Skip to content

Microsoft Intune Webinar

Microsoft Intune: Modern Device Management

Section titled “Microsoft Intune: Modern Device Management”

In the realm of modern IT management, ensuring a seamless and secure user experience across diverse device ecosystems is paramount. The recent Microsoft Intune webinar provided a deep dive into the latest advancements in device management, focusing on zero-touch deployment for macOS and Windows, security and compliance, app protection for mobile devices, and innovative tools like Microsoft Tunnel and Admin By Request.


1. Zero-Touch Deployment: Simplifying Device Setup

Section titled “1. Zero-Touch Deployment: Simplifying Device Setup”

The webinar highlighted how Microsoft Intune streamlines the setup process for both macOS and Windows devices through zero-touch deployment. This approach allows IT administrators to pre-configure devices with all necessary settings, applications, and security policies before they even reach the end-user. This not only speeds up the onboarding process but also ensures that devices are compliant with organizational standards from the moment they are powered on.

Platform-Specific Solutions:

  • Windows Autopilot: Automated provisioning and configuration of new PCs
  • Apple Business Manager Integration: Streamlined enrollment and configuration for macOS devices
  • Pre-Configuration: Settings, apps, and policies deployed before user access

Business Value:

  • Reduced device setup time and manual intervention
  • Consistent security standards from device activation
  • Enhanced user experience with ready-to-use devices

2. Security and Compliance: Keeping Devices in Check

Section titled “2. Security and Compliance: Keeping Devices in Check”

The webinar emphasized Intune’s robust capabilities for maintaining security and compliance across managed devices. Intune’s compliance policies enable administrators to enforce configurations, update schedules, and security baselines, ensuring that all devices adhere to organizational standards.

Key Capabilities:

  • Compliance Policies: Automated enforcement of security standards
  • Update Management: Centralized control over software updates
  • Security Baselines: Pre-configured security best practices
  • Real-Time Monitoring: Continuous compliance status tracking

Business Value:

  • Consistent security posture across all endpoints
  • Reduced vulnerabilities through automated compliance
  • Simplified regulatory adherence and reporting

3. App Protection for Mobile: Safeguarding Corporate Data

Section titled “3. App Protection for Mobile: Safeguarding Corporate Data”

With mobile devices increasingly becoming vectors for data breaches, the webinar underscored the importance of app protection policies. Intune’s app protection capabilities allow IT administrators to enforce data protection policies at the application level, irrespective of the device’s management status. This means sensitive corporate data remains secure even on personal devices, with controls that prevent unauthorized sharing, copying, or saving of data.

Protection Features:

  • Application-Level Controls: Data protection independent of device management
  • Personal Device Security: Corporate data protection on BYOD devices
  • Data Leakage Prevention: Controls on sharing, copying, and saving
  • Conditional Access: App-based access requirements

Business Value:

  • Enhanced data security on personal devices
  • Reduced risk of corporate data breaches
  • Support for flexible work arrangements without compromising security

Microsoft Tunnel was a focal point in the discussion on securing remote access. This VPN solution integrates with Intune to provide secure, seamless access to corporate resources from mobile devices. It ensures that connections are encrypted and managed in line with organizational security policies, offering a secure conduit for remote work without compromising on performance.

Key Capabilities:

  • Secure VPN Access: Encrypted connections to corporate resources
  • Mobile Device Support: Optimized for smartphones and tablets
  • Policy Integration: Seamless connection with Intune compliance policies
  • Performance Optimization: Minimal impact on user experience

Business Value:

  • Secure remote work capabilities
  • Consistent security policy enforcement
  • Enhanced productivity for mobile workforce

5. Admin By Request: Controlled Privilege Management

Section titled “5. Admin By Request: Controlled Privilege Management”

The webinar also introduced Admin By Request, a tool designed to help organizations manage local admin rights on Windows devices. Admin By Request allows users to request temporary admin privileges for specific tasks, which are then granted based on IT approval. Once the task is complete, these privileges are revoked, reducing the risk associated with permanent administrative access and enhancing overall security.

Key Features:

  • Temporary Privilege Elevation: Time-limited admin access
  • IT Approval Workflow: Controlled privilege granting process
  • Automatic Revocation: Privileges removed after task completion
  • Audit Trail: Complete logging of admin access requests

Business Value:

  • Reduced security risk from permanent admin access
  • Balanced user productivity with security requirements
  • Enhanced compliance with principle of least privilege

Management AreaSolutionPrimary Benefit
Device DeploymentZero-Touch DeploymentReduced setup time and consistent configuration
Security ComplianceCompliance PoliciesAutomated security standard enforcement
Data ProtectionApp ProtectionCorporate data security on any device
Remote AccessMicrosoft TunnelSecure connectivity for mobile workforce
Privilege ManagementAdmin By RequestControlled admin access with audit capabilities

PhaseFocusKey Actions
PlanningDevice inventoryAssess current device landscape and requirements
ConfigurationPolicy setupEstablish compliance and security baselines
DeploymentZero-touch setupConfigure Autopilot and device enrollment
ProtectionApp securityImplement mobile application protection policies
MonitoringCompliance trackingContinuous monitoring and remediation

Efficient Device Deployment: Zero-touch deployment for macOS and Windows significantly reduces the time and effort required to set up new devices, ensuring a smooth and secure onboarding process.

Robust Security and Compliance: Intune’s comprehensive security and compliance features help maintain organizational standards across all devices, reducing vulnerabilities and enhancing data protection.

App Protection: Protecting corporate data at the application level ensures that sensitive information remains secure, even when accessed from personal devices.

Secure Remote Access: Microsoft Tunnel provides a secure and efficient way for remote users to access corporate resources, aligning with modern remote work requirements.

Controlled Admin Access: Admin By Request allows for temporary elevation of privileges, balancing user needs with security considerations.


For those who missed the live session or want to revisit the insightful discussions, you can access the full recording of the Microsoft Intune webinar here:

This resource will provide you with a detailed view of how these advanced features can be leveraged to enhance your device management strategy. Whether you’re looking to implement zero-touch deployment or bolster your security posture, the insights from this webinar are invaluable for navigating the complexities of modern IT management.