Microsoft Defender for Endpoint vs Microsoft Intune comparison

Cancel
You must select at least 2 products to compare!
Microsoft Logo
4,672 views|3,441 comparisons
94% willing to recommend
Microsoft Logo
7,149 views|4,911 comparisons
91% willing to recommend
Comparison Buyer's Guide
Executive Summary
Updated on Mar 6, 2024

Microsoft Defender for Endpoint and Microsoft Intune serve different purposes. The first protects endpoints from cyber threats like viruses, malware, ransomware, and phishing attacks, and the second is a management console that helps you control and configure your devices.

  • Initial Setup: The user reviews for Microsoft Intune and Microsoft Defender for Endpoint show that the duration required to establish the solution can vary. Both users reported spending three months on deployment and an additional week on setup, while others mentioned needing a week for deployment and configuration.
  • Valuable Features: Both solutions offer seamless integration with other Microsoft tools. Microsoft Intune is praised for its comprehensive mobile device management capabilities. On the other hand, Microsoft Defender for Endpoint is highly valued for its robust security measures, efficient threat detection and prevention capabilities, and effective management and reporting tools.
  • Room For Improvement: Microsoft Intune could improve its user interface, ease of use, and integration with other Microsoft products. Microsoft Defender for Endpoint needs enhancements in system performance, and threat detection capabilities.
  • Setup Cost: The setup cost for both solutions is considered reasonable, and the licensing process is straightforward. In terms of ROI, both solutions have shown positive outcomes and benefits according to user feedback.
  • Customer Service: Same here; for both solutions, the customer service is praised for prompt and helpful assistance and a good level of guidance and troubleshooting provided.

To summarize, both are Microsoft products and offer seamless integration with other Microsoft tools. Microsoft Defender for Endpoint helps secure your devices from cyber threats and Microsoft Intune helps manage and configure various devices within your organization.

To learn more, read our detailed Microsoft Defender for Endpoint vs. Microsoft Intune Report (Updated: March 2024).
771,212 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"I like the fact that it has the ransomware solution in there. I'm glad that the ransomware solution is built into it. That's probably the biggest thing that I see in Microsoft Defender.""The integration with all variations of Microsoft Defender, for Endpoint, 365, and Cloud is valuable.""The most important feature is the way it monitors the threats and blocks them. About 10 days ago, we were implementing SOC for a particular client. The SOC was not yet implemented, but they had Microsoft Defender. That organization was hit by some ransomware, but the hacker could not succeed. Because of the EDR, the hacker could not install the hacking tools. They were trying to do that, but Microsoft Defender completely blocked that. The hacker could log into the system, but they could not install anything.""It depends on the licensing. Most of the customers have got at least a 365 E3 license, and they can use most of the features of Windows 10 Defender. So, anyone who has got an enterprise license can start using those features. Some of the customers have got E5 licenses, and they can use all advanced features. Customers with E5 licenses use the advanced site protection (ATP) features and web content filtering without going via a proxy, which gives the benefit of replacing the proxy. They can get the benefit of MCAS and integration with Intune and the endpoint manager. It is a kind of single platform for all 365 technologies. It helps customers in managing everything through a unified portal.""It's a Microsoft product; it's easier to deploy this product than other options.""Technical support is good.""We are able to productively integrate with existing on-prem, hybrid, or cloud applications.""I like Defender's reporting and logging features. The email alerts are also helpful. It's hard sometimes to sift through the email, especially if you're an IT firm managing hundreds if not thousands of endpoints, but we find email reporting useful. For example, last Tuesday, we learned of new vulnerabilities that were discovered as a result of the previous patches. The endpoints without those patches triggered alerts in Defender."

More Microsoft Defender for Endpoint Pros →

"The reporting and analytics features in Microsoft Intune have been a lifesaver.""If you need only to load a specific profile and you don't have deep security functionalities, et cetera, Intune is very nice and good.""The most valuable includes managing everything from a single console.""The policy and compliance monitoring of devices and the software deployment are most valuable.""The aspects I find most valuable are the managing the data and applications. I can also restrict the users to install any applications. I can also wipe the data if the phone was missplaced or stolen. These are the basics for me.""Autopilot is the most valuable feature.""It is a very stable and scalable cloud-only solution.""The best feature is that we don't need to worry about downtime. We don't need to worry about the network connections of our office or the virtual private network. Everything is being done through the internet. Using Intune Autopilot, we can configure and deploy everything to the devices."

