This is the third in our trilogy of articles on the management by Microsoft Intune of non-Microsoft hardware, specifically the Apple iOS platform. In previous installments we discussed how Intune is an excellent security solution for the iOS platform, providing the ability to not only demand such things as sufficiently complex device passwords, and ensuring they are not reused frequently, to preconfiguring the devices so that end users don’t have to ask colleagues or a helpdesk how to get onto the Wi-Fi or configure their email app.
But Intune does more, specifically in the deployment to—and management of—applications on the devices that have been enrolled into it.
Intune gives you the ability to deploy apps to end-users by adding them to the Intune portal. Administrators choose which apps are available to each group of users. Intune can also push an app to a device, regardless of whether or not the user wants to receive it. Pushing an application can be particularly useful if the app is a challenge to find in the app store or when the device is shared (e.g., in a factory/warehouse/POS type of environment).
Intune can also facilitate the removal of an app, but only if that app was deployed using Intune. An app that an end-user downloaded it themselves cannot be removed simply because the management team thinks it’s a distraction. Intune’s security and compliance policies prevent apps being loaded in the first place.
Adding an app for iOS is extremely easy. Whereas for Android you need to go to the store, search for the app and copy the URL, the Intune portal is integrated in such a way that administrators only need to click to add an app, select the platform (iOS in this case), then type the name of the app (as shown below).
Once selected, it is possible to modify the app. For example, for MS Teams, the physical platform can be tailored: iPad or iPhone. The operating system of the device can also be specified, forcing anyone who needs the particular application to upgrade their device to an acceptable version. In addition, if this is a new app, administrators might wish for it to appear on the Intune app home screen in the same way news or announcements might appear on the company Intranet page.
The final option is how the app will be deployed. As shown earlier, the ability to highlight the app is available, but sometimes the company may want to deliver the app automatically rather than wait for users to go to the Intune app to install the new app. Selecting an app to be “Required” will force the app to be sent to an enrolled device.
Not all users have to be assigned an app. If you choose to add, for example, Salesforce from the Apple app store, but you don’t need the IT support team to have the app, administrators can ensure that only the Sales team are in the group that will deploy the app.
Some settings are available to administrators so a corporate standard can be applied. This assists in troubleshooting helpdesk tickets as they arise, since support staff would be starting from a known configuration.
Take Outlook as an example. Outlook is a very popular application, one that probably also has the most configurable options in the entire Microsoft 365 suite of applications.
Observe the focused inbox setting in the first image below and the sync-contacts option shown in the second image. Both are typical bones of contention. Many users don’t like the focused inbox—which is on by default—and just as many users want to sync their Outlook contacts to their devices—a feature that is off by default. To save time, administrators might canvass their individual organizations and review which of these settings would help reduce calls to the help desk.
Configuring applications from the Apple App store for a Microsoft world is a very administrator-friendly process, allowing the administrator to do all provisioning and configuration tasks from a single screen. For administrators, Intune ensures the right apps are deployed to the right users and devices—with the right configuration.
To review the first two installments of this Intune series, here are links to Post I and Post II. Again, if you have any questions about maintaining device compliance, or any other aspect of device management, please don’t hesitate to reach out to us. We’d love to help ensure your organization is safe and secure.
Microsoft Architect
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.