We compared Microsoft Intune and Microsoft Entra ID based on our user's reviews in several parameters.
Microsoft Intune and Microsoft Entra ID both offer valuable features such as efficient device management and seamless authentication processes. Intune focuses on security measures and integration with enterprise systems, while Entra ID emphasizes user-friendly interfaces and platform integration. Users praise Intune for its prompt customer service and cost-effectiveness, while Entra ID users appreciate its affordability and efficiency. However, Intune users suggest improvements in user interface and performance, while Entra ID users seek enhancements in UI design and customization options.
Features: Microsoft Intune and Microsoft Entra ID have different valuable features. Intune offers data wipe and device reset, integration with enterprise systems, and control over user access. Entra ID focuses on user-friendly interface, efficient authentication, and seamless integration with platforms.
Pricing and ROI: The setup cost for Microsoft Intune is praised for its reasonable pricing and cost-effectiveness. Users find the licensing options to be flexible and accommodating. On the other hand, users have expressed a positive sentiment towards Microsoft Entra ID's pricing, setup cost, and licensing. They appreciate the affordability, competitive pricing, and user-friendly setup process. The licensing options are also seen as flexible and suitable for various needs and budgets., The ROI from Microsoft Intune demonstrated effective cost management, increased productivity, secure device management, streamlined workflows, seamless integration, time savings, enhanced user experience, and improved security measures. On the other hand, Microsoft Entra ID offers significant cost savings, improved efficiency, streamlined business processes, and increased productivity.
Room for Improvement: Microsoft Intune could improve its user interface, speed, customization options, and troubleshooting features. On the other hand, Microsoft Entra ID needs enhancements in its user interface, optimization for different devices, usability, sign-up process, customization options, and security features.
Deployment and customer support: The users' reviews for Microsoft Intune indicate that the duration to establish the tech solution can vary, with some users reporting separate phases of deployment and setup, while others consider both terms to refer to the same period. On the other hand, Microsoft Entra ID user reviews also show variability in the duration required, with some users reporting distinct deployment and setup phases, and others considering them as one., The customer service provided by Microsoft Intune is highly praised for its prompt assistance and knowledgeable support staff. Customers value feeling supported throughout their interactions. In comparison, Microsoft Entra ID's customer service is highlighted for its exceptional efficiency, reliability, and helpfulness. The support team is praised for their friendliness, professionalism, and effective communication, ensuring seamless problem resolution.
The summary above is based on 193 interviews we conducted recently with Microsoft Intune and Microsoft Entra ID users. To access the review's full transcripts, download our report.
"Azure Active Directory provides access to resources in a very secure manner. We can detect which user is logging in to access resources on the cloud. It gives us a comprehensive audit trace in terms of from where a user signed in and whether a sign-in is a risky sign-in or a normal sign-in. So, there is a lot of security around the access to resources, which helps us in realizing that a particular sign-in is not a normal sign-in. If a sign-in is not normal, Azure Active Directory automatically blocks it for us and sends us an email, and unless we allow that user, he or she won't be able to log in. So, the User Identity Protection feature is the most liked feature for me in Azure Active Directory."
"The solution adds an extra layer of security."
"This product is easy to use."
"Technical support has been great."
"It has things like conditional access. For example, if someone is accessing sensitive information, then we could force them to do multi-factor authentication. Therefore, we can stop access if it is coming from a location that we did not expect."
"https://www.itcentralstation.com/product_reviews/microsoft-bi-review-52460-by-amanda-zhou"
"We use Verified ID to select and deselect users. During the pandemic, we had many users who left our organization or were no longer involved in certain projects but had their user credentials with them. To prevent data loss and data piracy, we deselected those remote users from Active Directory, and it was a very quick process."
"The self-password reset if it's enabled and configured properly, really helps a company be able to reset rather than getting IT involved."
"The standout features of Intune are its excellent mobile device management and highly effective application management capabilities."
"The biggest benefits of Intune are the ability to push changes and the added security. When we moved forward with Defender, we onboarded all those machines automatically. That helps dramatically. For a while, we were left with machines that weren't protected. We could see where people had done things they shouldn't have done, and Defender saved our skins a few times. It didn't happen a lot, but it happened enough that it made us glad we made that decision."
"The solution is stable."
"It is a stable solution."
"Intune provides full visibility into all active mobile device users. If their devices are noncompliant with our security policies, I have the flexibility to update them remotely."
"We already use a lot of Microsoft products in our company, and therefore, it made sense to also use this product."
"I haven't used other mobile device management solutions, but compared to SCCM, we eliminate a lot of on-premises infrastructure and maintenance by using Intune."
"We can securely manage both company-owned devices and personal devices enrolled in our BYOD program."
"We would like to have more granularity in the Azure conditional access in order to be able to manage more groups for devices and for applications."
"The conditional access rules are a little limiting. There's greater scope for the variety of rules and conditions you could put in that rules around a more factual authentication for other users. If you have an Azure AD setup, you can then connect to other people's Azure AD, but you don't have a huge amount of control in terms of what you can do. Greater control over guest users and guest access would be better. It's pretty good as it is but that could be improved."
"It would be ideal if the solution moved to a passwordless type of environment. It's the future of authentification. It's also more secure and convenient."
"Azure Active Directory could benefit by adding the capability for identity life cycle for the on-premise solution. For example, an HR solution, which is built on-premise or, in general, better on-premise capable solutions."
"Azure Active Directory could improve by having an authentication service for laptops or desktop computers running Mac and Linux operating systems. They currently have authentication capabilities for Microsoft Windows. Having this capability would benefit people because in today's world everybody is working from the home environment."
"Definitely, the price could be lower. When we moved from AWS to Azure, we started paying more."
"It would be an improvement if Authenticator made it easier to recover the app if you reboot your cellphone and lose access."