More Microsoft Intune Pros →

Cons
"It's not easy to create special allowances for certain groups of users. It can be a little heavy-handed in some areas where Microsoft has decided to lock a feature out, meaning they make it hard to make an exception... One company we work with needed to use about 20 different thumb drives for about 20 users. To make that exception for them was very difficult. In fact, you can't really make an exception. But what you can do is allow them to use it and, while it will still alert, you can actually suppress those alerts.""I wish they would extend the use of the Security Central portal, even for the free option of Defender. Because, as companies grow, it is labor intensive to manage the AV and detection part of it. For companies already subscribed to Office 365, I think this would be a good enhancement.""Microsoft Defender for Endpoint can improve by providing more and different types of reports.""They should bring back the feature of a dedicated proxy device for communication to the cloud. As of now, all the agents are required to send the logs directly to the cloud. There should be a solution where you can put a proxy and all the logs are consolidated, like a forwarder.""My main issue with the tool is that there are too many menus. This causes a steep learning curve for those without training or unfamiliar with Defender for Endpoint. From an end-user perspective, the solution is there on the machine and does its job; it works seamlessly. However, as a security professional dealing with it behind the scenes, the learning curve can be steep, but not too steep. Still, it has taken some of my analysts up to a month to get familiar with the product.""The product development team makes frequent changes that affect the stability of the solution.""It could be easier when it comes to managing exceptions.""It makes your Surface devices hot. It is resource-intensive. It strains your CPU, not more than other file scanners around, but it also does a lot more. When you are transmitting files or data, it is continuously scanning the traffic and analyzing it bit by bit to see what's going on, and that, of course, is costly in terms of CPU. It is CPU intensive, and if you are on battery, it drains your battery fast. That's the only drawback that it has."

More Microsoft Defender for Endpoint Cons →

"I think there should be a better tracking of the cell phones used on the Intune.""Intune's reporting and logging could be improved. When troubleshooting, it's difficult to collect the logs and determine what's happening. If I want to filter out the compliant devices, I can see it from the logs, but I would like the option to drill down further.""The initial setup is a little bit complex.""Intune has some limitations when it comes to application updates for third-party applications. You can schedule an update, but when it's a package setup, you need to supercede and replace it each time.""More integration with monitoring tools is needed.""There is room for improvement in integrating additional features such as Purview and SharePoint activities into Intune.""There are a lot of small use cases where we realized that some technical solution was missing in Microsoft in comparison to other products. For example, it lacks something similar to sensing or location-based rules and configurations.""It just doesn't handle software updates well at all by itself. You need to be a scripting wizard to make those happen properly, or you use third-party tools. The Windows feature updates are very difficult to implement. I would like to see a proprietary built-in remote control tool. I know that they have Team Viewer integrated, but it is not seamless. It would be nice if they had a seamless remote desktop capability directly from the Intune console."

More Microsoft Intune Cons →

Pricing and Cost Advice
  • "The product is free of charge and comes integrated into Windows."
  • "The solution is free."
  • "This product is included in the pricing for Windows."
  • "If you don't purchase the advanced threat protection then there is no additional charge."
  • "It is affordable and comes in the Office 365 bundle."
  • "Microsoft Defender ATP is expensive."
  • "I pay for it through the Windows Professional or Standard license. It is a one-time cost for me, and I use the same license."
  • "When compared with other vendors, the pricing is very high."
  • More Microsoft Defender for Endpoint Pricing and Cost Advice →

  • "Consider the Microsoft Enterprise Mobility Suite rather than choosing specific sub-components, e.g. only Microsoft Intune."
  • "There is a cost benefit of using Microsoft Intune because of the packaging with other Microsoft products."
  • "Microsoft Intune is a cost effective choice. It is less expensive than other products on the market."
  • "The purchase of the product was handled by someone else."
  • "I have no comment on pricing of the solution."
  • "The product is offered as part of a Microsoft standard bundle. The pricing can be competitive to Airwatch, and Maas360."
  • "For Microsoft 365 E5 clients, cost is not an issue as this product is one of the benefits."
  • "The price of Intune is included with the license for Office 365, so we don't have to pay anything extra for it."
  • More Microsoft Intune Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Microsoft Security Suite solutions are best for your needs.
    771,212 professionals have used our research since 2012.
    Answers from the Community
    Ronald Chavez
    Thomas Naylor - PeerSpot reviewerThomas Naylor
    Real User

    In recent years Microsoft has really upped its game with Defender and Intune.  As core cyber-security for an SME, keeping just to Microsoft is now a real option.  The challenge is understanding the gaps / cyber security service weaknesses (if they exist) in comparison with other vendors such as ESET, Malwarebytes, Trend Micro, etc.

    Russell Rothstein - PeerSpot reviewerRussell Rothstein (PeerSpot)
    Vendor

    Azure AD Services, Defender for Endpoint, and Intune are all Microsoft products, but it is important to understand how each product works as they may not be compatible and there may be some limitations.


    Devices managed through Intune may not have all of the Defender for Endpoint features. Some advanced features such as automated investigation and remediation may only be available for devices that are enrolled in Defender for Endpoint standalone. 


