You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/endpoint-manager-overview.md
+16-29Lines changed: 16 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,25 +33,17 @@ ms.collection:
33
33
34
34
# Microsoft Intune is a family of products and services
35
35
36
-
Microsoft Intune is a family of products and services. It combines services you may know and already be using, including Microsoft Intune, Configuration Manager, co-management, Endpoint Analytics, and Windows Autopilot. These services are part of the Microsoft 365 stack to help secure access, protect data, and respond to & manage risk.
36
+
Microsoft Intune is a family of products and services. It combines services you may know and may already be using, including Microsoft Intune, Configuration Manager, co-management, Endpoint Analytics, and Windows Autopilot. These services are part of the Microsoft 365 stack to help secure access, protect data, and respond to & manage risk.
37
37
38
38
Previously, this family of products and services was known as Microsoft Endpoint Manager.
39
39
40
40
The Microsoft Intune family helps deliver the modern workplace and modern management to keep your data secure, in the cloud and on-premises. Intune includes the services and tools you use to manage and monitor mobile devices, desktop computers, virtual machines, embedded devices, and servers.
41
41
42
-
You can also think of Intune in three parts: cloud, on-premises, and cloud + on-premises:
43
-
44
-
-**Cloud**: All data is stored in Azure. And, no more data centers. This approach gives you the mobility benefits of the cloud, and the security benefits of Azure.
45
-
46
-
-**On-premises**: If you have an on-premises infrastructure that includes Configuration Manager and Windows Server, or aren't ready to use the cloud, then keep your existing systems.
47
-
48
-
-**Cloud + on-premises**: Many environments are mixed, and use a cloud-attach approach. Meaning, they use a combination of cloud and on-premises. For new devices, use the benefits of Intune to access and protect data. If you use Configuration Manager, connect to the cloud for more functionality and analytics. If you want to move some workloads to the cloud, then co-management is a good option.
49
-
50
42
This article provides an overview of the Microsoft Intune family of products and services.
51
43
52
44
## Microsoft Intune
53
45
54
-
Intune is a cloud-based mobile device management (MDM) and mobile application management (MAM) service provider for your devices, apps, and data. It lets you control features and settings on Android, Android Enterprise, AOSP, iOS/iPadOS, macOS, and Windows client devices. With Intune, users can be productive from anywhere and on any device. It also gives admins the tools to manage users, manage devices, and manage apps securely.
46
+
Intune is a cloud-native mobile device management (MDM) and mobile application management (MAM) service provider for your devices, apps, and data. It lets you control features and settings on Android, AOSP, iOS/iPadOS, macOS, and Windows client devices. With Intune, users can be productive from anywhere and on any device. It also gives admins the tools to manage users, manage devices, and manage apps securely.
55
47
56
48
It integrates with other services, including Azure Active Directory (AD), on-premises Configuration Manager, mobile threat defense (MTD) apps & services, Win32 & custom LOB apps, and more.
57
49
@@ -78,14 +70,14 @@ For more information, go to:
78
70
79
71
## Endpoint Analytics
80
72
81
-
Endpoint Analytics is a cloud-based service that provides metrics and recommendations on the health and performance of your Windows client devices.
73
+
Endpoint Analytics is a cloud-native service that provides metrics and recommendations on the health and performance of your Windows client devices.
82
74
83
75
You can get data on:
84
76
85
77
- Startup performance
86
78
- How frequently devices restart
87
-
-Get a list of apps that affect end-user productivity
88
-
-Get recommendations on how to improve performance
79
+
-A list of apps that affect end-user productivity
80
+
-Recommendations on how to improve performance
89
81
90
82
This information and more is shown in the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
91
83
@@ -99,7 +91,7 @@ For more information, go to:
99
91
100
92
## Windows Autopilot
101
93
102
-
Windows Autopilot is a cloud-based service that sets up and pre-configures new devices, getting them ready for use. It can also reset and repurpose existing devices. It's designed to simplify the lifecycle of Windows devices from initial deployment through end of life, benefitting IT and end users.
94
+
Windows Autopilot is a cloud-native service that sets up and pre-configures new devices, getting them ready for use. It can also reset and repurpose existing devices. It's designed to simplify the lifecycle of Windows devices from initial deployment through end of life, benefitting IT and end users.
