INTUNE Interview Questions
INTUNE Interview Questions
8. What is a WebHook?
◦ A webhook in web development is a method of augmenting or altering the behavior of a
web page or web application with custom callbacks. These callbacks may be maintained,
modified, and managed by third-party users and developers who may not necessarily be
affiliated with the originating website or application.
9. What are Cloud computing benefits?
◦ Benefits of cloud computing
Cloud computing offers your business many benefits. It allows you to set up what is essentially
a virtual office to give you the flexibility of connecting to your business anywhere, any time.
With the growing number of web-enabled devices used in today's business environment (e.g.
smartphones, tablets), access to your data is even easier.
There are many benefits to moving your business to the cloud:
Reduced IT costs
Moving to cloud computing may reduce the cost of managing and maintaining your IT systems.
Rather than purchasing expensive systems and equipment for your business, you can reduce
your costs by using the resources of your cloud computing service provider. You may be able to
reduce your operating costs because:
• the cost of system upgrades, new hardware and software may be included in your
contract
• you no longer need to pay wages for expert staff
• your energy consumption costs may be reduced
• there are fewer time delays.
Scalability
Your business can scale up or scale down your operation and storage needs quickly to suit your
situation, allowing flexibility as your needs change. Rather than purchasing and installing
expensive upgrades yourself, your cloud computer service provider can handle this for you.
Using the cloud frees up your time so you can get on with running your business.
Business continuity
Protecting your data and systems is an important part of business continuity planning. Whether
you experience a natural disaster, power failure or other crisis, having your data stored in the
cloud ensures it is backed up and protected in a secure and safe location. Being able to access
your data again quickly allows you to conduct business as usual, minimising any downtime and
loss of productivity.
Collaboration efficiency
Collaboration in a cloud environment gives your business the ability to communicate and share
more easily outside of the traditional methods. If you are working on a project across different
locations, you could use cloud computing to give employees, contractors and third parties access
to the same files. You could also choose a cloud computing model that makes it easy for you to
share your records with your advisers (e.g. a quick and secure way to share accounting records
with your accountant or financial adviser).
Flexibility of work practices
Cloud computing allows employees to be more flexible in their work practices. For example,
you have the ability to access data from home, on holiday, or via the commute to and from work
(providing you have an internet connection). If you need access to your data while you are off-
site, you can connect to your virtual office, quickly and easily.
Access to automatic updates
Access to automatic updates for your IT requirements may be included in your service fee.
Depending on your cloud computing service provider, your system will regularly be updated
with the latest technology. This could include up-to-date versions of software, as well as
upgrades to servers and computer processing power.
10. What is Public, Private and Hybrid cloud execution as for Azure or other
platforms?
Though cloud-storage has been all the rage lately, some companies still believe that on-
premises solutions are best suited for their business needs. For example, many enjoy the
greater security that on-premises solutions and storage give their data. On-
premises storage is a great option for your business because it can:
• Operate without internet:One of the major upsides to on-premises storage
is that it doesn’t require users to have an internet connection to access data. Though most
businesses rely on the internet to conduct business, there’s always a fear that the loss of a
connection could harm productivity and make it impossible to access crucial data. On-premises
servers will provide you with an internal network that is accessible anytime, no matter your
internet connection.
• Lower monthly internet costs: If your business doesn’t rely on the
internet or cloud-based services, you may not need to pay for such a high-speed connection. For
those with on-premises storage, the need for a strong connection with fast download speeds is
reduced even further. Based on your needs, you may not have to pay for a more expensive
internet plan if you don’t have to access the cloud to view files.
• Provide greater security: Unlike cloud-storage, which is more vulnerable
to third parties and prying eyes, on-premises storage is completely restricted from anyone other
than authorized personnel. On-premises servers are not accessible to those outside the network,
as they are not storing the data online. For companies who handle sensitive data, like those in
the financial industry, on-premises storage may be a preferred option.
• Offer control over server hardware:Some companies enjoy having
dedicated servers within their building to handle all their needs. Instead of having to ask a cloud
storage company to upgrade their storage plan or add new features, the company can simply do
the upgrades themselves. Potentially, being able to modify the server’s hardware can give savvy
companies greater flexibility and customization for their storage needs.
WHY ON-PREMISES STORAGE MAY NOT BE THE BEST OPTION
Despite the many advantages that come with on-premises storage, there are some
drawbacks companies should be aware of. On-premises storage may not be the best choice
for your business because it can:
• Require extra IT support: If you decide you want to use on-
premises storage, you’ll also need to have IT staff to maintain and manage your servers. This
could mean you have to hire new staff members or devote more of your current staff’s time to
maintaining the servers. This extra support can add to your costs and reduce the efficiency of
your IT department as they will have increased responsibilities associated with the on-premises
servers.
• Adherence to industry compliance: If your Company operates within a
regulated industry such as Finance or HealthCare, the responsibility to abide by the governing
regulations will fall squarely on your Company as you are the owner and operator of the servers
and on-premise storage. Compliance can require the attention of many employees, additional
money for outside audits and potential fines if the infrastructure is found to be out of
compliance.
• Increase maintenance costs: Along with the initial capital investment
required to purchase servers and other hardware, you’ll also need to continue to buy hardware,
software and licenses to upgrade the system or repair it. Oftentimes, a piece of hardware will
malfunction and need to be replaced. Additionally, in order to realize the most from your server
investment, you will want to upgrade your equipment, which will likely be annually (at least),
and will require an investment of more money.
• Require a greater capital investment: When you first set up on-premises
storage, you’ll have to invest a significant amount of capital to purchase the servers and other
pieces of hardware to get it running. For companies just trying to get off the ground, this level of
capital investment can be a huge disadvantage. Along with purchasing the equipment, you’ll
also need to devote time and money to make sure it’s properly installed.
• Increase the risk of data loss: Data is the backbone of your business.
Losing it can be crippling, both for your efficiency and your reputation. With on-
premises storage, a malfunction in the system or a compromised system held for ransom can
cause you to lose your data permanently. While a cloud-based system will keep your data
backed up, on-premises storage systems have all the data stored on an internal server, meaning
you assume a greater amount of risk. A best practice for on-premise storage, to avoid the loss of
data, is to include an off site backup service that replicates the data to another site or media.
