Microsoft Intune features a bunch of tools and cyber security benefits for mobile device management within a business. Intune forms a part of the Microsoft Enterprise Mobility + Security package, which is a comprehensive device management suite. Due to being a cloud-based tool, Intune serves your organisation regardless of where you are and has the flexibility to grow with your business too.

Evaluating the range of Microsoft Intune features is a valuable part of product research. It can absolutely influence your decision when trying to decide what you want and need out of a mobile device management tool.

These are our favourite Microsoft Intune features that don’t require a technical IT qualification to understand:

Microsoft Intune Features


1. Define Your Own Protection Policies:

First of all, Microsoft Intune allows you to create your own protection policies so you can control who has access to company data. It allows you to ensure that data stays protected by controlling how they use it within Office and other apps. You can define access based on users, location, device state, app sensitivity and real-time risk.

2. Remotely Managed Devices:

As a cloud-based tool, Microsoft Intune enables you to manage enrolled devices remotely, eliminating the need for on-premise management infrastructure. Consequently, the admin can manage all client devices from anywhere so long as they have an internet connection.

3. Reports and System Logs:

Another underrated Microsoft Intune feature is their comprehensive reports and system logs which allows you to view software inventories with great detail. So, you can create reports that retrieve information on particular types of installed software on managed devices. These can drill down into specific detail and can be exported as csv or html formats.

4. Task Creation and Management:

You can create, manage and execute tasks remotely on managed devices, such as enforcing policy updates, or device restarts. Furthermore, you can set up these remote tasks that force client machines to update their policies or restart as soon as they’re back online. The admin console allows you to view if tasks are still queued, running, successful or failed, and you can select multiple devices for one task instead of handling each device individually.

5. Deploy Software and Updates:

Push software packages and updates to managed devices, through the Administration Console. You have the choice to silently push the update through, or make an install package available for download. Regardless, the install package is encrypted on the administrator’s machine and uploaded to the cloud.

6. Centralised Control Portal:

Intune streamlines the device management process by allowing you to manage all devices from the cloud with no infrastructure required. Connect Intune to the configuration manager to manage all devices (PC, Mac, Linux, UNIX servers and mobile devices) from a single management console.

7. Manage Office Mobile Apps:

Another easy element is that you can control Office 365 applications down to a detailed level. For example, you can restrict access to email, or OneDrive documents if the user should log-in from an unapproved device. Also enforce conditional access policies for apps like SharePoint, Exchange and Skype.

8. Microsoft Malware Protection Engine:

Microsoft Intune features the same protection engine that comes with the highly regarded Microsoft Security Essentials (MSE) package. As a result, the Intune malware engine protects against viruses and spyware, and utilises the same definitions and research used by MSE.

9 Mobile Application Management:

Manage mobile apps that your employee’s may wish to use for their work functions, or a business app you’ve created yourself. Create and enforce app protection policies to ensure organisational data remains safe and contained within a managed app. As a result, you can restrict users from copying or moving documents or files.

10. View Hardware Configurations:

Intune enables you to view the basic hardware configuration of managed PCs, including software that’s been installed on the client system. Perform inventory scans to detect any unapproved, or unlicensed applications running on a device.

To conclude, Intune features a range of abilities to manage and secure your data, and to manage mobile devices in this culture of “bring your own device”. Above all, it gives you increased work mobility and flexibility, and protects your information at the same time. With reduced burden on IT, low costs and increased productivity, Intune therefore shapes up to be a very powerful tool indeed.

If you need a hand to work out if Intune is for you or you need help rolling Intune out, give our team a call today.