103
95
104
96
Use Windows Autopilot to pre-configure devices, automatically join devices to Azure AD, automatically enroll the devices in Intune, customize the out of box experience (OOBE), and more. You can also integrate Windows Autopilot with Configuration Manager and co-management for more device configurations.
105
97
@@ -112,41 +104,36 @@ For more information, go to:
112
104
113
105
## Azure Active Directory (AD)
114
106
115
-
Azure AD is a cloud-based service that's used by Intune to manage the identities of users, devices, and groups. The Intune policies you create are assigned to these users, devices, and groups. When devices are enrolled in Intune, your users sign in to their devices with their Azure AD accounts (`[email protected]`).
107
+
Azure AD is a cloud-native service that's used by Intune to manage the identities of users, devices, and groups. The Intune policies you create are assigned to these users, devices, and groups. When devices are enrolled in Intune, your users sign in to their devices with their Azure AD accounts (`[email protected]`).
116
108
117
109
**Azure AD Premium**, which may be an extra cost, has [more features](https://azure.microsoft.com/pricing/details/active-directory/) to help protect devices, apps, and data, including dynamic groups, automatic enrollment in Intune, and conditional access.
118
110
119
111
For more information, go to:
120
112
121
113
-[Add users](./intune/fundamentals/users-add.md)
122
114
-[Set up auto-enrollment](./intune/enrollment/windows-enroll.md)
-[Learn about conditional access and Intune](./intune/protect/conditional-access.md)
124
116
125
117
## Endpoint Manager admin center
126
118
127
119
The [Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) is a one-stop web site. Use the admin center to add users & groups, create & manage policies, and monitor your policies using report data. If you use Configuration Manager tenant-attach or co-management, you can see your on-premises devices and run some actions on these devices.
128
120
129
121
The admin center also plugs-in other key device management services, including:
130
122
131
-
- Azure AD Privileged Identity Management
132
-
- Microsoft Tunnel
133
-
- Mobile threat defense partners
134
-
-Remote administration with TeamViewer
135
-
- Windows 365 Cloud PCs
136
-
- Windows Autopatch
123
+
-[**Azure AD Privileged Identity Management** to monitor access to important resources](/azure/active-directory/privileged-identity-management/pim-configure)
124
+
-[**Microsoft Tunnel** VPN gateway solution that runs on Linux](./intune/protect/microsoft-tunnel-overview.md)
Copy file name to clipboardExpand all lines: memdocs/intune/fundamentals/get-started-with-intune.md
+10-8Lines changed: 10 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,8 +55,8 @@ Microsoft Endpoint Configuration Manager helps protect on-premises Windows Serve
55
55
56
56
There are two steps to cloud attach your on-premises devices:
57
57
58
-
1.[Tenant attach](../../configmgr/tenant-attach): Register your Intune tenant with your Configuration Manager deployment. Your Configuration Manager devices are shown in the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431). On these devices, you can run different actions, including installing apps and run Windows PowerShell scripts using the web-based admin center.
59
-
2.[Co-management](../../configmgr/comanage): Manage Windows client devices with Configuration Manager and Microsoft Intune. Some workloads are managed by Configuration Manager, and some workloads are managed by Intune. For example, you can use Configuration Manager to manage Windows updates, and use Intune to manage conditional access policies.
58
+
1.[Tenant attach](../../configmgr/tenant-attach.md): Register your Intune tenant with your Configuration Manager deployment. Your Configuration Manager devices are shown in the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431). On these devices, you can run different actions, including installing apps and run Windows PowerShell scripts using the web-based admin center.
59
+
2.[Co-management](../../configmgr/comanage.md): Manage Windows client devices with Configuration Manager and Microsoft Intune. Some workloads are managed by Configuration Manager, and some workloads are managed by Intune. For example, you can use Configuration Manager to manage Windows updates, and use Intune to manage conditional access policies.
60
60
61
61
If you currently use Configuration Manager, you get immediate value through tenant attach, and you get more value through co-management.
62
62
@@ -141,7 +141,7 @@ MDM solutions like Intune can set rules that devices should meet, and can report
141
141
142
142
For example, you can choose an acceptable (or unacceptable) threat level, block jailbroken or rooted devices, require a password length, and more. If these devices don't meet your rules, meaning they aren't compliant, then you can use conditional access to block access to your resources.