• Limit your company’s ability to scale:If your company scales up and
needs more storage space or other capabilities, it’s more difficult to scale your on-
premises servers quickly. Unlike cloud-storage, where companies can simply pick a more
expansive plan with a click, on-premises storage requires you to install new hardware and
devote manpower to building the new systems.
When you are comparing your options of on-premise and cloud storage, make sure to
weigh the pros and cons of each. As you are selecting your provider for the services, ask
the right questions to make sure you get the best option for your organization.
Cloud-Based Software vs. On-Premises Software
Is on-premises or cloud better for your business? Whenever a company looks to add new
software to their business, it’s important for them to know about whether cloud
computing or on-premises software is a better option for their needs.
ADVANTAGES OF CLOUD-BASED SOFTWARE
If you’re interested in cloud-based software, you’ll be happy to know that there are plenty
of advantages to using it. Some of the top benefits include:
• Affordability: Generally, costs are lower for cloud-based applications.
Instead of having to pay a large licensing fee upfront, you’ll have much lower monthly costs.
Often times, these monthly costs take the form of subscription fees. Along with the lower initial
costs that make them more affordable, the companies offering these subscriptions often include
maintenance and support, saving you manpower and the financial cost of having to troubleshoot
problems yourself.
• Ease of deployment: One of the biggest advantages of cloud computing is
its ability to be deployed quickly without long installation processes. Customers of cloud
software vendors will be able to start using the vendors’ application within minutes. Quick
deployment gives companies an edge over the competition, and as such, is very popular among
competitive companies.
• Management services: One major aspect of cloud computing is the
management services that vendors will typically offer clients. Instead of having to host the
software or purchase hardware themselves, a customer can work with a vendor who will take
care of it all externally, freeing up staff and reducing costs. The business won’t ever have to
worry about upgrades or network monitoring, as the vendor will manage it all.
Microsoft Intune is a secure cloud service that enables mobile device management and
mobile application management. With Intune you can manage how devices are used and
enforce policies that allow you to control applications.
Intune is an advanced cloud-based service that integrates with other Microsoft services to
provide comprehensive management of mobile devices. This blog post is going to be a bit of an
overall look at Intune, including:
You can do a lot with Intune, making it possible for your teams to work anywhere using their
mobile devices. You can:
• Set rules and configure policies for a range of devices, whether they’re personal or
organisation-owned. This means your company can have a BYOD (Bring Your Own Device)
policy without major concerns about security.
• Deploy apps to mobile devices from any location to several devices concurrently. For
example, you can deploy apps such as Microsoft Teams, Word, and Outlook to the devices you
manage using Intune.
• Control what users and devices can access. Protect your organisation’s data by
controlling the information that users can access and share.
• Ensure that the devices your team members are using are compliant with your
security requirements. If devices aren’t compliant, this will be flagged up and you can resolve
the issue.
Intune is an excellent cloud-based service to use for both organisation-owned and personal
mobile devices. However, I think it’s particularly useful for businesses that embrace a Bring
Your Own Device policy.
If your team members are using their own devices (mobile phones, laptops, and tablets to give 3
examples) for work, you must do everything within your power to protect your organisation’s
devices. Microsoft Intune is massively beneficial here, as it lets you prevent users from
accessing certain data on certain devices. You can also prevent users from sharing your
organisation’s data and isolate organisation data from personal data.
Intune is actually part of Microsoft’s Enterprise Mobility + Security Suite and it also integrates
with several other Microsoft services. For example, Microsoft Intune integrates with:
• Azure AD (Azure Active Directory)
• Azure Information Protection
• Microsoft 365 Applications
Microsoft Enterprise Mobility + Security Suite (EMS) is made up of a range of applications and
services:
Microsoft Intune is an excellent cloud-based service for MDM (mobile device management) and
MAM (mobile application management). Here’s a quick overview of everything you can do
with it.
I think those points give you a really good idea of how you can use Intune and how doing so
would advantage your business. However, I’m going to break down each point and give you
some real-world examples of what you can do.
Configuration profiles can be created for a range of devices and operating systems, such as iOS,
Android, and Windows. Configuration profiles contain a range of settings and rules that can be
applied to any device within your organisation. For example, here are some of the functions
Intune will allow you to control:
With Microsoft Intune, you have complete control over what users can access and share on
enrolled devices.
Controlling what users can access and share can be much more advanced than just allowing or
restricting access. You can micromanage access and sharing with app protection policies,
preventing users from performing certain actions within apps.
For example, you can restrict users by preventing them using copy and paste functionality
within certain apps. You can also control whether or not users can send emails to email
addresses outside of your organisation’s control, or prevent certain types of data from being
transmitted via email.
Using user groups, you can assign certain policies and rules to groups of users and devices.
Alternatively, you can assign policies and rules per user and per device should you wish to.
However, using groups you can rapidly push policies and rules to large numbers of devices and
users.
(Or)
By
• Peter van der Woude, KPN ICT Consulting
Published: 10 Mar 2020
Microsoft offers two ways to handle mobile device management: MDM for Office 365 and
Microsoft Intune.
The enterprise mobility industry has changed significantly in the past few years. Mobile device
management (MDM) platforms such as MDM for Office 365 was once enough for most
organizations. As devices such as iPads, wearables and IoT devices became prevalent in the
enterprise, however, many organizations needed advanced management capabilities and a
unified console. Unified endpoint management (UEM) products such as Intune entered the
market, which provided a way for IT admins to manage a range of different devices under a
single console.
MDM still has use cases today, however. MDM for Office 365 provides a limited feature set,
but it is included in the price of many Office 365 subscriptions. This built-in tool offers
organizations an integrated, inexpensive way to manage mobile devices. Microsoft Intune, on
the other hand, provides a rich feature set and comes with additional costs.
MDM for Office 365 capabilities
MDM for Office 365 provides a lightweight version of MDM that does not include mobile
application management (MAM). It provides organizations with MDM policies and settings that
will help to control access to Office 365 data for supported mobile devices and apps. For stolen
or lost devices, it offers the ability to remotely wipe the device to remove corporate data.
