Microsoft Defender for Endpoint vs Microsoft Intune comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary
Updated on Nov 8, 2023

We compared Microsoft Intune and Microsoft Defender for Endpoint across several parameters based on our user's reviews. After reading the collected data, you can find our conclusion below:

Initial Setup: The user reviews for Microsoft Intune and Microsoft Defender for Endpoint show that the duration required for establishing a new tech solution can vary. Both products have users who reported spending three months on deployment and an additional week on setup, while others mentioned needing a week for both deployment and setup. The context in which these terms are used is crucial for accurately evaluating the timeframes.

Valuable Features: Microsoft Intune is praised for its seamless integration with other Microsoft products, comprehensive mobile device management capabilities, and user-friendly interface. On the other hand, Microsoft Defender for Endpoint is highly valued for its robust security measures, efficient threat detection and prevention capabilities, and effective management and reporting tools.

Room For Improvement: Microsoft Intune could improve its user interface, ease of use, and integration with other Microsoft products. On the other hand, Microsoft Defender for Endpoint needs enhancements in system performance, threat detection capabilities, and user interface.

Setup Cost: The setup cost for Microsoft Intune is considered reasonable, and the licensing process is straightforward. On the other hand, Microsoft Defender for Endpoint also has a reasonable and straightforward setup cost, with a user-friendly and hassle-free licensing process.

ROI: Microsoft Intune has shown positive outcomes and benefits according to user feedback, while Microsoft Defender for Endpoint has also proven to be a valuable investment with positive user feedback.

Customer Service: Microsoft Intune's customer service is praised for prompt and helpful assistance, while Microsoft Defender for Endpoint's support is highly praised for its promptness, effectiveness, and level of guidance and troubleshooting provided.

Based on user reviews, Intune's competitive pricing options and straightforward licensing process make it cost-effective. While both products offer seamless integration with other Microsoft tools, Intune's user-friendly interface and comprehensive mobile device management capabilities make it more intuitive and efficient to use. Additionally, Intune's customer service and support have been praised for their prompt and helpful assistance.

To learn more, read our detailed Microsoft Defender for Endpoint vs. Microsoft Intune Report (Updated: September 2023).
744,865 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"I find the vulnerability management section of Microsoft Defender for Endpoint to be very useful for organizations.""The threat hunting service is very useful for a security professional.""It's a very complete application. I have all the controls in one site. I can track emails, attacks, and threats, and I can research information. I really like this configuration because I have all the information in place.""I like the simplicity of the portal and the integration with Microsoft Intune. Microsoft Defender for Endpoint is easy to use and implement.""The virus scanning capability is excellent, and it feeds all the logs into the Microsoft 365 Defender portal, making them easy to search for.""The detection features are valuable, as is the fact that it is easier to port these logs into Sentinel. That is also useful for us. It is more comprehensive.""For threat-hunting, I'll put some threats in a test scenario. I've downloaded known viruses that are out in the public for testing. They're not really a virus but they've got a signature. Defender for Endpoint will automatically find those, quarantine them for me, and alert me to what it did. It gives me "automated eyes."""The integration of Defender, Security Center, and the Microsoft compliance score, is the feature we use most to share the results with our clients and to create a roadmap together."

More Microsoft Defender for Endpoint Pros →

"Its direct integration with all the other products that we have from Microsoft is valuable. We're using the E5 license, and we have a whole wealth of different products available. It just makes it easier to have everything from one provider.""Intune provides full visibility into all active mobile device users. If their devices are noncompliant with our security policies, I have the flexibility to update them remotely.""It provides control over all mobile devices that are being connected to the corporate network.""Users can make screenshots, and devices only need the minimal version of iOS.""Its security is most valuable. It gives us a way to secure devices, not only those that are steady. We do have a few tablets and other devices, and it is a way for us to secure these devices and manage them. We know they're out there and what's their status. We can manage their life cycle and verify that they're updated properly.""Agile and easy to deploy MDM solution that covers the maximum number of policies. Stable, scalable, and with knowledgeable technical support.""The main advantage is that Intune performs its intended functions effectively.""The ability to manage devices with different sets of policies is most valuable."

More Microsoft Intune Pros →

Cons
"On the Mac OS platform, there is no parity between Windows and Mac OS. The solution is very feature-rich and very well-integrated into Windows, and I guess baked into Windows 10 and Windows 11. Whereas, on the Mac OS platform, there is still some work there to give it a more feature-reach platform.""The application control feature requires improvement.""They're in the process of pulling more things together. They can continue with the integrations and provide a better way of seeing the impact of security changes, especially on the endpoint side. Before we actually flip the switch, we should be able to see the impact of security changes on the business or business applications. It would prevent breaking any business applications.""Microsoft Defender for Endpoint can improve by providing more and different types of reports.""The integration and effectiveness of email security could be better. It's already built-in to the solution and checks emails, scans the links they contain etc.""It would be helpful if they offered video tutorial guides.""Microsoft Defender for Endpoint is not as robust, and you cannot customize it much, so that's a challenge.""They should come up with pre-built inner workflows."

