.
175
183
176
184
If you prefer, you can enroll your devices before creating device configuration policies. It's up to you. When users enroll their devices in Intune, the enrollment process can install your device configuration policies, like a VPN connection. When enrollment completes, the feature is ready to use. For key device configuration features, such as VPN or Wi-Fi, Microsoft recommends creating the policies and then deploying these policies during enrollment.
177
185
@@ -196,9 +204,9 @@ The following articles can help:
196
204
197
205
## Step 7 - Enroll your devices
198
206
199
-
To manage devices, the devices must be enrolled in Intune to receive the compliance & conditional access policies, app policies, device configuration policies, and security policies you create. As an admin, you create enrollment policies for your users and devices. Each device platform (Android, iOS/iPadOS, macOS, and Windows) has a variety of enrollment options. You choose what's best for your environment, your scenarios, and your devices.
207
+
To manage devices, the devices must be enrolled in Intune to receive the compliance & conditional access policies, app policies, device configuration policies, and security policies you create. As an admin, you create enrollment policies for your users and devices. Each device platform (Android, iOS/iPadOS, macOS, and Windows) has various enrollment options. You choose what's best for your environment, your scenarios, and how your devices are used.
200
208
201
-
Depending on the enrollment option you choose, it's possible users can enroll themselves. Or, you can automate enrollment so users simply sign in to the device with their organization account.
209
+
Depending on the enrollment option you choose, users can enroll themselves. Or, you can automate enrollment so users only need to sign in to the device with their organization account.
202
210
203
211
When a device enrolls, it's issued a secure MDM certificate. This certificate communicates with the Intune service.
204
212
@@ -214,29 +222,39 @@ Different platforms have different enrollment requirements. The following articl
214
222
215
223
## Protect organization app data on personal devices
216
224
217
-
It's common for users to access their organization email & calendar, attend work meetings, and use other organization apps on their personal devices. To help keep organization data secure on these devices, you can use app protection policies and multifactor authentication (MFA). App protection policies help protect organization data on personal devices. MFA helps protect your organization's data from unauthorized access.
225
+
It's common for users to access their organization email & calendar, attend work meetings, and use other organization apps on their personal devices. To help keep organization data secure on these devices, you can use app protection policies and multi-factor authentication (MFA). App protection policies help protect organization data on personal devices. MFA helps protect your organization's data from unauthorized access.
226
+
227
+
Intune's app protection policies are part of a mobile application management (MAM) approach designed to protect organization app data on personal devices. These app protection policies can also be used on devices enrolled Intune, or enrolled and managed by a third party partner MDM solution. This scenario is more common for apps that need an extra layer of security, including apps that have sensitive data.
218
228
219
-
Intune's app protection policies are part of a mobile application management (MAM) approach designed to protect organization app data on personal devices. These app protection policies can also be used on devices that are enrolled and managed by Intune, or enrolled and managed by a third party partner MDM solution. This scenario is more common for apps that need an extra layer of security, including apps that have sensitive data.
229
+
The [Microsoft Intune planning guide](intune-planning-guide.md) has some guidance on managing access on BYOD or personal devices.
220
230
231
+
There's an official list of Microsoft apps and supported third party partner apps that support app protection policies. See the official list at [Microsoft Intune protected apps](../apps/apps-supported-intune-apps.md).
221
232
222
-
You can use mobile application management (MAM) in Intune to help protect sensitive data that's accessed from managed applications. See the official list of [Microsoft Intune protected apps](../apps/apps-supported-intune-apps.md) available for public use.
233
+
MFA is a feature of Azure AD that must be enabled in your Azure AD tenant. Then, you can configure MFA for your apps. For more information, go to:
223
234
224
-
Intune can manage apps, including add apps, assign them to different users or groups, and review other key details. For example, you can see which apps fail to install, check the version of an app, and more.
235
+
-[How it works: Azure AD multi-factor authentication](/azure/active-directory/authentication/concept-mfa-howitworks).
236
+
-[Tutorial: Secure user sign-in events with Azure AD multi-factor authentication](/azure/active-directory/authentication/tutorial-enable-azure-mfa)
225
237
226
-
To get an overview of app protection policies and how they work, go to the following articles:
238
+
To get an overview of app protection policies and how they work, go to:
227
239
240
+
-[Deployment guide: Mobile Application Management (MAM) for unenrolled devices in Microsoft Intune](deployment-guide-enrollment-mamwe.md)
0 commit comments