Supported platforms
MDM for Office 365 provides support for the following platforms:
• iOS 10.0 or later
• Android 4.4 or later
• Windows 8.1 (limited to Exchange ActiveSync functionality)
• Windows 10 (requires the device to be Azure Active Directory joined)
Supported access control scenarios
MDM for Office 365 provides a few scenarios that will prompt the user to enroll their device.
When the user's device doesn't comply with the policy, the user might be blocked from
accessing Office 365 data, depending on the policy configuration.
THIS ARTICLE IS PART OF
Or
Challenges
• Creating a consistent environment in terms of security, management, and
development, and avoiding duplication of work.
• Creating a reliable, low latency and secure data connection between your
on-premises and cloud environments.
• Replicating your data and modifying applications and tools to use the
correct data stores within each environment.
• Securing and encrypting data that is hosted in the cloud but accessed from
on-premises, or vice versa.
Azure Stack
For a complete hybrid cloud solution, consider using Microsoft Azure Stack. Azure Stack is a
hybrid cloud platform that lets you provide Azure services from your datacenter. This helps
maintain consistency between on-premises and Azure, by using identical tools and requiring no
code changes.
The following are some use cases for Azure and Azure Stack:
• Edge and disconnected solutions. Address latency and connectivity
requirements by processing data locally in Azure Stack and then aggregating in Azure for
further analytics, with common application logic across both.
• Cloud applications that meet varied regulations. Develop and deploy
applications in Azure, with the flexibility to deploy the same applications on-premises on Azure
Stack to meet regulatory or policy requirements.
• Cloud application model on-premises. Use Azure to update and extend
existing applications or build new ones. Use consistent DevOps processes across Azure in the
cloud and Azure Stack on-premises.
—————————————————————————————————
1.How UEM (and Intune) fits into the EMM market.
MEM contains all the different services and tools that IT can use to manage and monitor
endpoint devices such as smartphones, tablets, desktops, laptops, virtual machines and even
servers. These different management services and tools combine the strength of existing
products, including Microsoft Intune, Configuration Manager, Desktop Analytics, Windows
Autopilot, and the other services that were available via the Device Management Admin
Console.
The offering is an extremely broad mix of mostly existing Microsoft tools and services, but the
rebranding and renaming of these components can confuse Microsoft customers.
What does Microsoft Endpoint Manager include?
Microsoft Endpoint Manager is a rebrand of Microsoft services, which brings these existing
products together in a single platform and a single management interface. This admin interface
is available via the Microsoft Endpoint Manager admin center, which Microsoft previously
provided via the Device Management Admin Console.
In addition to simplifying the admin experience, MEM makes the licensing process easier for
customers. For example, a license for Configuration Manager also includes a license for Intune
for MEM customers. This simplifies the path for organizations with all types of environments --
on premises, in the cloud or a hybrid model.
Here is a closer look at the products and tools that are part of Microsoft Endpoint Manager.
Microsoft Intune
Microsoft Intune still exists -- both in name and product -- and is now part of MEM. Even as
part of Microsoft Endpoint Manager, IT administrators can still use Intune as a separate
management platform for mobile device management (MDM) and unified endpoint
management (UEM).
IT administrators can manage configurations and verify compliance on Android, iOS, iPadOS,
macOS and Windows 10 devices. IT can also configure apps and protect data in apps on
Android, iOS, iPadOS and Windows 10 devices based on Windows Information Protection
(WIP). Besides these built-in functionalities, Intune also provides many integrations with third-
party products and, of course, other Microsoft products. The integrations can go a long way for
organizations trying to meet industry compliance standards.
Bottom line: IT can use Intune as a standalone device management and
app management platform without using the other products that are part
of the MEM offering.
Configuration Manager
Previously known as System Center Configuration Manager, Configuration Manager is now part
of Microsoft Endpoint Manager and Microsoft rebranded it to Microsoft Endpoint Configuration
Manager. Even as part of Endpoint Manager, IT administrators can use Configuration Manager
separate from MEM.
Configuration Manager is Microsoft's on-premises device management platform. IT
administrators can use it to manage laptops, desktops and servers for organizations. IT can
manage those devices on the intranet and the internet. It enables IT administrators to deploy
apps, software updates and OSes. IT can also monitor compliance and query devices, among
other tasks. To initiate a cloud migration, IT can attach Configuration Manager to the cloud
provider, add more functionalities and move to the single administrative interface in the
Microsoft Endpoint Manager admin center.
Desktop Analytics
Microsoft's Desktop Analytics is a cloud-based platform that integrates directly with
Configuration Manager to provide information about the update readiness of Windows 10
devices. IT can use this information to identify compatibility issues with apps and drivers and
provide insights about security updates, apps and devices within the organization.
Co-management
With the co-management service from Microsoft, IT admins have a bridge from an on-premises
environment to a cloud environment. It enables IT administrators to combine Configuration
Manager with Intune for Windows 10 endpoint management. With the simplified licensing that
comes with Microsoft Endpoint Manager, this doesn't require any additional licenses.
Co-management means that IT manages devices with both Configuration Manager and Intune.
That combination enables the patch to the cloud for organizations by switching workloads from
Configuration Manager to Intune. Those workloads are simply groups of configuration options
that IT switches from one device management product to another.
Windows Autopilot
Windows Autopilot is a cloud-based platform that IT admins can use to configure Windows 10
devices for an out-of-the-box experience for end users. This way, organizations can quickly get
devices up and running without manually imaging them.
During that experience, Windows Autopilot takes care of installing apps and applying
configurations. Those configurations include options to join the devices to Azure Active
Directory (Azure AD) and automatically enroll the devices to Intune or Configuration Manager.
One of the most important configurations that IT will need to set via Windows Autopilot is the
end-user device's account type -- standard or administrator.
What happened to Microsoft Intune?
The arrival of Endpoint Manager doesn't affect the position or usage of Intune. Intune is now
part of the Endpoint Manager platform, but the standalone product has the same focus. Almost
nothing changes for organizations that have deployed Intune before the arrival of Microsoft
Endpoint Manager.
The main difference for the Intune administrators is the administrator experience. The IT
administrator will now use the Microsoft Endpoint Manager admin center instead of the Device
Management Admin Console, the Azure portal or, from even further back, the Silverlight portal.
All the different configuration options are still available.
