First steps with Intune - Governance & Intune Components

First steps with Intune - Governance & Intune Components

First steps with Intune - Governance & Intune Components

François Péroux
François Péroux
François Péroux
Jul 10, 2022
Jul 10, 2022
Jul 10, 2022

In this article, we will discuss the case of an attack that is becoming very popular: MFA Fatigue and how to reduce the risk of success of this threat with Azure AD.

Defining Mobile Device Management Governance

The following table contains most of the questions and answers that need to be defined to help you define your mobile device management governance.

The following table contains most of the questions and answers that need to be defined to help you define your mobile device management governance.

You can copy and use it, the answers in it are for example.

With these different answers, it is now possible to translate these business requirements into technology capabilities and start building the Intune solution around these specific needs.

Microsoft Intune's Configuration elements

Intune is broken down into several elements to manage the entire fleet of the company's devices.

Mobile device enrollment settings

They allow you to manage the different Operating Systems (OS) that can register on Intune, the device enrollment limits per user but also the general connection & configuration settings between Intune and the different OS - Android, Apple, Windows.


Compliance Policies

These settings govern the rules that devices must comply with in order to register with Intune, according to the rules established by the company.

Example:

  • The device must not be in Root/Jailbroken mode,

  • 5-character PIN is required to unlock the phone

  • Ask for a minimum level of security


Mobile Configuration profiles

Here we can talk about the mobile device management (or MDM) section.Profiles allow you to push configurations on mobiles.

Example:

  • Being able to block screenshots,

  • Request encryption of the device's memory,

  • Block the use of certain means of biometrics (such as facial recognition)


Application protection policies

This is the mobile app management section in Intune (or Mobile Application Management - MAM).

In this section, it is possible to establish the rules for protecting enterprise-managed applications.

Note:

It's important to understand that these rules only apply to managed apps and data that belongs to the company.


The personal portion of applications and data is in no way affected by these management and security rules.

Similarly, if an employee leaves the company, you can easily and remove the company's apps and data without impacting the employee's personal data and apps.


Application configuration policies

With the same MAM logic, application configuration policies are useful when you want to configure in a personalized way, the different applications managed by the company.

Outlook application can be customized to:

  • Automatically configure the company account

  • Use of the default signature

  • Display of an alert if an external recipient is added to an email


Application deployment

To close on the MAM portion, Intune also allows you to deploy applications on Android, iOS/iPadOS, MacOS and Windows.

Each Operating System has its particularities. It's also possible to install or even uninstall apps according to user groups (or personas) centrally through the Intune app management console.


In the next article, we will explore each of the configuration items in order to meet the different business needs that have been established.





Comments

Comments

Comments