We compared Microsoft Intune and Microsoft Entra ID based on our user's reviews in several parameters.
Microsoft Intune and Microsoft Entra ID both offer valuable features such as efficient device management and seamless authentication processes. Intune focuses on security measures and integration with enterprise systems, while Entra ID emphasizes user-friendly interfaces and platform integration. Users praise Intune for its prompt customer service and cost-effectiveness, while Entra ID users appreciate its affordability and efficiency. However, Intune users suggest improvements in user interface and performance, while Entra ID users seek enhancements in UI design and customization options.
Features: Microsoft Intune and Microsoft Entra ID have different valuable features. Intune offers data wipe and device reset, integration with enterprise systems, and control over user access. Entra ID focuses on user-friendly interface, efficient authentication, and seamless integration with platforms.
Pricing and ROI: The setup cost for Microsoft Intune is praised for its reasonable pricing and cost-effectiveness. Users find the licensing options to be flexible and accommodating. On the other hand, users have expressed a positive sentiment towards Microsoft Entra ID's pricing, setup cost, and licensing. They appreciate the affordability, competitive pricing, and user-friendly setup process. The licensing options are also seen as flexible and suitable for various needs and budgets., The ROI from Microsoft Intune demonstrated effective cost management, increased productivity, secure device management, streamlined workflows, seamless integration, time savings, enhanced user experience, and improved security measures. On the other hand, Microsoft Entra ID offers significant cost savings, improved efficiency, streamlined business processes, and increased productivity.
Room for Improvement: Microsoft Intune could improve its user interface, speed, customization options, and troubleshooting features. On the other hand, Microsoft Entra ID needs enhancements in its user interface, optimization for different devices, usability, sign-up process, customization options, and security features.
Deployment and customer support: The users' reviews for Microsoft Intune indicate that the duration to establish the tech solution can vary, with some users reporting separate phases of deployment and setup, while others consider both terms to refer to the same period. On the other hand, Microsoft Entra ID user reviews also show variability in the duration required, with some users reporting distinct deployment and setup phases, and others considering them as one., The customer service provided by Microsoft Intune is highly praised for its prompt assistance and knowledgeable support staff. Customers value feeling supported throughout their interactions. In comparison, Microsoft Entra ID's customer service is highlighted for its exceptional efficiency, reliability, and helpfulness. The support team is praised for their friendliness, professionalism, and effective communication, ensuring seamless problem resolution.
The summary above is based on 193 interviews we conducted recently with Microsoft Intune and Microsoft Entra ID users. To access the review's full transcripts, download our report.
"Overall, I think the support and the pictorial format of this web portal are very good."
"The most valuable features of Microsoft Entra ID are the login and the conditional access pieces."
"The security features, multi-factor authentication, and service management features are valuable."
"It's a quite comprehensive solution and it scales quite well within our required scale as well, which is very useful."
"When logging on to Azure AD it's pretty quick."
"It is cloud based so it is always updated,"
"The most valuable feature is the ability to deploy and make changes to every workstation that I need to. We use it to control policy and I can apply the right policies to all our 1,500 workstations, notebooks, et cetera."
"Installation is straightforward. It only took a couple of hours to set everything up."
"Intune's most valuable features are the device, compliance, and configuration policies."
"The key benefit of Intune is its integration with the Microsoft ecosystem."
"By using Microsoft Intune we can control which websites the users can go to and it provides a secure environment for our employees using their laptops that are having access from home. We have installed Intune to control the user's environment minimizing the chances of any hacking."
"Autopilot is the most valuable feature."
"The aspects I find most valuable are the managing the data and applications. I can also restrict the users to install any applications. I can also wipe the data if the phone was missplaced or stolen. These are the basics for me."
"It's not working perfectly, but Microsoft's Autopilot offers great visibility into automated deployment solutions."
"The most valuable feature of Microsoft Intune is having all our devices compliant with our policies."
"Application deployment and keeping the devices secure no matter where they are, by having this cloud solution — that has been great."
"The most challenging aspect I found was the creation of organizational units and specific domains. They have a tool called Bastion, which is expensive and a little bit confusing."
"Azure Active Directory could be made easier to use. We have large amounts of data and storage. We are looking for video files and media content for applications, we will think about options, such as cloud storage or a CDN."
"The only issue with Azure AD is that it doesn't have control over the wifi network. You have to do something more to have a secure wifi network. To have it working, you need an active directory server on-premises to take care of the networks."
"Microsoft Authenticator can improve their notifications because sometimes, my team doesn't receive notifications about app updates and authentication failures."
"The technical support could improve by having a faster response time."
"There is a lot of room for improvement in terms of its integration with the local Active Directory. There are some gaps in terms of the local Active Directory through which Microsoft is syncing our environment from our data center. There should be the availability of custom attributes on Azure Active Directory. In addition, there should be the availability of security groups and distribution groups that are residing on the local Active Directory. Currently, they are not replicated on Azure Active Directory by default."
"In terms of stability, sometimes the more applications you integrate, the more it becomes a little bit unstable."