Bottom line: IT can use Intune as a standalone device management and app management
platform without using the other products that are part of the MEM offering.
How can IT perform Intune management tasks?
The best thing about MEM for IT administrators is that it brings all of Microsoft's endpoint
management tools and services into a single admin console with the Microsoft Endpoint
Manager admin center. This offers a unified experience, especially once all the different
management features become available via that same single admin console.
When IT administrators use Intune in combination with Configuration Manager, they can also
access the information from the Configuration Manager managed devices via that same console.
This way, IT can retrieve inventory information and configuration options from those devices
through the admin interface.
At this moment, most Configuration Manager-related configuration options only require the
Configuration Manager admin console. However, when looking at Intune specifically, all of its
management tasks are available via the Microsoft Endpoint Manager admin center. It may be
difficult for IT to find evidence of Intune within this console, but Intune is still the designated
MDM and mobile application management (MAM) provider. The best place to verify that
information is in the Tenant admin node under the Tenant status option. This will display
information referring to Intune with the MDM authority and the Total Intune licenses (figure
1).
The tenant status of deployed endpoint devices in the MEM admin center
The main features of Intune focus on device management, app management and reporting, and
each of them are critical for IT administrators to know.
Device management
IT can manage devices using the Devices node in the Microsoft Endpoint Manager admin
center. That node includes configuring devices with restriction profiles, certificate profiles, VPN
profiles, Wi-Fi profiles and much more. IT can also use this for device compliance policies that
verify the device compared to the compliance baseline of the organization before granting
access to company resources and data. The Endpoint Security node also contains nearly all
security-related device configuration options. This currently overlaps with many settings that are
available in the device restriction profiles as well.
Application management
IT can perform app management using the Apps node in the Microsoft Endpoint Manager
admin center. From this node, IT can deploy, configure and protect apps. More specifically, IT
can deploy company-specific apps to managed devices and to control apps on company and
personal devices. That includes both managed and unmanaged devices. In the latter case, only
the app is managed based on the identity of the user. That identity must exist in Azure AD.
Reporting
MEM's reporting information is available via the Reports node in the admin center. IT can use
this node to retrieve information about device compliance, updates, endpoint security and
endpoint analytics. The latter is a very helpful Intune feature that provides insights into the
device's performance and the app's performance on those devices. Besides that, the different
nodes for Devices and Apps also contain the subnode Monitor for configuration and
compliance information of the different policies and the status information for the app
deployments.
2.Explain all the given Management operation
Device
Mobile
Email
BYOD (Bring Your Own Device)
What is mobile device management?
Mobile device management is the process of securing, monitoring and supporting the use of
mobile devices, such as smartphones and tablets, in the workplace. The function of MDM is to
control data, configuration settings and applications on all mobile devices used within a
company or organization.
Businesses use third-party software to implement MDM. By regulating and securing the
configuration settings and data for all mobile devices in a network, MDM reduces security risks
and associated costs. These solutions form a core component of a company's enterprise mobility
management — the set of processes, people and technology that control mobile devices,
computers and wireless networks.
Related: How Employers Enforce Cell Phone Policies in the Workplace
An increasing number of employers are giving their employees a company device. Some
companies are implementing bring your own device (BYOD) policies to save on costs. These
policies allow employees to use their personal devices to access company resources such as
email, calendars and contacts. BYOD policies increase productivity and flexibility while
reducing costs. To prevent any security risks, MDM is essential for any workplace that uses
BYOD policies.
Why is mobile device management important?
MDM allows employees to use company or personal devices to complete work while staying
secure. These devices are essential to workplace productivity, so IT departments need to manage
them, especially when issues arise, like viruses or malware. MDM can also give an IT
department the ability to wipe your device completely if it is lost or stolen, then set up a new
device from a company backup.
How mobile device management works
MDM solutions use various combinations of corporate policies, software, infrastructure and
device applications to manage all devices on a network. These solutions work even if mobile
devices have different service providers or operating systems.
Mobile device management systems usually include two components:
• Server component: This part includes a centralized system that sends out
commands to all devices on the server. Some solutions implement an over-the-air system to
send out commands remotely.
• Client component: This is the part the user sees. This component receives
commands from the server and implements them. Data from clients is sent back to the server
component.
To initialize mobile device management, an application is installed on the smartphone or other
mobile device. This gives an IT department the ability to monitor and control activity. Simple
mobile device management can allow an IT department to lock a device remotely, monitor
internet activity or unlock a device. These services can also prevent you from downloading
certain applications or visiting unauthorized websites on a work device. Your employer may
prohibit you from using a work device for personal use.
Advantages of mobile device management
Some of the benefits of MDM include:
Support for BYOD policies
BYOD policies increase employee productivity and make for a flexible environment.
Employees are easily able to access company emails, calendars and other resources from their
own devices. Additionally, the company does not need to provide employees with a device,
reducing costs. A thorough MDM policy reduces the risks associated with BYOD.
Application management
MDM services allow companies to regulate and control the applications used for work
processes. Centralized control processes install specific applications for each employee. For
example, businesses can provide a salesperson with applications that are different from an office
assistant's applications.
Remote control
IT departments can monitor the security of devices at all times with remote control. If needed,
they can prohibit unauthorized access to company data instantly.
Orderly software updates
It is essential to make sure that all systems are up to date for security purposes. MDM solutions
allow companies to update all devices in a coordinated manner.
Data backup
Devices with MDM software automatically back up data based on company policy. For
example, an employer could request backups daily or weekly. This allows you to access your
information from any device when you need it. It also helps you save your data if any of your
devices are lost or stolen.
Different profiles
More complex MDM solutions can split your personal mobile device into work and personal
sections, meaning you can switch in between different profiles. The MDM monitors your work
programs but not your personal apps.
Increased productivity
Whether you participate in BYOD or use a company-issued device, you'll likely have more
access to company resources. Having a device near you can make it easier to respond to emails
or complete other tasks quickly.
Related: How To Get Motivated at Work
How does mobile device management affect you?
Your company's use of MDM can affect you in the following ways:
Signing agreements
You need to be aware of your company's MDM policies since you usually need to sign an
agreement before receiving a device or participating in BYOD. Read any forms or policies
carefully and ask your manager or IT department any questions you have.
