Back to Blog
Microsoft Intune Device Management Microsoft 365 Security

Microsoft Intune for Australian Business Device Management

By Ash Ganda | 8 June 2022 | 7 min read

Microsoft Intune for Australian Business Device Management

Managing business devices gets complicated quickly. You have Windows laptops, a few Macs, everyone’s smartphones checking email, maybe some iPads in the field — and you need to keep them all secure, updated, and configured consistently. Microsoft Intune, included with Microsoft 365 Business Premium, provides a cloud-based solution for exactly this problem.

This guide walks through setting up and using Intune for an Australian small business, focusing on the practical configurations that matter most.

What Intune Does

Intune is Microsoft’s cloud-based endpoint management service. It lets you:

  • Manage devices: Enforce security policies, push configuration settings, and remotely wipe lost or stolen devices
  • Manage applications: Deploy, update, and remove business applications on managed devices
  • Protect data: Apply data protection policies that keep business data secure, even on personal devices
  • Ensure compliance: Define compliance policies and block non-compliant devices from accessing business resources

Intune replaces traditional tools like Group Policy (for cloud-managed devices) and System Center Configuration Manager (for small-scale deployments), providing similar functionality without on-premise infrastructure.

Licensing

Intune is included in:

  • Microsoft 365 Business Premium ($33 per user per month) — the most common choice for Australian SMBs
  • Microsoft 365 E3/E5 — enterprise plans
  • Enterprise Mobility + Security E3/E5 — standalone mobility suite
  • Intune standalone ($12 per user per month) — if you do not need the full Microsoft 365 suite

For most Australian SMBs, Microsoft 365 Business Premium provides the best value because it includes Intune alongside Office apps, Exchange Online, Teams, and advanced security features.

Step 1: Initial Configuration

Set the MDM Authority

In the Microsoft Endpoint Manager admin centre (endpoint.microsoft.com):

  1. Navigate to “Tenant administration” then “Tenant status”
  2. Verify the MDM authority is set to “Microsoft Intune” (this should be the default for new tenants)

Configure Automatic Enrolment

Enable automatic device enrolment so that when users sign in with their work account, their device is enrolled in Intune.

Step 1: Initial Configuration Infographic

  1. Go to “Devices” then “Enrol devices” then “Automatic Enrollment”
  2. Set the MDM user scope to “All” or select specific groups
  3. Set the MAM user scope as needed (for BYOD app-only management)

Configure Device Categories

Device categories help you organise and target policies. Create categories that match your business:

  • Company Laptop
  • Company Desktop
  • Company Mobile
  • Personal Mobile (BYOD)
  • Shared Device

Step 2: Create Compliance Policies

Compliance policies define the minimum security requirements for devices accessing your business data. Non-compliant devices can be blocked from accessing email, files, and applications.

Windows Compliance Policy

Create a compliance policy for Windows devices:

  1. Go to “Devices” then “Compliance policies” then “Create policy”
  2. Select “Windows 10 and later”
  3. Configure these settings:

Device Health:

  • Require BitLocker: Yes
  • Require Secure Boot: Yes
  • Require code integrity: Yes

Device Properties:

  • Minimum OS version: 10.0.19041 (Windows 10 version 2004 or later)

System Security:

  • Require a password: Yes
  • Minimum password length: 8 characters
  • Password type: Alphanumeric
  • Maximum minutes of inactivity before password is required: 5
  • Password expiration: 90 days (or consider removing expiry and enforcing complexity instead)
  • Require encryption of data storage: Yes
  • Firewall: Require
  • Antivirus: Require
  • Antispyware: Require
  • Microsoft Defender Antimalware minimum version: Current

Step 2: Create Compliance Policies Infographic

Actions for non-compliance:

  • Mark device as non-compliant: Immediately or after a grace period (3 days is reasonable for initial rollout)
  • Send email to user: Yes (notify them of what needs to be fixed)
  • Block access after grace period: Yes

iOS/iPadOS Compliance Policy

For iPhones and iPads:

  • Require device to be at or under the device threat level: Secured
  • Minimum OS version: 15.0
  • Require a passcode: Yes
  • Minimum passcode length: 6
  • Simple passcodes: Block
  • Maximum minutes of inactivity before passcode is required: 5
  • Jailbroken devices: Block

Android Compliance Policy

For Android devices:

  • Rooted devices: Block
  • Minimum OS version: 11.0
  • Require a password: Yes
  • Required password type: At least numeric complex
  • Minimum password length: 6
  • Require encryption: Yes

Step 3: Create Configuration Profiles

Configuration profiles push settings to devices, replacing what Group Policy does in traditional on-premise environments.

Essential Windows Configuration Profiles

Windows Update settings:

  • Configure update rings to control how quickly updates are installed
  • Set quality update deferral: 3 to 7 days (allows time for testing)
  • Set feature update deferral: 30 to 60 days
  • Configure maintenance windows for restarts
  • Enable “Auto-restart at the scheduled time”

BitLocker encryption:

  • Require device encryption
  • Configure recovery key backup to Azure AD
  • Set encryption method: XTS-AES 256-bit

Microsoft Defender settings:

  • Enable real-time protection
  • Enable cloud-delivered protection
  • Enable automatic sample submission
  • Configure scan schedule (daily quick scan, weekly full scan)
  • Enable network protection
  • Enable controlled folder access (ransomware protection)

Wi-Fi profile:

  • Push your office Wi-Fi configuration to devices automatically
  • Include the Wi-Fi password securely (users never see it)
  • Configure preferred network settings

Essential iOS/Android Configuration Profiles

Email profile:

  • Push the Exchange Online email configuration to devices automatically
  • Users do not need to manually configure server settings

Wi-Fi profile:

  • Same as Windows — push office Wi-Fi configuration

Restrictions (company-owned devices):

  • Disable iCloud backup for managed apps (iOS)
  • Require managed paste (prevent copying data from business apps to personal apps)

Step 4: Deploy Applications

Intune can deploy applications to managed devices, ensuring everyone has the tools they need.