More Microsoft Defender for Endpoint Cons →

"The reports aren't complete, and it's not easy to build custom reports. For example, Windows Autopilot isn't working well in cases where the computers don't have a good internet connection. Then the option is not good enough.""Microsoft needs to enhance device-level security, as sometimes when using Microsoft Intune, the device's operating system becomes stuck and requires a full uninstall to remove the Intune bug.""It's only good for a Microsoft environment.""The security features should be improved.""Microsoft Intune's support for Mac devices is lacking and could be improved.""Intune's third-party patch management could be better. It should be easier for the average system admin to keep non-Microsoft applications updated.""In the next release, I would like a feature to be able to properly lock down the device. For example, if an attacker or somebody steals the phone, you can be sure that the pin cannot be broken.""The solution could be improved by the opportunity to connect third-party application databases, such as Chocolatey or another setup store, to Intune."

More Microsoft Intune Cons →

Pricing and Cost Advice
  • "We pay a yearly license for Microsoft Defender. We also have a support contract with them."
  • "The solution is free with Windows."
  • "You do not need to pay any additional costs for antivirus and anti-malware solutions for endpoint protection."
  • "The solutions price could be cheaper."
  • "Microsoft has different plans for buying this product. The price depends on the configuration of the full set of products that you buy and on the licensing program in your contract."
  • "Licensing models of Microsoft are renowned for being complex. We just purchased the whole E5 stack. With E5 licenses for users, we get access to a bunch of features that are not just related to security. I would rate them a three out of five in terms of pricing."
  • "This solution is part of an enterprise license we have."
  • "Compared to ESET, the pricing for Microsoft Defender for Endpoint is on the higher side."
  • More Microsoft Defender for Endpoint Pricing and Cost Advice →

  • "It is reasonable. When you have Microsoft 365 E3 or E5 license, it is already licensed in that license. So, you could say it is free."
  • "Every customer used to purchase licenses based on their needs."
  • "Previously the price was $4 per month per user. Now it's $2.25 per user per month."
  • "It is not a cheap solution. The price for a device when you start using it at a large scale can be improved. It is covered under our enterprise agreement. We pay once a year. I am not aware of any additional costs."
  • "The price is very reasonable."
  • "This cost is approximately $30 USD per user per month."
  • "Microsoft's licensing is more flexible and adaptive than its competitors."
  • "It's reasonable. They're not giving it away, but it's reasonable."
  • More Microsoft Intune Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Microsoft Security Suite solutions are best for your needs.
    744,865 professionals have used our research since 2012.
    Answers from the Community
    Ronald Chavez
    Thomas Naylor - PeerSpot reviewerThomas Naylor
    Real User

    In recent years Microsoft has really upped its game with Defender and Intune.  As core cyber-security for an SME, keeping just to Microsoft is now a real option.  The challenge is understanding the gaps / cyber security service weaknesses (if they exist) in comparison with other vendors such as ESET, Malwarebytes, Trend Micro, etc.

    Russell Rothstein - PeerSpot reviewerRussell Rothstein
    Vendor

    Azure AD Services, Defender for Endpoint, and Intune are all Microsoft products, but it is important to understand how each product works as they may not be compatible and there may be some limitations.


    Devices managed through Intune may not have all of the Defender for Endpoint features. Some advanced features such as automated investigation and remediation may only be available for devices that are enrolled in Defender for Endpoint standalone. 


    In addition, Azure AD and Intune have different requirements for device enrollment and management. Intune requires devices to be enrolled and managed through an MDM solution, while Azure AD provides basic device management capabilities but may not support all of the features available in Intune. 


    Lastly, there may be limitations to how user identities and access are managed between Azure AD and Intune. Some features that are available in Azure AD, such as conditional access policies, may not suit Intune, and additional configuration may be required to ensure that user identities and access are properly managed across both services.


    If anyone out there has other experiences, please let me know!

    Gaurav Chandola - PeerSpot reviewerGaurav Chandola
    Real User

    It depends on your company's infrastructure. Check with your cyber team whether you can sync your endpoints to Cloud using Azure AD as Azure Registered/ Azure Hybrid AD join/ Azure AD join, etc.       


    1. So, if the ask is only to enroll them in Intune to leverage defender/BitLocker services - go directly to Azure AD's join approach.       