Privacy issues
In some cases, if you agree to a BYOD policy, it means that the employer could have access to
all of the data on that device. Read what kinds of information the employer can access and how
they may monitor your activity. If it's an option, create a separate work profile on your device so
employers only track that profile.
You could also see if getting a company-issued device is possible to prevent any privacy
concerns. Having a company device allows you to easily separate your work and personal
information. If BYOD is your only option, see if your employer offers reimbursement for part of
your data plan, which could be an added financial benefit.
Work-life balance
If you are issued a company device, you can turn it off when you want, which can improve your
work-life balance. Read any guidelines about the applications you can download on a company
device and websites you can visit, so you know which ones are better reserved for your personal
device at home.
MDM
In the early 2000, the use of mobile devices started to increase in businesses. Since then, it
has been steadily growing, and mobile devices have become essential tools in today’s
modern workplaces.
Mobile devices help increase flexibility and productivity, but when unmanaged, they can pose
various challenges to organizations. The lack of control and visibility over mobile endpoints and
non-standardized ways of managing these devices can cause inefficiencies and security risks.
Mobile Device Management (MDM) is a great way to create the foundation for secure
enterprise mobility, and in this article, we cover all the essential things you need to know about
MDM:
• What is MDM?
• How does MDM work?
• Benefits
• Most essential MDM features
• Managing different devices
• Use cases
• What is the best MDM software?
What is MDM?
MDM is an abbreviation of Mobile Device Management and refers to the administration of
mobile endpoints, such as smartphones, tablets, and laptops, as part of the broader scope
of Enterprise Mobility Management (EMM). It is the process of managing the entire lifecycle of
mobile devices used in the workplace.
Mobile Device Management is implemented through MDM software with suitable management
features for one or more operating systems. With MDM software, companies can monitor,
manage, and secure their mobile devices to ensure device performance and the safe use of
devices.
MDM, EMM, or UEM?
Today, all three terms, MDM, EMM, and UEM, are used when talking about mobile
device management. Thus, getting the hang of the terminology can be difficult.
In early 2000, the use of mobile devices for corporate use started to boom. However, it took
about ten years before the first mobile device management solutions were launched and Mobile
Device Management (MDM) became a commonly used term. Over the years, the management
capabilities improved, and companies could manage the entire device lifecycle with a single
solution, including device inventory, configuration management, and remote wipe.
Gradually, companies began to have more complex mobility and device management
requirements and Enterprise Mobility Management (EMM) emerged as a new industry term.
EMM covers the entire suite of mobility management solutions, including application, content,
and identity management, whereas MDM focuses solely on mobile devices and their security.
As EMM was explicitly designed for managing the apps and content on mobile devices, it was
not suitable for Windows and Mac management. After a while, Unified Endpoint Management
(UEM), which combines EMM and PC management into one solution, was born.
Today, all three terms, MDM, EMM, and UEM, are used when talking about mobile device
management. Thus, getting the hang of the terminology can be difficult. However, among end-
users, MDM is still the most used, even when talking about EMM or UEM solutions, and
therefore, we chose to use the term “MDM” in this blog post as well.
How do MDM solutions work?
Mobile Device Management software typically runs either on-premise or in the cloud. Through
MDM’s management console, IT admins can remotely configure and manage devices. But
before that, devices need to be enrolled in the MDM software, or in other words, the MDM
server. This can be done through vendor-specific enrollment programs that Apple, Google,
Samsung, and Microsoft offer, or by adding devices manually with a token, QR code, or NFC,
or via email/SMS.
IT admins can use the management console to push configurations and applications to mobile
devices over the air (OTA). Technically speaking, the MDM server (software) sends out a set of
commands that are applied to devices through application programming interfaces (APIs) built
in the operating system.
MDM software sends out a set of commands that are applied to devices through
application programming interfaces (APIs) built in the operating system.
Some MDM vendors offer both cloud-based Software-as-a-Service (SaaS) and on-premise
models. However, SaaS solutions are typically quicker and more cost-efficient to implement as
they don’t require additional hardware. Furthermore, on-premise solutions require management,
monitoring, maintenance, and updates, which all come included in SaaS solutions.
Benefits of using MDM software
While mobile devices help increase efficiency and flexibility, a large number of devices and
their use outside the office can sometimes cause challenges for the IT team — especially when
employees are using various operating systems and device models.
No matter what size of the company you have, MDM provides indisputable benefits,
including reduced support costs, increased employee productivity, and data security.
Therefore, many organizations rely on MDM tools that bring flexibility to both the IT
department and end-users. With MDM, IT admins can securely manage all devices from a single
portal, while employees can choose the devices they prefer to use.
No matter what size of the company you have, MDM provides indisputable benefits, including
reduced support costs, increased employee productivity, and data security. Here are a few
reasons why you should invest in MDM:
1. Control over all corporate mobile devices
When a wide range of devices and operating systems are in use, it can be hard to keep track of
them and establish unified device management processes. With MDM, organizations have better
visibility over their devices as the software pulls valuable data from managed devices. IT teams
know which devices are in use and what’s their security level and organizations can more easily
manage security risks.
MDM also gives full control over the use of devices and the entire device lifecycle. IT admins
can configure devices remotely and handle updates and device replacements on time. And when
an employee leaves the company, all business-related information can be wiped from the device,
and the device can be assigned to a new employee.
2. Data and device security
Unmanaged mobile devices pose various cybersecurity risks. Whereas PCs and laptops typically
have pre-installed malware protection in them, tablets and mobile phones are more vulnerable to
cyber-attacks. MDM offers an effective way to safeguard devices and data and stay compliant
with prevailing data protection regulations, such as GDPR, HIPAA, ELD, and CJIS.
Data and device security can be ensured with several configurations and restriction options. The
use of certain device functionalities or apps can be prohibited, and the use of strong passcodes
can be enforced on devices. And in case the same device is used both at work and in the free
time, the user’s personal data can be separated from work data with secure containers. With
these encrypted containers, companies can ensure that sensitive data does not leak to third
parties, for example, through instant messaging apps.
3. Increased productivity and lower costs
With MDM, organizations can manage every step of device management efficiently from a
single platform and automate device enrollments and configurations, which helps save time and,
ultimately, money.