"There is a concept of cross-tenant trust relationships, which I believe Microsoft is actively pursuing. That is something which in the coming days and years to come by will be very key to the success of Azure Active Directory, because many organizations are going into mergers and acquisitions or spinning off new companies. They will still have to access the old tenant information because of multiple legal reasons, compliance reasons, and all those things. So, there should be some level of tenant-level trust functionality, where you can bring people from other tenants to access some part of your tenant application. So, that is an area which is growing. I believe Microsoft is actively pursuing this, and it will be an interesting piece."
"I wanted to check if there is any provision at the Intune level to restrict certain things, such as a website, but unfortunately, that feature is available only in Microsoft Defender. Intune has web filtering capabilities, but they are only useful for protection from malicious websites, whereas we would like to be able to restrict a website. For example, YouTube is a clean website. No one would identify it as a malicious website, but if we want to stop the end-users from going to that website, we have to go for another product, such as Microsoft Defender or another third-party proxy solution. It would be great if this capability is included in Intune."
"An issue we have run into with Microsoft Endpoint Manager is that we cannot patch third-party products like Adobe and Chrome with it."
"It would be helpful if there was proactive remediation."
"It would be beneficial to have a more straightforward understanding of Intune's capabilities, presented in a simplified manner."
"I would like to see easier pushdowns. Currently, we have to package our own software and then push it. Intune can make that way easier and integrate applications, such as Zoom and Adobe Acrobat, that are used by a lot of enterprise or corporate organizations."
"Lacking ability to leverage more iOS device management internally."
"The reporting is subpar. That's the only issue we have with Intune. We use another solution for that purpose."
"It would be nice to have a location tracker for the mobile device management tool. I'm not sure if it exists but hasn't been configured or if it's missing, but we've been unable to utilize the location features."
Microsoft Entra ID is ranked 4th in Microsoft Security Suite with 190 reviews while Microsoft Intune is ranked 3rd in Microsoft Security Suite with 164 reviews. Microsoft Entra ID is rated 8.6, while Microsoft Intune is rated 8.0. The top reviewer of Microsoft Entra ID writes "Allows users to authenticate from home and has excellent integrations in a simple, stable solution". On the other hand, the top reviewer of Microsoft Intune writes "We can manage all aspects of our devices from a single console, easy to scale, and quick to deploy". Microsoft Entra ID is most compared with Google Cloud Identity, CyberArk Privileged Access Manager, Cisco Duo, Yubico YubiKey and Okta Workforce Identity, whereas Microsoft Intune is most compared with Jamf Pro, VMware Workspace ONE, ManageEngine Endpoint Central, SOTI MobiControl and IBM MaaS360. See our Microsoft Entra ID vs. Microsoft Intune report.
See our list of best Microsoft Security Suite vendors.
We monitor all Microsoft Security Suite reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.
In recent years Microsoft has really upped its game with Defender and Intune. As core cyber-security for an SME, keeping just to Microsoft is now a real option. The challenge is understanding the gaps / cyber security service weaknesses (if they exist) in comparison with other vendors such as ESET, Malwarebytes, Trend Micro, etc.
Azure AD Services, Defender for Endpoint, and Intune are all Microsoft products, but it is important to understand how each product works as they may not be compatible and there may be some limitations.
Devices managed through Intune may not have all of the Defender for Endpoint features. Some advanced features such as automated investigation and remediation may only be available for devices that are enrolled in Defender for Endpoint standalone.
In addition, Azure AD and Intune have different requirements for device enrollment and management. Intune requires devices to be enrolled and managed through an MDM solution, while Azure AD provides basic device management capabilities but may not support all of the features available in Intune.
Lastly, there may be limitations to how user identities and access are managed between Azure AD and Intune. Some features that are available in Azure AD, such as conditional access policies, may not suit Intune, and additional configuration may be required to ensure that user identities and access are properly managed across both services.
If anyone out there has other experiences, please let me know!
It depends on your company's infrastructure. Check with your cyber team whether you can sync your endpoints to Cloud using Azure AD as Azure Registered/ Azure Hybrid AD join/ Azure AD join, etc.
1. So, if the ask is only to enroll them in Intune to leverage defender/BitLocker services - go directly to Azure AD's join approach.
2. If you still want to manage patch management/mcm BitLocker but Defender via cloud, the approach should be Azure Hybrid AD join.
3. You can still use autopilot using both of these approaches.
I believe it is a good first step, and I would say even a requirement, but in no way is it a comprehensive security solution, even for endpoints.
There are many things that need to be addressed for security. In addition to this, there is XDR, MDR, more comprehensive AV for endpoints & Servers that stop attacks, Threat Hunting, Mitigation, PEN Testing, Security Training for end users, Multi-Factor Authentication (Microsoft's MFA is good but only for Microsoft products), Patch Management for Endpoints, Servers and Cloud Workloads, Network Access Control, Firewalls for On-Premise and Cloud server workloads, Network Segmentation, Password Management, Data Backups (3-2-1-1 Rule) with Immutable Backups, Power Backups, Physical Security, Monitoring, NOC/SOC services, and working towards a Zero Trust architecture...
But there are no single-point solutions that will make you secure, so don't get complacent. And you can outspend your profits if you do everything. Just remember it's best to have a layered approach that works together and looks at everything from a security perspective and how it integrates with your overall security plans and objectives to help identify holes and possible mitigations.
Healthcare must do Risk Assessments by law, but I recommend that all companies of all sizes do at least annual risk assessments since there is so such thing as being too small or inconspicuous to be hit with malware or have a cyber security attack since much of the delivery is automated and not just by the script-kiddies of years gone by... Nation States are actively engaging in cyber warfare daily, along with terrorists, and opportunists looking to make big money from you...