Microsoft Intune — Cloud-Based Endpoint Management

INTUNE

Microsoft Intune is the cloud-based MDM and MAM platform that replaces on-premises SCCM for device management in modern Microsoft 365 deployments. It enrolls and manages Windows, macOS, iOS, and Android devices — pushing configuration, enforcing compliance, deploying apps, and wiping lost devices — without requiring a VPN or on-premises infrastructure.

endpointintunemdmmammicrosoft-365conditional-accessautopilotcompliance

What Intune Is

Microsoft Intune is a cloud-native endpoint management platform delivered as part of Microsoft 365. It sits in the Microsoft Endpoint Manager (MEM) admin centre alongside Configuration Manager (SCCM) and provides two distinct management paradigms:

The two modes are not mutually exclusive — Intune can manage both corporate-enrolled devices via MDM and personal devices via MAM simultaneously, with different policy sets for each.


MDM vs MAM

DimensionMDMMAM
Device registrationFull Entra ID join / registrationApp-only registration
Scope of controlEntire deviceSpecified apps only
Personal apps visible to ITYes (device inventory)No
Can remote wipe entire deviceYesApp data only (selective wipe)
Suitable for BYODWith privacy policyPreferred for BYOD
Suitable for corporate devicesYesSupplementary
Configuration profiles apply toDevicePer-app settings
Conditional Access can requireCompliant deviceManaged app

For corporate-owned devices, MDM is standard. For BYOD — particularly personal phones accessing corporate email — MAM-only (without device enrollment) is the preferred approach. The user retains full privacy on their personal device; the organisation can selectively wipe only its own app data.


Enrollment Methods

Windows — Autopilot

Windows Autopilot is the preferred zero-touch provisioning method for corporate Windows devices.

Device / User
Intune / Entra ID
Device powers on at OOBE
Hardware hash pre-registered in Autopilot service
Autopilot profile returned
Skip pages, set tenant branding, deployment mode
User authenticates with Entra ID credentials
Entra ID join + Intune MDM enrollment
Certificate, device object created
Configuration profiles applied
Apps, policies, certificates pushed

Hardware hash registration: the OEM registers devices directly with the Autopilot service (Microsoft CSP programme), or IT can upload hardware hashes via CSV from the Intune portal.

Deployment modes:

Windows — Bulk Enrollment

A Provisioning Package (PPKG) created with Windows Configuration Designer. A USB drive containing the PPKG is inserted during OOBE. The device reads the package and enrolls automatically. Used for air-gapped environments or when Autopilot is not available.

macOS — ADE (Automated Device Enrollment)

Requires Apple Business Manager (ABM). Devices are assigned to an MDM server (Intune) in ABM. On first boot, the device contacts ABM, discovers the assigned MDM server, and receives the enrollment profile. User authenticates with Entra ID via the Company Portal app (or PSSO — Platform Single Sign-On for macOS 13+).

iOS / iPadOS

Android


Configuration Profiles

Configuration profiles push settings to enrolled devices without user interaction. In Intune, profiles are assigned to Entra ID user or device groups.

Windows Profile Categories

CategoryExamples
Device restrictionsCamera disabled, Bluetooth, USB storage
Wi-FiSSID, authentication, EAP certificates
VPNAlways-on VPN, per-app VPN profiles
CertificatesSCEP/PKCS — push device or user certificates
BitLockerEnforce encryption, escrow recovery key to Entra ID
Windows Hello for BusinessPIN complexity, biometrics
Microsoft EdgeHomepage, extensions, enterprise bookmarks
Custom OMA-URIAny MDM CSP not exposed natively in the UI

OMA-URI (Open Mobile Alliance Uniform Resource Identifier) is the underlying protocol for all Windows MDM settings. When the Intune UI does not expose a specific setting, you can write the CSP path directly. The full Windows MDM CSP documentation is the authoritative reference.

macOS Profile Categories

CategoryExamples
FileVaultEnforce disk encryption, personal recovery key escrow
GatekeeperAllow only App Store or approved developer apps
System Preferences restrictionsPrevent specific preference panes
Wi-Fi / VPNSame pattern as Windows
Kernel extensions (KEXT)Approve legacy driver extensions
System ExtensionsApprove modern (non-kernel) extensions

Compliance Policies

Compliance policies define what constitutes a compliant device. Intune evaluates each enrolled device against the applicable compliance policy and marks it compliant or non-compliant.