Especially if you’re managing multiple devices, automation can bring valuable benefits: human
errors decrease, and devices can be setup up to 30 minutes faster. For small and medium-sized
organizations, MDM provides a great way to secure devices without huge investments or the
need to hire an in-house IT specialist. MDM also makes it easier to allow
for BYOD/CYOD policies.
Furthermore, MDM helps increase employee productivity when end-users don’t have to waste
time setting up devices themselves or visit the IT department. Instead, they get pre-configured
devices and access to necessary data and applications from day one.
1. What is MAM?
2. What are the benefits of MAM app protection?
3. What device configurations does MAM support?
4. What are app protection policies?
Adding Office 365 App Protection policies
Policies use data populated from Azure Active Directory during real-time syncs.
Procedure
1. Log into the Admin Portal.
2. Go to Services > Microsoft Graph > Policies > Add.
3. Complete the App protection policies form.Refer to Add Office 365 App Protection
policies window for details.
4. In the Compliance Actions section, select a Setting, enter the value, and select an Action.
Refer to the App protection policies fields table.
5. Click +Add to configure additional compliance actions.
6. Click Save to add the policy to the list of DLP policies on the Policies table.
Editing Office 365 App Protection policies
Policies use data populated from Azure Active Directory during real-time syncs.
Procedure
1. Log into the Admin Portal.
2. Go to Services > Microsoft Graph > Policies.
3. Click the name of a policy you want to edit.
4. Complete the App protection policies form.Refer to Add Office 365 App Protection
policies window for details.
5. In the Compliance Actions section, select a Setting, enter the value, and select an Action.
Refer to the App protection policies fields table.
6. Click +Add to configure additional compliance actions.
7. Click Save to save the policy edits.
Managing Office 365 App Protection policies
You can take any of the following actions on each Office 365 App Protection policy:
• Assign User Groups
• Assign Apps
• Delete Policies
Procedure
1. Log into the Admin Portal.
2. Go to Services > Microsoft Graph > Policies.
3. Locate a policy you want to manage and go to the Actions column.
4. Assign user groups to the App Protection policy.
• Click the Assign User Groups icon.
• Search for user groups.
• Select one or more user groups to add to the policy.
• Click Save.
5. Assign Office 365 apps to the app protection policy.
• Click the Assign Apps icon.
• Search for apps.
• Select one or more apps to add to the policy.
• Click Save.
6. Delete an Office 365 App Protection policy.
• Click the Delete Policy icon.
• Click Yes to confirm deletion of the policy.
The Office 365 App Protection policies take affect:
• After assigning the policy to a user group.
• A user from the assigned user group logs into an Office 365 app using AAD credentials.
Add Office 365 App Protection policies window
Access this window by logging into the Admin Portal and selecting Services > Microsoft
Graph > Policy and clicking Add or clicking a policy to edit.
The following table summarizes fields and descriptions in the Add App Policies window. Also,
refer to the App protection policies fields table.
Table 80. App protection policies fields
Fields Description
Name This required field is the name used to track the Office
365 App Protection policy in Core.
Description Describes the profile’s purpose (optional).
Platform Select the platform for the Office 365 apps. The
options are: iOS or Android. Some of the other
options on this form will change depending on which
platform you select. Refer to the relevant platform's
Device Management Guide.
Data Relocation
Prevent Android backups Choose Yes to prevent this app from backing up data
to the Android Backup Service Choose No to allow
this app to back up data. (The default is Yes.)
Allow app to transfer data to other apps Use this option to specify what apps can receive data
from this app. The options are listed below.
• Policy managed apps: Allow transfer
only to other policy-managed apps.
• All apps: Allow transfer to any app
(default.)
• None: Do not allow data transfer to any
app, including other policy-managed apps.
When any of the above options except All apps are
selected, the exempted apps are listed to the right of
the Allow app to receive data from other apps field.
Modifying these settings changes how data is
transferred to other applications.
Allow app to receive data from other Select an option to specify what apps can transfer data
apps to this app.
• Policy managed apps - Allow app to
receive data from only other policy-managed apps.
• All apps Allow app to receive data from
other apps (default.)
• None - Do not allow app to receive data
from any app, including other policy-managed apps.
Prevent "Save As " Select to disable the use of the Save As (a new
document) option in any app that uses this policy. De-
select if you want to allow the use of Save As. (Default
is unchecked.)
Selecting Prevent Save As activates the Select which
storage services corporate data can be saved to
field. The options are:
• OneDrive for Business
• SharePoint
• Local Storage
Restrict cut, copy and paste with other Specifies when cut, copy, and paste actions can be
apps used with this app. The options are listed below.
• Blocked: Do not allow cut, copy, and
paste actions between this app and any other app.
• Policy managed apps: Allow cut, copy,
and paste actions between this app and other policy-
managed apps.
• Policy managed with paste in: Allow
cut or copy between this app and other policy-managed
apps. Allow data from any app to be pasted into this
app.
• Any app: No restrictions for cut, copy,
and paste to and from this app. (This is the default.)
Block screen capture and Android Check this to block the ability to use screen captures
assistant and block Android assistant. Default is allowed.
Encrypt app data Select to encrypt app data that is associated with
an Intune mobile application management policy.
Encryption is provided by Microsoft. Data is encrypted
synchronously during file I/O operations according to
the setting in the mobile application management
policy. Managed apps on Android use AES-128
encryption in CBC mode utilizing the platform
cryptography libraries. The encryption method is not
FIPS 140-2 certified. SHA-256 encryption is supported
as an explicit instruction using the SigAlg parameter
and will only work on devices 4.2 and above. Content
on the device storage is always encrypted.
Disable app encryption when device This field activates when the Encrypt app data field is
encryption is enabled selected. Disables app encryption when the device
encryption is enabled . Default is de-selected.
Disable contact sync When this setting is enabled, users cannot sync
contacts to the native address book. Default is un-
checked.
Disable printing Select this to block printing protected data from the
app. Default is un-checked.
Restrict web content to display in the Check this to enforce web links in the app to be
Managed Browser opened in the Managed Browser app.
Uncheck this to open web links in Chrome. Default is
de-selected.
Block third party keyboards When this setting is enabled, a third-party keyboard
cannot be used with protected apps.
