Skip to content

Overview

Integrating IT systems to get a complete overview of the company's IT assets as well as being able to troubleshoot faster is a key concern for modern companies. Integrating Intune with Xurrent enables companies to get a quick overview of up-to-date data on assets and devices within the enterprise. This will enable companies to do the following directly in their Service Management Platform:

  • Understand which assets the company owns.
  • Understand who is using the asset.
  • Understand if these assets are secure or exposes a threat to the company.
  • Provide faster help if an end-user is having issues with one or more devices.

The purpose of the following sections is to provide an overview of how-to best plan and implement the Xurrent connector for Microsoft Intune.

Tip

Learn more about Microsoft Intune here: đź”— What is Microsoft Intune | Microsoft Docs

Outcomes

By implementing the Microsoft Intune for Xurrent connector the following benefits can be leveraged:

  • Enable customers to act on cloud data in Xurrent while using already defined workflow and automation.
  • Easy onboarding with no need for knowledge or maintenance.
  • Build with scalability, security, and resilience in mind.

Value Propositions

The connector between Intune and Xurrent provides the following value propositions to the company:

  • Faster time to resolution.
  • Fewer consoles to navigate.
  • Better overview of company assets.

Functionality

The connector is built to transfer valuable information from Intune to Xurrent to deliver visibility and collaboration for assets managed by Intune. A series of core capabilities are designed to ensure that data that can be used for asset management or troubleshooting is made available to the teams and the tools they use the most with the following core areas in mind:

  • Quick overview of device configuration for faster troubleshooting.
  • Fast insight if any devices are exposed to compliance risk.
  • Deep link to more detailed information at the source if needed.

Intune overview

Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM). You can manage your organizations devices using Intune including smart phones, tablets and laptops. Intune also allows you to define policies for your devices and alert you if any of these policies are out of company compliance. For example, you can raise a policy alert if a computer’s hard drive is not encrypted or if Antivirus software is not running on a laptop that is managed by Intune. Intune integrates with Azure Active Directory (Azure AD) to control who has access and what they can access. It also integrates with Azure Information Protection for data protection. These features can enable the organization to implement and monitor for compliance policies that are not meeting company governance guidance.

Intune dashboard

Devices are joined to Intune and hereafter they can be managed and inventoried using the Intune service.

The following device types can be managed by Intune.

Intune device types

Intune will collect hardware devices and software and make this data visible in the Intune portal.

The picture is an example of hardware information that can be seen in Intune for a Windows laptop.

Intune hardware information

Intune Compliance Policy Overview

Intune provides the option to help protect organizational data by requiring users and devices to meet defined requirements. In Intune, this feature is called compliance policies. This enables Intune administrators to define the rules and settings that users and devices must meet to be compliant in accordance with Company compliance policy. This gives the following advantages

  • Include actions that apply to devices that are noncompliant.
  • Actions for noncompliance can alert users to the conditions of noncompliance and safeguard data on noncompliant devices.
  • Can be combined with Conditional Access, which can then block users and devices that do not meet the rules.

Intune device compliance policies are defined in the following way

  • Define the rules and settings that users and managed devices must meet to be compliant. Examples of rules include requiring devices run a minimum OS version, not being jail-broken or rooted, and being at or under a threat level as specified by threat management software you’ve integrated with Intune.
  • Support actions that apply to devices that do not meet your compliance rules. Examples of actions include being remotely locked or sending a device user an email about the device status so they can fix it.
  • Deploy to users in user groups or devices in device groups. When a compliance policy is deployed to a user, all the user's devices are checked for compliance. Using device groups in this scenario helps with compliance reporting.

The picture below shows a device that is out of compliance, in this example the firewall is not running on the device:

Intune out of compliancy