    2. If you still want to manage patch management/mcm BitLocker but Defender via cloud, the approach should be Azure Hybrid AD join.        


    3. You can still use autopilot using both of these approaches. 

    James OConnor - PeerSpot reviewerJames OConnor (Hypertec Direct)
    Consultant

    I believe it is a good first step, and I would say even a requirement, but in no way is it a comprehensive security solution, even for endpoints.  

    There are many things that need to be addressed for security. In addition to this, there is XDR, MDR, more comprehensive AV for endpoints & Servers that stop attacks, Threat Hunting, Mitigation, PEN Testing, Security Training for end users, Multi-Factor Authentication (Microsoft's MFA is good but only for Microsoft products), Patch Management for Endpoints, Servers and Cloud Workloads, Network Access Control, Firewalls for On-Premise and Cloud server workloads, Network Segmentation, Password Management, Data Backups (3-2-1-1 Rule) with Immutable Backups, Power Backups, Physical Security, Monitoring, NOC/SOC services, and working towards a Zero Trust architecture...  


    But there are no single-point solutions that will make you secure, so don't get complacent. And you can outspend your profits if you do everything. Just remember it's best to have a layered approach that works together and looks at everything from a security perspective and how it integrates with your overall security plans and objectives to help identify holes and possible mitigations.

    Healthcare must do Risk Assessments by law, but I recommend that all companies of all sizes do at least annual risk assessments since there is so such thing as being too small or inconspicuous to be hit with malware or have a cyber security attack since much of the delivery is automated and not just by the script-kiddies of years gone by... Nation States are actively engaging in cyber warfare daily, along with terrorists, and opportunists looking to make big money from you...

    Questions from the Community
    Top Answer:Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface, applies behavioral-based endpoint protection and response, and includes risk-based… more »
    Top Answer:We use Symantec because we do not use MS Enterprise products, but in my opinion, Microsoft Defender is a superior solution Microsoft Defender for Endpoint is a cloud-delivered endpoint security… more »
    Top Answer:The CrowdStrike solution delivers a lot of information about incidents. It has a very light sensor that will never push your machine hardware to "test", you don't have the usual "scan now" feature but… more »
    Top Answer:Microsoft Intune is a great tool for managing a mobile device fleet while keeping access control. The solution makes it easy to control security and manage the usage of mobile apps when you have a… more »
    Top Answer:Microsoft Intune is a great configuration management tool and has a lot of good things going for it. Here are some of the things I like about it Pros: Protected productivity: Intune gives you the… more »
    Top Answer: Microsoft Intune offers not only an easy-to-deploy data protection and productivity management solution, but also access to both Microsoft’s user community as well as around-the-clock customer… more »
    Ranking
    6th
    Views
    2,676
    Comparisons
    2,372
    Reviews
    93
    Average Words per Review
    851
    Rating
    8.1
    3rd
    Views
    5,156
    Comparisons
    3,393
    Reviews
    76
    Average Words per Review
    614
    Rating
    8.3
    Comparisons
    Also Known As
    Microsoft Defender ATP, Microsoft Defender Advanced Threat Protection, MS Defender for Endpoint, Microsoft Defender Antivirus
    Intune, MS Intune, Microsoft Endpoint Manager
    Learn More
    Overview

    Microsoft Defender for Endpoint is a comprehensive security solution that provides advanced threat protection for organizations. It offers real-time protection against various types of cyber threats, including malware, viruses, ransomware, and phishing attacks.

    With its powerful machine-learning capabilities, it can detect and block sophisticated attacks before they can cause any harm. The solution also includes endpoint detection and response (EDR) capabilities, allowing organizations to quickly investigate and respond to security incidents. It provides detailed insights into the attack timeline, enabling security teams to understand the scope and impact of an incident.

    Microsoft Defender for Endpoint also offers proactive threat hunting, allowing organizations to proactively search for and identify potential threats within their network. It integrates seamlessly with other Microsoft security solutions, such as Microsoft Defender XDR, to provide a unified and holistic security approach. With its centralized management console, organizations can easily deploy, configure, and monitor the security solution across their entire network.

    Microsoft Defender for Endpoint is a robust and scalable security solution that helps organizations protect their endpoints and data from evolving cyber threats.

    Microsoft Intune is a comprehensive cloud-based service that allows you to remotely manage mobile devices and mobile applications without worrying about the security of your organization’s data. Device and app management can be used on company-owned devices as well as personal devices.

    In an increasingly mobile workforce, Microsoft Intune keeps your sensitive data safe while on the move. Microsoft Intune makes it possible for your team members to work anywhere using their mobile devices. Microsoft Intune provides both the flexibility and the control needed for securing all your data on the cloud, no matter where the device with the data is located.