Windows Applications

Microsoft 365 Apps:

  1. Go to “Apps” then “All apps” then “Add”
  2. Select “Microsoft 365 Apps” then “Windows 10 and later”
  3. Configure the apps to install (Word, Excel, Outlook, PowerPoint, Teams, etc.)
  4. Set the update channel (Current Channel is recommended for most SMBs)
  5. Assign to your user groups

Line-of-business applications:

  • Package .msi or .intunewin files for deployment
  • For complex installations, use the Microsoft Win32 Content Prep Tool to create .intunewin packages
  • Assign as “Required” for essential applications or “Available” for optional ones

iOS and Android Applications

Managed App Store apps:

  1. Search for the app in the relevant store
  2. Assign to user groups
  3. Apps are installed automatically on managed devices or made available in the Company Portal

Common apps to deploy:

  • Microsoft Outlook
  • Microsoft Teams
  • Microsoft OneDrive
  • Microsoft Authenticator
  • Company-specific apps (CRM mobile app, field service app, etc.)

Step 5: Configure App Protection Policies (for BYOD)

App protection policies protect business data within applications without requiring full device enrolment. This is ideal for BYOD scenarios.

iOS/Android App Protection Policy

  1. Go to “Apps” then “App protection policies” then “Create policy”
  2. Select iOS/iPadOS or Android
  3. Target apps: Microsoft Outlook, OneDrive, Teams, SharePoint, and any other business apps
  4. Configure data protection settings:

Data transfer:

  • Restrict cut, copy, and paste between managed and unmanaged apps
  • Allow data transfer to: Policy managed apps only
  • Allow data transfer from: All apps (so users can paste content into business apps)
  • Save copies of org data: Block (or allow only to OneDrive for Business and SharePoint)

Access requirements:

  • PIN for access: Require (separate from device PIN)
  • PIN type: Numeric
  • Minimum PIN length: 4
  • Fingerprint/Face ID: Allow
  • Timeout: Recheck access requirements after 30 minutes

Conditional launch:

  • Max PIN attempts: 5 (wipe app data after exceeding)
  • Offline grace period: 720 minutes (12 hours) before blocking access
  • Jailbroken/rooted device: Block access
  • Min OS version: Set to a recent version

These policies mean that even on a personal phone, business data in Outlook, Teams, and OneDrive is encrypted, cannot be copied to personal apps, and can be selectively wiped when the employee leaves — without touching their personal photos, messages, or apps.

Step 6: Set Up Conditional Access

Conditional Access policies in Azure AD work with Intune compliance to control access to business resources.

Recommended policy: Require compliant device for Microsoft 365 access

  1. In Azure AD, go to “Security” then “Conditional Access”
  2. Create a new policy
  3. Users: All users (exclude break-glass accounts)
  4. Cloud apps: Office 365
  5. Conditions: All platforms
  6. Grant: Require device to be marked as compliant, OR require approved client app (for BYOD without full enrolment)

This policy ensures that only devices meeting your compliance standards can access Microsoft 365 data.

Step 7: Enrol Devices

Windows Devices (Company-Owned)

Azure AD Join (recommended for new devices):

  1. During Windows setup (OOBE), select “Set up for work or school”
  2. Sign in with the user’s work Microsoft 365 account
  3. The device automatically joins Azure AD and enrols in Intune
  4. Compliance policies, configuration profiles, and apps are applied automatically

For existing devices:

  1. Go to Settings then Accounts then Access work or school
  2. Click “Connect” and sign in with the work account
  3. Select “Join this device to Azure Active Directory”

iOS and Android (BYOD)

  1. Install the Company Portal app from the App Store or Google Play
  2. Open Company Portal and sign in with the work account
  3. Follow the enrolment prompts
  4. The device is enrolled and policies are applied

For BYOD with app protection policies only (no full enrolment), users simply install the managed business apps (Outlook, Teams, OneDrive) and sign in. App protection policies are applied automatically.

Ongoing Management

Regular Tasks

Weekly:

  • Review the Intune dashboard for non-compliant devices
  • Check app deployment status for failures
  • Review any new device enrolments

Monthly:

  • Review and update compliance policies as needed
  • Check Windows Update compliance (are devices receiving and installing updates?)
  • Review app protection policy reports

Quarterly:

  • Audit enrolled devices and remove stale entries (devices no longer in use)
  • Review and update configuration profiles
  • Assess whether new policies or apps are needed

Troubleshooting Common Issues

Device not compliant: Check the device’s compliance details in the Intune portal. The most common issues are missing OS updates, disabled encryption, or outdated antivirus definitions.

App not installing: Verify the app assignment and check the device’s sync status. Trigger a manual sync from the Company Portal app if needed.

User locked out: If Conditional Access blocks a user, check their device compliance status and help them resolve any issues.

What to Expect

Intune is not a set-and-forget tool, but after the initial setup (allow one to two weeks for a 20-person business), ongoing management requires only a few hours per week. The payoff is significant: consistent security across all devices, simplified application management, and the confidence that lost or stolen devices can be remotely wiped.

For Australian SMBs already paying for Microsoft 365 Business Premium, Intune is included in your subscription. Not using it means you are leaving one of the most valuable security tools on the table.

Ready to transform your business?

Let's discuss how AI and cloud solutions can drive your digital transformation. Our team specializes in helping Australian SMBs implement cost-effective technology solutions.

Bella Vista, Sydney