"Sometimes, what one customer may like, another may not like it. We have had customers asking, "Why is Microsoft forcing us to do this?" For example, when you use Exchange Server on-premise, then you can customize it for your company and these customizations are unlimited. However, if you use Exchange Online or with Microsoft 365, then your ability to make modifications is limited. So, only the cloud versus is limited."
"I think that there is room for improvement with the reporting. If this is done, it will be a better product."
"Integrating certain group policies can be challenging and may necessitate using on-premises systems to integrate them with Microsoft Intune."
"In an upcoming release, I would like to see some kind of analytics report."
"One area for improvement is app deployment. Another is the Windows update rollout. If you're rolling out an object to a device that's offline, Intune stops trying to reach this device after it sits idle for a bit. We are forced to find a workaround that could help manage that."
"The UI is not user-friendly and has room for improvement."
"Intune's areas for improvement revolve around security and certificate management."
"The solution could be improved by the opportunity to connect third-party application databases, such as Chocolatey or another setup store, to Intune."
"They need to add more group policies. Intune currently does not have many group policies that you can deploy. Its reporting, which is very limited at the moment, also needs improvement. It will be great if they can add report customization. Its stability needs to be improved. Sometimes, when you register a device in Intune, it doesn't show up instantly on the engine portal on the admin side. They need to provide better support for complicated issues. They also have a long turnaround time."
Microsoft Entra ID is ranked 4th in Microsoft Security Suite with 190 reviews while Microsoft Intune is ranked 3rd in Microsoft Security Suite with 165 reviews. Microsoft Entra ID is rated 8.6, while Microsoft Intune is rated 8.0. The top reviewer of Microsoft Entra ID writes "Saves us time and money and features Conditional Access policies, SSPR, and MFA". On the other hand, the top reviewer of Microsoft Intune writes "We can manage all aspects of our devices from a single console, easy to scale, and quick to deploy". Microsoft Entra ID is most compared with Google Cloud Identity, CyberArk Privileged Access Manager, Okta Workforce Identity, Cisco Duo and Yubico YubiKey, whereas Microsoft Intune is most compared with Jamf Pro, VMware Workspace ONE, ManageEngine Endpoint Central, SOTI MobiControl and IBM MaaS360. See our Microsoft Entra ID vs. Microsoft Intune report.
See our list of best Microsoft Security Suite vendors.
We monitor all Microsoft Security Suite reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.
In recent years Microsoft has really upped its game with Defender and Intune. As core cyber-security for an SME, keeping just to Microsoft is now a real option. The challenge is understanding the gaps / cyber security service weaknesses (if they exist) in comparison with other vendors such as ESET, Malwarebytes, Trend Micro, etc.
Azure AD Services, Defender for Endpoint, and Intune are all Microsoft products, but it is important to understand how each product works as they may not be compatible and there may be some limitations.
Devices managed through Intune may not have all of the Defender for Endpoint features. Some advanced features such as automated investigation and remediation may only be available for devices that are enrolled in Defender for Endpoint standalone.
In addition, Azure AD and Intune have different requirements for device enrollment and management. Intune requires devices to be enrolled and managed through an MDM solution, while Azure AD provides basic device management capabilities but may not support all of the features available in Intune.
Lastly, there may be limitations to how user identities and access are managed between Azure AD and Intune. Some features that are available in Azure AD, such as conditional access policies, may not suit Intune, and additional configuration may be required to ensure that user identities and access are properly managed across both services.
If anyone out there has other experiences, please let me know!
It depends on your company's infrastructure. Check with your cyber team whether you can sync your endpoints to Cloud using Azure AD as Azure Registered/ Azure Hybrid AD join/ Azure AD join, etc.
1. So, if the ask is only to enroll them in Intune to leverage defender/BitLocker services - go directly to Azure AD's join approach.
2. If you still want to manage patch management/mcm BitLocker but Defender via cloud, the approach should be Azure Hybrid AD join.
3. You can still use autopilot using both of these approaches.
I believe it is a good first step, and I would say even a requirement, but in no way is it a comprehensive security solution, even for endpoints.
There are many things that need to be addressed for security. In addition to this, there is XDR, MDR, more comprehensive AV for endpoints & Servers that stop attacks, Threat Hunting, Mitigation, PEN Testing, Security Training for end users, Multi-Factor Authentication (Microsoft's MFA is good but only for Microsoft products), Patch Management for Endpoints, Servers and Cloud Workloads, Network Access Control, Firewalls for On-Premise and Cloud server workloads, Network Segmentation, Password Management, Data Backups (3-2-1-1 Rule) with Immutable Backups, Power Backups, Physical Security, Monitoring, NOC/SOC services, and working towards a Zero Trust architecture...
But there are no single-point solutions that will make you secure, so don't get complacent. And you can outspend your profits if you do everything. Just remember it's best to have a layered approach that works together and looks at everything from a security perspective and how it integrates with your overall security plans and objectives to help identify holes and possible mitigations.
Healthcare must do Risk Assessments by law, but I recommend that all companies of all sizes do at least annual risk assessments since there is so such thing as being too small or inconspicuous to be hit with malware or have a cyber security attack since much of the delivery is automated and not just by the script-kiddies of years gone by... Nation States are actively engaging in cyber warfare daily, along with terrorists, and opportunists looking to make big money from you...