    Microsoft Intune Device Management Key Features

    With Microsoft Intune Device Management you can:

    • Ensure devices and apps are compliant with your security requirements.
    • Rapidly deploy and authenticate apps on all company devices.
    • Remotely access devices to troubleshoot issues or to remove data from them.
    • Generate reports for all devices in the system.
    • Monitor the way users access and share information to protect company information.
    • Set rules and configure settings on personal and organization-owned devices to access data and networks.
    • Create user groups and device groups, allowing you to rapidly access many users and devices simultaneously.

    Mobile Application Management

    Mobile application management in Intune is designed to protect your organization’s data at the application level.

    With Microsoft Intune Application Management you can:

    • Configure apps to run with specific settings enabled.
    • Update existing apps that are already on the device.
    • See reports on which apps are used and monitor their usage.
    • Selectively wipe organization data from apps.
    • Add mobile apps to user groups and devices.

    As part of Microsoft's Enterprise Mobility + Security (EMS) suite, Intune integrates with Microsoft Entra ID for access control and with Azure Information Protection for data protection. It also integrates with Microsoft 365 Applications.

    Reviews from Real Users

    Microsoft Intune stands out among its competitors for a number of reasons. Two major ones are its ability to secure all devices under its management and the flexibility that the solution offers its users.

    A computing services manager notes, "Its security is most valuable. It gives us a way to secure devices, not only those that are steady. We do have a few tablets and other devices, and it is a way for us to secure these devices and manage them. We know they're out there and what's their status. We can manage their life cycle and verify that they're updated properly."

    The head of IT engineering at a financial services company writes, "The one feature we find most useful is the Mobile Application Manager. There are two types: we have the complete MDM and the Mobile Application Manager (MAM). We don't give our users phones, it is their own personal phone, and we need to allow them to have access to the company details on their phone. We need to create a balance between their own personal data and the company data. We deploy the Mobile Application Manager for them so that we won't be able to interfere with their own personal data."

    Offer
    Learn more about Microsoft Defender for Endpoint
    Learn more about Microsoft Intune
    Sample Customers
    Petrofrac, Metro CSG, Christus Health
    Mitchells and Buzzers, Callaway
    Top Industries
    REVIEWERS
    Financial Services Firm19%
    Computer Software Company16%
    Comms Service Provider7%
    Energy/Utilities Company6%
    VISITORS READING REVIEWS
    Educational Organization20%
    Computer Software Company13%
    Government8%
    Financial Services Firm7%
    REVIEWERS
    Computer Software Company20%
    Financial Services Firm17%
    Comms Service Provider11%
    Manufacturing Company6%
    VISITORS READING REVIEWS
    Educational Organization23%
    Computer Software Company13%
    Government7%
    Financial Services Firm6%
    Company Size
    REVIEWERS
    Small Business39%
    Midsize Enterprise17%
    Large Enterprise43%
    VISITORS READING REVIEWS
    Small Business23%
    Midsize Enterprise31%
    Large Enterprise47%
    REVIEWERS
    Small Business35%
    Midsize Enterprise12%
    Large Enterprise53%
    VISITORS READING REVIEWS
    Small Business20%
    Midsize Enterprise33%
    Large Enterprise47%
    Buyer's Guide
    Microsoft Defender for Endpoint vs. Microsoft Intune
    September 2023
    Find out what your peers are saying about Microsoft Defender for Endpoint vs. Microsoft Intune and other solutions. Updated: September 2023.
    744,865 professionals have used our research since 2012.

    Microsoft Defender for Endpoint is ranked 6th in Microsoft Security Suite with 92 reviews while Microsoft Intune is ranked 3rd in Microsoft Security Suite with 72 reviews. Microsoft Defender for Endpoint is rated 8.2, while Microsoft Intune is rated 8.4. The top reviewer of Microsoft Defender for Endpoint writes "You can access all your security data and telemetry from a single pane of glass". On the other hand, the top reviewer of Microsoft Intune writes "Enables you to use MDM to lock devices and push restrictions, but isn't as stable as other solutions". Microsoft Defender for Endpoint is most compared with Intercept X Endpoint, Symantec Endpoint Security, CrowdStrike Falcon, SentinelOne Singularity Complete and Cortex XDR by Palo Alto Networks, whereas Microsoft Intune is most compared with Jamf Pro, VMware Workspace ONE, ManageEngine Endpoint Central, SOTI MobiControl and AWS Systems Manager. See our Microsoft Defender for Endpoint vs. Microsoft Intune report.

    See our list of best Microsoft Security Suite vendors.

    We monitor all Microsoft Security Suite reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.