Common Compliance Requirements (Windows)

SettingExample Value
Minimum OS versionWindows 11 22H2
BitLocker requiredYes
Secure Boot requiredYes
Code integrity requiredYes
Device threat levelLow (via Microsoft Defender for Endpoint)
Screen lock timeout15 minutes or less
Password complexityAlphanumeric, 8+ characters

Non-Compliance Actions

When a device falls out of compliance, Intune can:


Conditional Access Integration

Conditional Access (CA) is an Entra ID policy engine that evaluates identity + device + location + risk signals to make access decisions. Intune compliance integrates directly as a CA condition.

A typical CA policy for M365:

With this policy in place, a user trying to access Outlook Web or Teams from a personal device that is not enrolled and compliant will be blocked. The Conditional Access engine checks Intune’s compliance state in real time.

The flow: user authenticates to Entra ID → CA policy evaluates → CA checks Intune for device compliance state → if compliant, token issued → if non-compliant, access blocked with link to Company Portal to enroll or remediate.


App Deployment

Intune deploys applications to enrolled devices through the Intune deployment pipeline.

Windows App Types

App TypeFormatNotes
Win32 app.intunewin (wrapped with IntuneWinAppUtil.exe)Most flexible; supports detection rules, dependencies
MSI (line-of-business).msiSimpler but less control than Win32
Microsoft StoreStore app IDUWP apps from the Windows Store
Microsoft 365 AppsBuilt-inClick-to-Run M365 deployment
Web appURL shortcutBrowser link in Company Portal

Win32 app packaging requires wrapping the installer with the IntuneWinAppUtil command-line tool:

IntuneWinAppUtil.exe -c "C:\AppSource" -s setup.exe -o "C:\Output"

Detection rules tell Intune whether the app is already installed: check for a file path, a registry key, or run a custom PowerShell script. Intune evaluates the detection rule before and after installation.

Assignment Intents

IntentBehaviour
RequiredForced installation; user cannot skip
AvailableAppears in Company Portal self-service
UninstallRemoves the app from assigned devices
Available without enrollmentAccessible to MAM-only devices via Company Portal

Endpoint Security Policies

Intune’s Endpoint Security blade provides focused policies for security configuration without mixing them into broader configuration profiles:

WorkloadPolicies Available
AntivirusMicrosoft Defender Antivirus settings, exclusions, real-time protection
Disk EncryptionBitLocker (Windows), FileVault (macOS)
FirewallWindows Firewall rules, Defender Firewall profiles
Attack Surface ReductionASR rules, controlled folder access, exploit protection
Endpoint Detection & ResponseOnboard devices to Microsoft Defender for Endpoint
Account ProtectionWindows Hello for Business, credential guard

Intune vs SCCM — Co-Management

SCCM (Configuration Manager) remains deployed in many enterprise environments for OS deployment (MDT/OSD task sequences), software distribution, and patch management. Intune and SCCM can run side-by-side through co-management.

Co-Management Workloads

Co-management allows specific management workloads to be transferred from SCCM to Intune individually. Each workload is a slider: SCCM or Intune or Pilot (Intune for a subset of devices).

WorkloadCan transfer to Intune
Compliance policiesYes
Device configurationYes
Resource access (Wi-Fi, VPN, certs)Yes
Endpoint protectionYes
Client appsYes
Office 365 click-to-runYes
Windows Update policiesYes

Tenant Attach vs Co-Management

These are related but distinct concepts:

Tenant attach is the lower-commitment starting point; co-management is the path to full cloud management.


Licensing

Intune is included in the following Microsoft 365 licence bundles:

LicenceIntune Included
Microsoft 365 Business PremiumYes
Microsoft 365 E3Yes
Microsoft 365 E5Yes
EMS E3 (Enterprise Mobility + Security)Yes
EMS E5Yes
Intune Plan 1 standaloneYes
Intune Plan 2 (Intune Suite)Advanced features (remote help, tunnel, etc.)
Microsoft 365 Business Basic/StandardNo — requires add-on

Most M365 E3/E5 deployments include Intune. Verify licensing before enrollment, as non-licensed users will fail enrollment with an error.