143
143
144
-
If you prefer, you can enroll your devices before checking compliance. It's up to you. When users enroll their devices in Intune, then enrollment process can automatically deploy your compliance policies. When enrollment completes, admins can check the compliance status and get a list of devices that don't meet your rules. Microsoft recommends creating compliance and conditional access policies, and then deploying these policies during enrollment.
144
+
If you prefer, you can enroll your devices before checking compliance. It's up to you. When users enroll their devices in Intune, then enrollment process can automatically deploy your compliance policies. When enrollment completes, admins can check the compliance status and get a list of devices that don't meet your rules. Microsoft recommends creating compliance and conditional access policies baseline, and then deploying these policies during enrollment.
145
145
146
146
In the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), you create your policies and assign them to your groups. As a best practice, start small, and use a staged approach. For example, create an iOS/iPadOS policy that blocks jailbroken devices. Apply the policy to a pilot or test group. After initial testing, add more users to the pilot group. For more guidance, go to the [Microsoft Intune planning guide](intune-planning-guide.md).
147
147
@@ -162,7 +162,7 @@ The following articles are good resources:
162
162
163
163
Every organization has a base set of apps that should be installed on devices. Your organization may require a specific email app, web browser, or VPN app. You can use Intune to deploy these apps to your users before they enroll their devices. When users enroll their devices, these apps can be automatically installed during the enrollment process.
164
164
165
-
If you prefer, you can enroll your devices before installing apps. It's up to you. When users enroll their devices in Intune, the enrollment process can automatically deploy your app policies. When enrollment completes, the apps are ready to use. For key productivity apps, Microsoft recommends creating app policies and then deploying these policies during enrollment.
165
+
If you prefer, you can enroll your devices before installing apps. It's up to you. When users enroll their devices in Intune, the enrollment process can automatically deploy your app policies. When enrollment completes, the apps are ready to use. For key productivity apps, Microsoft recommends creating a baseline of app policies and then deploying these policies during enrollment.
166
166
167
167
Intune supports a wide range of apps, including store apps, line-of-business (LOB) apps, Win32 apps, and more. You can manage app deployment using the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431). Also, you can connect to your managed Google Play, the Apple App Store, and the Microsoft Store to deploy apps from these locations.
168
168
@@ -226,15 +226,17 @@ Different platforms have different enrollment requirements. The following articl
226
226
227
227
It's common for users to access their organization email & calendar, attend work meetings, and use other organization apps on their personal devices. To help keep organization data secure on these devices, you can use app protection policies and multi-factor authentication (MFA). App protection policies help protect organization data on personal devices. MFA helps protect your organization's data from unauthorized access.
228
228
229
-
Intune's app protection policies are part of a mobile application management (MAM) approach designed to protect organization app data on personal devices. These app protection policies can also be used on devices enrolled Intune, or enrolled and managed by a third party partner MDM solution. This scenario is more common for apps that need an extra layer of security, including apps that have sensitive data.
229
+
Intune's app protection policies are part of a mobile application management (MAM) approach designed to protect organization app data on personal devices.
230
230
231
-
The [Microsoft Intune planning guide](intune-planning-guide.md) has some guidance on managing access on BYOD or personal devices.
231
+
These app protection policies can also be used on devices enrolled Intune, or enrolled and managed by a third party partner MDM solution. This scenario is more common for apps that need an extra layer of security, including apps that have sensitive data.
232
232
233
-
There's an official list of Microsoft apps and supported third party partner apps that support app protection policies. See the official list at [Microsoft Intune protected apps](../apps/apps-supported-intune-apps.md).
233
+
The [Microsoft Intune planning guide](intune-planning-guide.md) has some guidance on managing access on personal devices.
234
+
235
+
There's an official list of Microsoft apps and supported third party partner apps that support app protection policies. See the official list at [Microsoft Intune protected apps list](../apps/apps-supported-intune-apps.md).
234
236
235
237
MFA is a feature of Azure AD that must be enabled in your Azure AD tenant. Then, you can configure MFA for your apps. For more information, go to:
236
238
237
-
-[How it works: Azure AD multi-factor authentication](/azure/active-directory/authentication/concept-mfa-howitworks).
239
+
-[How it works: Azure AD multi-factor authentication](/azure/active-directory/authentication/concept-mfa-howitworks)
238
240
-[Tutorial: Secure user sign-in events with Azure AD multi-factor authentication](/azure/active-directory/authentication/tutorial-enable-azure-mfa)
239
241
240
242
To get an overview of app protection policies and how they work, go to:
0 commit comments