|

Microsoft Intune for Small Business: Modern Device Management Without the Complexity

Traditional Windows device management relied on domain-joined PCs, Group Policy (GPO), and on-premise Active Directory. That model works — but it requires physical proximity to a domain controller, creates VPN dependency for remote management, and adds IT overhead that small businesses increasingly can’t justify.

Microsoft Intune (now part of Microsoft Endpoint Manager / Intune under the Microsoft Entra and Endpoint Management suite) provides cloud-native device management without the on-premise infrastructure dependency. For Berlin SMBs running Microsoft 365, it’s the natural next step after securing your identity and email.

What Microsoft Intune Actually Does

Intune is a Mobile Device Management (MDM) and Mobile Application Management (MAM) platform. In plain terms, it lets you:

  • Enforce security configuration on Windows, macOS, iOS, and Android devices
  • Deploy software and OS updates without WSUS or SCCM
  • Remotely wipe lost or stolen devices
  • Require device compliance (encryption, OS version, antivirus) before granting access to company data
  • Deploy apps silently — no user action required, no USB sticks, no manual installs
  • Apply Conditional Access: block non-compliant devices from accessing M365, even if credentials are correct

Intune Licensing for Small Business

Intune is included in:

  • Microsoft 365 Business Premium — the recommended licence for SMBs with up to 300 users. Includes Intune, Entra ID P1, Defender for Business, and full M365 apps. EUR ~22/user/month.
  • Microsoft 365 E3/E5 — enterprise tiers for larger organisations.
  • Intune Plan 1 standalone — EUR ~8/user/month if you only need MDM without the full M365 stack.

If you’re on Microsoft 365 Business Premium, Intune is already licensed — you’re just not using it yet.

Enrolling Windows Devices in Intune

There are three main enrolment paths for Windows devices:

1. Azure AD Join + Automatic MDM Enrolment (New Devices)

The cleanest option for new devices. During Windows Setup (Out of Box Experience / OOBE), the user signs in with their Microsoft 365 account instead of a local account. Windows automatically joins Entra ID and enrols in Intune. No IT intervention required at the device. This is called Windows Autopilot when combined with a hardware hash pre-registration, enabling zero-touch provisioning — the device arrives from the supplier, the user turns it on, signs in, and Intune deploys the full configuration automatically.

2. Hybrid Azure AD Join (Existing Domain-Joined Devices)

For existing domain-joined PCs that you want to bring under Intune management without re-imaging. Hybrid join connects the device to both on-premise AD and Entra ID. Intune policy is applied alongside existing GPO. This is a transitional state — the goal is eventually to move to pure Entra ID Join as GPO dependency is eliminated.

3. Manual Enrolment (BYOD / Non-Domain Devices)

Users can self-enrol personal or non-domain devices via Settings > Accounts > Access Work or School. For personal devices, MAM (app-only management) is typically preferred over full MDM — you can manage only company apps (Outlook, Teams) without controlling the whole device.

Essential Intune Policies for SMBs

Start with these six policy areas:

1. Device Compliance Policy

Define what makes a device compliant. Minimum baseline for Windows:

  • BitLocker encryption required
  • Minimum OS version (Windows 11 22H2 or later, or Windows 10 22H2 at minimum)
  • Microsoft Defender antivirus enabled and up to date
  • No jailbreak / secure boot required
  • Password required: minimum 8 characters, complexity enabled

2. Conditional Access Integration

Tie device compliance to M365 access. Policy: require compliant device or approved app for access to Exchange Online and SharePoint. A non-compliant device (missing BitLocker, outdated OS) is blocked from company data even with valid credentials. This single policy eliminates a major attack vector.

3. Endpoint Security — Antivirus

Deploy Microsoft Defender for Business configuration via Intune. Key settings: cloud-delivered protection enabled, automatic sample submission enabled, real-time protection on, tamper protection on. These settings prevent users from accidentally disabling their own endpoint security.

4. Windows Update Rings

Define update deferral rings instead of relying on each user to update their own PC. Recommended approach:

  • Pilot ring (5-10% of users): Feature updates immediately, quality updates with 0-day deferral
  • Broad ring (remaining users): Feature updates deferred 30 days, quality updates deferred 7 days

5. App Deployment

Deploy required applications silently to all managed devices. Common deployments via Intune: Microsoft 365 Apps (Office), Company Portal, 7-Zip, Adobe Acrobat Reader, your line-of-business client software. Apps are deployed as required (mandatory) or available (user-installable from Company Portal).

6. Disk Encryption (BitLocker)

Enable BitLocker via Intune Endpoint Security > Disk Encryption policy. Configure recovery key escrow to Entra ID so you can retrieve BitLocker keys from the Intune admin portal if a user forgets their PIN or a device needs to be unlocked for investigation.

Intune vs. GPO: When to Use Which

Scenario Recommendation
New device fleet, cloud-only identity Intune only — no domain join required
Existing on-premise AD, migrating to cloud Hybrid join with co-management — Intune for security policy, GPO for legacy app config
Remote/hybrid workforce, no on-premise access Intune required — GPO cannot reach devices not on the corporate network
Legacy applications requiring very specific registry or file system configuration GPO for those specific settings; Intune for everything else

macOS and Mobile Management

Intune manages more than Windows. For Berlin SMBs with mixed environments:

  • macOS: Enrol via Company Portal app. Deploy configuration profiles for FileVault encryption, password policy, and approved app deployment. Comparable capability to Jamf for most SMB use cases.
  • iOS/Android: Enrol personal devices in MAM-without-enrolment mode to manage only M365 apps. No visibility into personal apps or data. Works well for BYOD policies.

Getting Started: The Right Order

If you’re new to Intune, sequence the implementation like this:

  1. Verify licensing (M365 Business Premium or Intune Plan 1)
  2. Configure automatic MDM enrolment in Entra ID (Settings > Mobility > Microsoft Intune > MDM user scope: All)
  3. Create a Compliance Policy and set the action for non-compliance to “Mark device non-compliant” with a 1-day grace period
  4. Create a Conditional Access policy requiring compliant device for M365 access — start in Report Only mode to see impact before enforcement
  5. Configure Endpoint Security policies (Defender, BitLocker, Windows Update ring)
  6. Begin device enrolment, starting with IT devices to validate policy
  7. Roll out Autopilot for new device procurement going forward

Properly configured, Intune eliminates the need for an on-premise management server, ensures all devices meet your security baseline regardless of location, and reduces IT support time on endpoint configuration. For a Berlin SMB already paying for M365 Business Premium, there is no reason not to use it.

Not sure where your IT stands?

Book a free IT assessment and get a clear picture of your infrastructure, security posture, and quick wins — no obligation.

Book Free IT Assessment

Similar Posts