top of page

MICROSOFT MOBILE DEVICE MANAGEMENT



  1. The software protects company-managed devices, allowing IT managers the ability to control access to corporate data. There are a number of remote actions that can be accomplished through the Intune portal, from device lock, data encryption, passcode reset – or a full wipe for stolen or lost devices.

  2. Intune also protects employee-owned devices and partitions work from personal data. Employees have the option to register their own devices and install company-approved applications from a self-service portal.

  3. Intune protects 3rd party devices from Apple, Google, Microsoft, Samsung, and more, allowing management of mobile devices, as well as PCs and applications.

  4. Intune integrates with System Center Configuration Manager can control PCs, Macs, and Unix/Linux.

  5. Intune also makes it easy to set and define policies via a single admin portal that allows rules configuration and device management. From this hub, you can update security, scan computers for malicious software, track end-user activity, and more.

  6. Intune allows granular control of Office 365 and other applications, allowing IT admins to restrict access to email or OneDrive business documents if the user logs in from an unenrolled device.




MDM + Security features:

  • Mobile Device Management

  • Mobile Application Management

  • Information Protection

  • Advanced Threat protection

  • Multi-factor Authentication

  • Conditional Access

  • Risk-based conditional access

  • Privileged identity management (PIM)

  • Simplified access management and security

  • Integrated on-premises management

  • Microsoft Cloud App Security

  • Document tracking and revocation

  • Intelligent data classification and labeling

  • Cloud App Security Advanced security reporting

10 views0 comments

Recent Posts

See All
bottom of page