Endpoint management

Endpoint management with Microsoft Intune

Many organisations use Intune, but fewer have a consistent baseline, a clear device lifecycle and a defined link to the access model. That is the difference between having Intune and actually using it well.

Many organisations say they have Microsoft Intune in place. In practice, that often means some Windows devices are enrolled, a few compliance policies exist, and there may be a handful of configuration profiles that nobody is entirely sure who owns anymore. That is not the same as mature endpoint management.

A strong Intune setup is not just a collection of policies. It is an operating model where devices are onboarded consistently, measured against a clear security baseline, linked to access control and handled properly throughout their lifecycle. When that model is in place, Intune becomes a real security and operations platform. When it is not, Intune easily turns into another admin layer that only partially delivers.

Microsoft describes Intune as a cloud-based endpoint management service in the official Microsoft Learn introduction. That is accurate, but for most organisations the more important question is what Intune should connect: device identity, security requirements, user experience and access to business data.

Intune creates the most value when it becomes part of the access model

The most mature Intune setup is rarely the one with the highest number of policies. It is the setup where there is a clear link between device state and what the user is allowed to access. If a laptop is properly enrolled, encrypted, updated and protected, it can be used to access Microsoft 365, internal SaaS services and privileged tools. If it does not meet those requirements, access is restricted or denied.

That is why endpoint management should not be treated as an isolated infrastructure track. Intune only reaches full business value when it works together with Microsoft Entra Conditional Access. Microsoft’s documentation on Conditional Access and Intune describes that relationship directly: the device compliance state becomes a signal in the access decision.

This is also where the difference between a partial and a mature setup becomes obvious. In a partial setup, Intune is used to push some settings. In a mature setup, Intune helps determine which devices the organisation actually trusts.

Compliance is not the same as configuration

One of the most common misunderstandings is that compliance policies and configuration profiles are the same thing. They are not.

Configuration is about what should be set on the device. That may include BitLocker, firewall, password requirements, Defender settings or browser controls. Compliance is about the minimum state the device must meet to be regarded as acceptable. Microsoft outlines the model in Get started with compliance policies.

That distinction matters. If an organisation only deploys configuration but does not define clear compliance requirements, it becomes difficult to use device state operationally. You may know what you tried to configure, but not whether the device actually meets a minimum standard that can be used in the access model.

A good compliance baseline is usually simple and enforceable:

  • Encryption must be enabled.
  • The operating system must be supported and above a minimum version.
  • The device must not be rooted or jailbroken.
  • Antivirus and central security capabilities must be active.
  • Password or PIN requirements must be met.

That may sound basic, but that is the point. Compliance should be clear enough to drive Conditional Access and stable enough that the operations team can explain to users why a device was marked non-compliant.

Security baselines are where the standard becomes concrete

Many Intune environments suffer from the same problem: policies have grown over time, often in response to one-off requirements, audits or specific incidents. The result is an uneven policy estate where overlap, conflicting settings and legacy profiles create more complexity than security.

Microsoft’s security baselines in Intune are not perfect templates for every business, but they are a strong starting point. They provide a documented minimum across areas such as Windows, Microsoft Edge and Defender, so the organisation does not start from zero or build its entire security model on isolated individual profiles.

A mature setup uses baselines as the foundation and only customises when there is a specific reason. That could be an application dependency, a browser requirement or a justified operational exception. But the starting point is still a coherent baseline, not an accumulation of historical one-off decisions.

In practice, a baseline for Windows devices will usually include:

  • BitLocker with documented key escrow.
  • Defender Antivirus and relevant endpoint security settings.
  • Firewall enabled.
  • Control of local administrator rights.
  • Browser hardening and phishing protection defaults.
  • Update governance through rings and a clearly supported version standard.

This is not necessarily advanced. The maturity comes from consistency. If most devices look similar from a security perspective, support becomes easier, risk assessment becomes more credible and troubleshooting becomes faster.

Enrollment should follow ownership model and platform

Enrollment is often where Intune programmes lose momentum. Not because the technology is especially hard, but because the organisation has not decided which device types it truly wants to support and how different ownership models should be handled.

For Windows, Windows Autopilot is usually the right direction for corporate-owned devices. It creates a more standardised provisioning experience, reduces manual effort and gives you a stronger connection between procurement, delivery and onboarding. If a new employee can receive a laptop directly from the supplier and complete a controlled first-run setup, that is a clear sign of maturity.

For mobile devices, the picture is more nuanced. Corporate-owned phones should normally be fully enrolled and managed as devices. Personal phones should not automatically be treated the same way. In those cases, App Protection Policies are often a better answer than full device enrollment, because they protect company data in Outlook, Teams and other apps without placing the entire private device under the same management model.

The key point is not to force every scenario into one pattern. The key point is to have a deliberate model:

  • Which platforms are supported?
  • Which devices are corporate-owned?
  • Which scenarios are accepted as BYOD?
  • When do we require full enrollment, and when is app-level protection sufficient?

Organisations that do not make those decisions early usually end up with an Intune environment where policies are technically possible but operationally weak.

Device lifecycle is where maturity becomes visible

One of the clearest signs of an immature setup is when Intune is only considered during onboarding. Devices are enrolled, receive some profiles and are then more or less left alone. That is not enough.