Access
Require PIN for access Select this to require users to enter a PIN to access this
app. The user is prompted to set up this PIN the first
time the app is run. Default is selected, which activates
all the fields in the Access section of this page.
Allow simple PIN Allow simple PIN: Check this to allow users to use
simple PIN sequences like 1234 or 1111. Choose No to
prevent them from using simple sequences. (The
default value is checked.)
• PIN length: Specify the minimum
number of digits in a PIN sequence. (The default value
is 4.)
When the Require PIN for access field is de-selected,
this field is deactivated.
Allow fingerprint of PIN (Android 6.0+) Select this to allow the user to use Touch ID instead of
a PIN for app access. (The default is checked.)
When the Require PIN for access field is de-selected,
this field is deactivated.
Override fingerprint with PIN after If required, depending on the timeout (minutes of
timeout (minutes) inactivity), a PIN prompt will override Touch ID
prompts. If this timeout value is not met, the Touch ID
prompt will continue to show. This timeout value
specified under "Recheck the access requirements after
(minutes of Activity)". On iOS, this feature requires
the app to have Intune SDK version 8.1.1 or above.
Inactivity timeout: Specify a time in minutes after
which the PIN will override the use of a fingerprint.
When the Require PIN for access field is de-selected,
this field is deactivated.
Disable app PIN when device PIN is Select to disable the app PIN when a device lock is
managed detected on an enrolled device. If you select this
option, it overrides the requirements for PIN or Touch
ID. (The default is unchecked.)
When the Require PIN for access field is de-selected,
this field is deactivated.
Require corporate credentials for access Select to require corporate credentials instead of a PIN
for app access. Not selecting this option overrides the
requirements for PIN or Touch ID. The user will be
prompted to provide their corporate credentials. (The
default is unchecked.)
Recheck the access requirements after Timeout for access requirements is measured in terms
(minutes) of the time of inactivity between any policy-managed
application.
• Timeout: Enter the number of minutes
before the access requirements (defined earlier in the
policy) are rechecked. For example, an administrator
turns on PIN in the policy, which means a when device
user opens a app, a PIN must be entered. When using
the Recheck the access requirements setting, the device
user would not have to re-enter the PIN on any app for
another 30 minutes. (The default is 30.)
Compliance Actions
Use the Compliance Actions Settings to set the security requirements for your access protection
policy. Several settings are provided with pre-configured values and actions.
Procedure
1. Select a Setting, enter the value, and select an Action. Refer to the table below.
2. Click +Add to configure additional compliance actions.
3. At the top of the Policies tab, click Save.
Table 81. Compliance Action Settings
Setting Description
Max PIN attempts (default) Specify the number of tries the device user has to
successfully enter the correct PIN before the
configured action is taken. (Default value is 30
minutes.) Actions include:
• Reset PIN - The user must reset their
PIN.
• Wipe data - The user account that is associated
with the application is wiped from the device.
Offline grace period (default) This is the number of minutes that apps can run
offline. Specify the time (in minutes) before the
access requirements for the app are rechecked. After
this period is expired, the app will Block Access.
The default is 720 minutes (12 hours.)
Offline grace period (default) This is the number of minutes that apps can run
offline. Specify the time (in days) before the access
requirements for the app are rechecked. After this
period is expired, the app will Wipe data. The
default is 90 days.
Jailbroken/rooted device • Block access - Prevent this app from running
on jailbroken or rooted devices. The device user
continues to be able to use this app for personal
tasks, but will have to use a different device to
access data in this app.
• Wipe data - The device user account
that is associated with the application is wiped from
the device
Min OS version Select this to require a minimum operating system
to use this app. Enter the value in the following
format [major].[minor] and select one of the
following actions:
• Block access - The device user will be
blocked from access if the version on the device
does not meet the requirement.
• Wipe data - The device user account
that is associated with the application is wiped from
the device.
• Warn - The user will see a
notification if the operating system version on the
device does not meet the requirement. This
notification can be dismissed.
Min App version Check this option to require a minimum app version
to use the app. The user will be blocked from access
if the app version on the device does not meet the
requirement.
• Block access - The device user will be
blocked from access if the app version on the device
does not meet this requirement.
• Wipe data - The device user account
that is associated with the application is wiped from
the device.
• Warn - The user will see a
notification if the app version on the device does not
meet the requirement. This notification can be
dismissed.
Min Patch version Select to require devices have a minimum Android
security patch released by Google. Click the
calendar icon to select the date for the action below
to occur:
• Block access - The device user will be
blocked from access if the Android version on the
device does not meet this requirement.
• Wipe data - The device user account
that is associated with the application is wiped from
the device.
• Warn - The user will see a
notification if the Android version on the device
does not meet the requirement. This notification can
be dismissed.
Device manufacturer(s) Specify a device manufacturer that is required to use
this app. Actions include:
• Block access - Only devices that
match the specified manufacturer can use the app.
All other devices are blocked.
• Wipe data - The user account that is
associated with the application is wiped from the
device.
————————————————————INTUNE
Microsoft Site Questions
———————————————————
What is MAM?
Intune mobile application management refers to the suite of Intune management features that
lets you publish, push, configure, secure, monitor, and update mobile apps for your users.
Is it possible to have both MDM and MAM policies applied to the same
user at the same time, for different devices? For example, if a user could
be able to access their work resources from their own MAM-enabled
machine, but also come to work and use an Intune MDM-managed
device. Are there any caveats to this idea?
If you apply a MAM policy to the user without setting the device state, the user will get the
MAM policy on both the BYOD device and the Intune-managed device. You can also apply a
MAM policy based on the managed state. So when you create an app protection policy, next to
Target to all app types, you'd select No. Then do any of the following:
• Apply a less strict MAM policy to Intune managed devices, and apply a
more restrictive MAM policy to non MDM-enrolled devices.
• Apply an equally strict MAM policy to Intune managed devices as to 3rd
party managed devices.
• Apply a MAM policy to unenrolled devices only.
For more information, see How to monitor app protection policies.
What if I want to enable an app with Intune App Protection but it is not
using a supported app development platform?
