You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/fundamentals/what-is-intune.md
+12-8Lines changed: 12 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,14 +34,18 @@ ms.collection:
34
34
35
35
As organizations move to support hybrid and remote workforces, they're challenged with managing the different devices that access organization resources. Employees and students need to collaborate, work from anywhere, and securely access and connect to these resources. Admins need to protect organization data, manage end user access, and support users from wherever they work.
36
36
37
-
To help with these challenges and tasks, use Microsoft Intune. Microsoft Intune is a cloud-based unified endpoint management solution that simplifies management across multiple operating systems, cloud, on-premises, mobile, desktop, and virtualized endpoints. The tool also supports data protection on company-owned and bring your own devices through non-intrusive mobile application management. It empowers organizations to provide data protection and endpoint compliance that supports a Zero Trust security model. Intune brings together device visibility, endpoint security, and data-driven insights to increase IT efficiency and improve user experiences in hybrid work environments.
37
+
To help with these challenges and tasks, use Microsoft Intune.
38
38
39
-
For more information on what it means to be cloud-native, go to [Learn more about cloud-native endpoints](../../solutions/cloud-native-endpoints/cloud-native-endpoints-overview.md).
39
+
Microsoft Intune is a cloud-based endpoint management solution. It manages user access and simplifies app & device management across your many devices, including mobile devices, desktop computers, and virtual endpoints.
40
+
41
+
You can protect access and data on organization-owned and users personal devices. And, Intune has compliance and reporting features that support a [Zero Trust security model](/security/zero-trust/zero-trust-overview).
40
42
41
43
This article lists some features and benefits of Microsoft Intune.
42
44
43
45
> [!TIP]
44
-
> To get Intune, go to [Licenses available for Microsoft Intune](licenses.md) and [Intune 30-day trial](free-trial-sign-up.md).
46
+
>
47
+
> - To get Intune, go to [Licenses available for Microsoft Intune](licenses.md) and [Intune 30-day trial](free-trial-sign-up.md).
48
+
> - For more information on what it means to be cloud-native, go to [Learn more about cloud-native endpoints](../../solutions/cloud-native-endpoints/cloud-native-endpoints-overview.md).
45
49
46
50
## Key features and benefits
47
51
@@ -67,11 +71,11 @@ Some key features and benefits of Intune include:
67
71
68
72
For more information, go to [Configure the Intune Company Portal apps, Company Portal website, and Intune app](../apps/company-portal-app.md).
69
73
70
-
- Intune **integrates with mobile threat defense** services, including Microsoft Defender for Endpoint and third party partner services. With these services, you can create policies that respond to threats, do real-time risk analysis, and automate remediation.
74
+
- Intune **integrates with mobile threat defense** services, including Microsoft Defender for Endpoint and third party partner services. With these services, the focus is on endpoint security and you can create policies that respond to threats, do real-time risk analysis, and automate remediation.
71
75
72
76
For more information, go to [Mobile Threat Defense integration with Intune](../protect/mobile-threat-defense.md).
73
77
74
-
- You **use a web-based admin center** that focuses on endpoint management. Admins can sign into the Endpoint Manager admin center from any device that has internet access.
78
+
- You **use a web-based admin center** that focuses on endpoint management, including data-driven reporting. Admins can sign into the Endpoint Manager admin center from any device that has internet access.
75
79
76
80
For more information, go to [Walkthrough the Endpoint Manager admin center](tutorial-walkthrough-endpoint-manager.md). To sign in to the admin center, go to [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
77
81
@@ -102,7 +106,7 @@ Microsoft Intune integrates with other Microsoft products and services that focu
102
106
103
107
-**[Endpoint analytics](../../analytics/overview.md)** for visibility and reporting on end user experiences, including device performance and reliability
104
108
105
-
You can use Endpoint analytics to help identify policies or hardware issues that slow down devices. It also provides guidance that can help you proactively make improvements and reduce help desk tickets.
109
+
You can use Endpoint analytics to help identify policies or hardware issues that slow down devices. It also provides guidance that can help you proactively improve end user experiences and reduce help desk tickets.
106
110
107
111
For more specific information, go to:
108
112
@@ -194,7 +198,7 @@ For more information, go to:
194
198
195
199
## Protect data on any device
196
200
197
-
With Intune, you can **protect data on managed devices** (enrolled in Intune) and **protect data unmanaged devices** (not enrolled in Intune). Intune can isolate organization data from personal data. The idea is to protect your company information by controlling the way users access and share information.
201
+
With Intune, you can **protect data on managed devices** (enrolled in Intune) and **protect data on unmanaged devices** (not enrolled in Intune). Intune can isolate organization data from personal data. The idea is to protect your company information by controlling the way users access and share information.
198
202
199
203
For organization-owned devices, you want full control over the devices, especially security. When devices enroll, they receive your security rules and settings.
200
204
@@ -206,7 +210,7 @@ On devices enrolled in Intune, you can:
206
210
- Use conditional access to only allow managed and compliant devices access to organization resources, apps, and data.
207
211
- Remove organization data if a device is lost or stolen.
208
212
209
-
For personal devices, users might not want their IT admins to have full control. So, give users options. For example, users enroll their devices if they want full access to your organization's resources. Or, if these users only want access to Outlook or Microsoft Teams, then use app protection policies that require multi-factor authentication (MFA).
213
+
For personal devices, users might not want their IT admins to have full control. To support a hybrid work environment, give users options. For example, users enroll their devices if they want full access to your organization's resources. Or, if these users only want access to Outlook or Microsoft Teams, then use app protection policies that require multi-factor authentication (MFA).
0 commit comments