A mature endpoint model describes the full lifecycle:

  1. Procurement and registration of corporate-owned devices.
  2. Standardised provisioning and enrollment.
  3. Ongoing patching, compliance follow-up and support.
  4. Role or department changes where assignments and policies are adjusted.
  5. Reassignment, retirement or wipe during exit or hardware replacement.

Microsoft documents the core actions for retire, wipe and other device actions. Those are not just technical buttons. They are part of the operational discipline that determines whether old devices remain active unnecessarily, whether data is removed correctly and whether hardware can be reused without introducing security or support problems.

Many organisations also underestimate the importance of ownership data, group assignment and naming standards. Without those elements, it becomes hard to answer basic operational questions: who owns this device, which baseline should it receive and why is it in the wrong policy ring?

If Intune is not connected to Conditional Access, much of the strategic value is lost. You may still gain better visibility and management, but not a real mechanism for using that management in access decisions.

The most common and sensible model is that selected resources require a compliant device. That typically includes Microsoft 365, administrative portals and applications with sensitive data. For BYOD scenarios, the requirements may differ, so the user can access data through protected mobile apps but not through a fully open browser session.

What matters is designing the access model in layers. Not every workload needs the same requirement, and not every user should be treated identically. But there must be a clear relationship between risk level and device requirement. Otherwise compliance becomes a reporting field rather than a control.

Another maturity indicator is that Conditional Access is introduced carefully. Report-only testing, pilot groups and clear break-glass exclusions are not bureaucracy. They are what prevent a sound security intention from turning into a self-inflicted operations problem.

The mistakes we see over and over again

There is a pattern in Intune environments that only partially deliver.

Mistake 1: Too many policies too early. Teams try to solve every conceivable requirement at once. The result is overlap, unclear precedence and an environment that nobody feels safe changing later.

Mistake 2: No clear baseline. There may be many profiles, but nobody can say what the organisation’s minimum standard actually is.

Mistake 3: Enrollment without an operating model. Devices enter Intune, but there is no repeatable process for patching, reviewing non-compliant devices, offboarding or reassignment.

Mistake 4: No real connection to access. Compliance is measured, but not used. That removes a large part of the security effect.

Mistake 5: Treating BYOD as an annoyance instead of a design choice. The result is either too little control or a user experience that pushes people toward resistance and workarounds.

The important point is that none of these failures mean Intune is the wrong tool. They mean there is no operational model around the tool.

A practical maturity path for most organisations

For most mid-sized organisations, a four-step path is realistic.

Step 1: Establish platform scope, ownership and inventory

First, know which devices you actually have, which platforms you will support and which devices are corporate versus personal. Without that, everything else stays vague.

Step 2: Build baseline and compliance

Define a common minimum standard, clean up legacy profiles and make compliance clear enough that it can be used actively. This is where Intune moves from administration to control.

Step 3: Tie device state to access

Introduce Conditional Access controls that reflect risk and data value. Start with the most important workloads and expand from there.

Step 4: Operate, measure and improve

Once the foundation works, the focus shifts to the operating model: review of failing devices, patch compliance, hardware renewal, onboarding quality and exception handling.

That is a more realistic path than trying to build a perfect enterprise-grade endpoint estate on day one. Maturity in endpoint management usually comes from discipline and iteration, not from one large implementation event.

A realistic operating model is more grounded than many expect

There is a tendency to talk about endpoint management as a purely technical project. In reality, it works best as a standing operations capability with clear ownership and a simple cadence.

A realistic model in a mid-sized organisation may look like this:

  • One platform owner is responsible for Intune design, baselines and policy governance.
  • Service desk or operations handles daily follow-up on enrollment failures, non-compliant devices and standard support.
  • Security approves the baseline, access requirements and exceptions.
  • HR and IT are connected around the joiner-mover-leaver process.

There should also be a regular cadence, often monthly, to review:

  • Devices outside compliance.
  • Devices that have not checked in for an extended period.
  • New exceptions and whether they are still justified.
  • Patching status and version spread.
  • Devices approaching end of support or hardware refresh.

This does not sound dramatic, and that is exactly the strength. Good endpoint management is often boring in the right way. It reduces variation, surprises and uncertainty in daily operations.

What this means for your organisation

The important question is not whether you have Intune. It is whether Intune is actually being used to create a more secure and more supportable endpoint environment. If compliance is vague, if the baseline is unclear, if enrollment is inconsistent and if Conditional Access does not actively use the device signal, you are only getting part of the value.

A mature Intune setup gives something concrete back to the business: faster onboarding, more consistent devices, fewer local exceptions, better data protection and an access model that distinguishes more clearly between trusted and untrusted endpoints. That is the difference you can feel in both security and operations.

At inciro, we help organisations define the baseline, clean up the policy estate, design the enrollment model and connect Intune properly to Conditional Access so endpoint management becomes part of the wider security architecture rather than just another administration tool.


Book a strategic conversation - we will review your current Intune setup and show what it takes to move from partial control to a mature endpoint operating model.

Book a strategic conversation

Related service

Need help with this?

If this topic is relevant in your Microsoft environment, we are happy to have a concrete conversation about sensible next steps.

Intune