The Intune SDK development team actively tests and maintains support for apps built with the
native Android, iOS/iPadOS (Obj-C, Swift), Xamarin, and Xamarin.Forms platforms. While
some customers have had success with Intune SDK integration with other platforms such as
React Native and NativeScript, we do not provide explicit guidance or plugins for app
developers using anything other than our supported platforms.
What are the additional requirements to use the Outlook mobile app?
• The end user must have the Outlook mobile app installed to their device.
• The end user must have a Microsoft 365 Exchange Online mailbox and
license linked to their Azure Active Directory account. NoteThe Outlook mobile app currently
only supports Intune App Protection for Microsoft Exchange Online and Exchange Server with
hybrid modern authentication and does not support Exchange in Office 365 Dedicated.
What are the additional requirements to use the Word, Excel, and
PowerPoint apps?
• The end user must have a license for Microsoft 365 Apps for business or
enterprise linked to their Azure Active Directory account. The subscription must include the
Office apps on mobile devices and can include a cloud storage account with OneDrive for
Business. Microsoft 365 licenses can be assigned in the Microsoft 365 admin center following
these instructions.
• The end user must have a managed location configured using the granular
save as functionality under the "Save copies of org data" application protection policy setting.
For example, if the managed location is OneDrive, the OneDrive app should be configured in
the end user's Word, Excel, or PowerPoint app.
• If the managed location is OneDrive, the app must be targeted by the app
protection policy deployed to the end user. NoteThe Office mobile apps currently only support
SharePoint Online and not SharePoint on-premises.
How often will the user be prompted for the Intune PIN?
The IT admin can define the Intune app protection policy setting 'Recheck the access
requirements after (minutes)' in the Intune admin console. This setting specifies the amount of
time before the access requirements are checked on the device, and the application PIN screen is
shown again. However, important details about PIN that affect how often the user will be
prompted are:
• The PIN is shared among apps of the same publisher to improve
usability: On iOS/iPadOS, one app PIN is shared amongst all apps of the same app publisher.
On Android, one app PIN is shared amongst all apps.
• The 'Recheck the access requirements after (minutes)' behavior after a
device reboot: A "PIN timer" tracks the number of minutes of inactivity that determine when to
show the Intune app PIN next. On iOS/iPadOS, the PIN timer is unaffected by device reboot.
Thus, device restart has no effect on the number of minutes the user has been inactive from an
iOS/iPadOS app with Intune PIN policy. On Android, the PIN timer is reset on device reboot.
As such, Android apps with Intune PIN policy will likely prompt for an app PIN regardless of
the 'Recheck the access requirements after (minutes)' setting value after a device reboot.
• The rolling nature of the timer associated with the PIN: Once a PIN is
entered to access an app (app A), and the app leaves the foreground (main input focus) on the
device, the PIN timer gets reset for that PIN. Any app (app B) that shares this PIN will not
prompt the user for PIN entry because the timer has reset. The prompt will show up again once
the 'Recheck the access requirements after (minutes)' value is met again.
For iOS/iPadOS devices, even if the PIN is shared between apps from different publishers, the
prompt will show up again when the Recheck the access requirements after (minutes) value
is met again for the app that is not the main input focus. So, for example, a user has app A from
publisher X and app B from publisher Y, and those two apps share the same PIN. The user is
focused on app A (foreground), and app B is minimized. After the Recheck the access
requirements after (minutes) value is met and the user switches to app B, the PIN would be
required.
Note
In order to verify the user's access requirements more often (i.e. PIN prompt), especially for a
frequently used app, it is recommended to reduce the value of the 'Recheck the access
requirements after (minutes)' setting.
How does the Intune PIN work with built-in app PINs for Outlook and
OneDrive?
The Intune PIN works based on an inactivity-based timer (the value of 'Recheck the access
requirements after (minutes)'). As such, Intune PIN prompts show up independently from the
built-in app PIN prompts for Outlook and OneDrive which often are tied to app launch by
default. If the user receives both PIN prompts at the same time, the expected behavior should be
that the Intune PIN takes precedence.
How does Intune protect the PIN against brute force attacks?
As part of the app PIN policy, the IT administrator can set the maximum number of times a user
can try to authenticate their PIN before locking the app. After the number of attempts has been
met, the Intune App SDK can wipe the "corporate" data in the app.
What is wipe?
Wipe removes all user data and settings from the device by restoring the device to its factory
default settings. The device is removed from Intune.
Note
Wipe can only be achieved on devices enrolled with Intune mobile device management (MDM).
Why is the Company Portal app needed for Intune app protection to
work on Android devices?
Much of app protection functionality is built into the Company Portal app. Device enrollment
is not required even though the Company Portal app is always required. For MAM-WE, the end
user just needs to have the Company Portal app installed on the device.
There are two similar checks in the Conditional Launch section when
creating an Intune App Protection Policy for Android devices. Should I
be requiring the 'SafetyNet device attestation' setting or the
'jailbroken/rooted devices' setting?
Google Play Protect's SafetyNet API checks require the end user being online, atleast for the
duration of the time when the "roundtrip" for determining attestation results executes. If end
user is offline, IT admin can still expect a result to be enforced from the 'jailbroken/rooted
devices' setting. That being said, if the end user has been offline too long, the 'Offline grace
period' value comes into play, and all access to work or school data is blocked once that timer
value is reached, until network access is available. Turning on both settings allows for a layered
approach to keeping end user devices healthy which is important when end users access work or
school data on mobile.
The app protection policy settings that leverage Google Play Protect APIs
require Google Play Services to function. What if Google Play Services
are not allowed in the location where the end user may be?
Both the 'SafetyNet device attestation', and 'Threat scan on apps' settings require Google
determined version of Google Play Services to function correctly. Since these are settings that
fall in the area of security, the end user will be blocked if they have been targeted with these
settings and are not meeting the appropriate version of Google Play Services or have no access
to Google Play Services.
I am able to use the iOS share extension to open work or school data in
unmanaged apps, even with the data transfer policy set to "managed
apps only" or "no apps." Doesn't this leak data?
Intune app protection policy cannot control the iOS share extension without managing the
device. Therefore, Intune encrypts "corporate" data before it is shared outside the app. You
can validate this by attempting to open the "corporate" file outside of the managed app. The file
should be encrypted and unable to be opened outside the managed app.