    In addition, Azure AD and Intune have different requirements for device enrollment and management. Intune requires devices to be enrolled and managed through an MDM solution, while Azure AD provides basic device management capabilities but may not support all of the features available in Intune. 


    Lastly, there may be limitations to how user identities and access are managed between Azure AD and Intune. Some features that are available in Azure AD, such as conditional access policies, may not suit Intune, and additional configuration may be required to ensure that user identities and access are properly managed across both services.


    If anyone out there has other experiences, please let me know!

    Gaurav Chandola - PeerSpot reviewerGaurav Chandola
    Real User

    It depends on your company's infrastructure. Check with your cyber team whether you can sync your endpoints to Cloud using Azure AD as Azure Registered/ Azure Hybrid AD join/ Azure AD join, etc.       


    1. So, if the ask is only to enroll them in Intune to leverage defender/BitLocker services - go directly to Azure AD's join approach.       


    2. If you still want to manage patch management/mcm BitLocker but Defender via cloud, the approach should be Azure Hybrid AD join.        


    3. You can still use autopilot using both of these approaches. 

    James OConnor - PeerSpot reviewerJames OConnor (Hypertec Direct)
    Consultant

    I believe it is a good first step, and I would say even a requirement, but in no way is it a comprehensive security solution, even for endpoints.  

    There are many things that need to be addressed for security. In addition to this, there is XDR, MDR, more comprehensive AV for endpoints & Servers that stop attacks, Threat Hunting, Mitigation, PEN Testing, Security Training for end users, Multi-Factor Authentication (Microsoft's MFA is good but only for Microsoft products), Patch Management for Endpoints, Servers and Cloud Workloads, Network Access Control, Firewalls for On-Premise and Cloud server workloads, Network Segmentation, Password Management, Data Backups (3-2-1-1 Rule) with Immutable Backups, Power Backups, Physical Security, Monitoring, NOC/SOC services, and working towards a Zero Trust architecture...  


    But there are no single-point solutions that will make you secure, so don't get complacent. And you can outspend your profits if you do everything. Just remember it's best to have a layered approach that works together and looks at everything from a security perspective and how it integrates with your overall security plans and objectives to help identify holes and possible mitigations.

    Healthcare must do Risk Assessments by law, but I recommend that all companies of all sizes do at least annual risk assessments since there is so such thing as being too small or inconspicuous to be hit with malware or have a cyber security attack since much of the delivery is automated and not just by the script-kiddies of years gone by... Nation States are actively engaging in cyber warfare daily, along with terrorists, and opportunists looking to make big money from you...

    Questions from the Community
    Top Answer:Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface, applies behavioral-based endpoint protection and response, and includes risk-based… more »
    Top Answer:We use Symantec because we do not use MS Enterprise products, but in my opinion, Microsoft Defender is a superior solution Microsoft Defender for Endpoint is a cloud-delivered endpoint security… more »
    Top Answer:The CrowdStrike solution delivers a lot of information about incidents. It has a very light sensor that will never push your machine hardware to "test", you don't have the usual "scan now" feature but… more »
    Top Answer:Microsoft Intune is a great tool for managing a mobile device fleet while keeping access control. The solution makes it easy to control security and manage the usage of mobile apps when you have a… more »
    Top Answer:Microsoft Intune is a great configuration management tool and has a lot of good things going for it. Here are some of the things I like about it Pros: Protected productivity: Intune gives you the… more »
    Top Answer: Microsoft Intune offers not only an easy-to-deploy data protection and productivity management solution, but also access to both Microsoft’s user community as well as around-the-clock customer… more »
    Ranking
    5th
    Views
    4,672
    Comparisons
    3,441
    Reviews
    68
    Average Words per Review
    1,052
    Rating
    8.3
    3rd
    Views
    7,149
    Comparisons
    4,911
    Reviews
    74
    Average Words per Review
    787
    Rating
    8.4
    Comparisons
    Also Known As
    Microsoft Defender ATP, Microsoft Defender Advanced Threat Protection, MS Defender for Endpoint, Microsoft Defender Antivirus
    Intune, MS Intune, Microsoft Endpoint Manager
    Learn More
    Interactive Demo
    Overview

    Microsoft Defender for Endpoint is a comprehensive security solution that provides advanced threat protection for organizations. It offers real-time protection against various types of cyber threats, including malware, viruses, ransomware, and phishing attacks.

    With its powerful machine-learning capabilities, it can detect and block sophisticated attacks before they can cause any harm. The solution also includes endpoint detection and response (EDR) capabilities, allowing organizations to quickly investigate and respond to security incidents. It provides detailed insights into the attack timeline, enabling security teams to understand the scope and impact of an incident.

    Microsoft Defender for Endpoint also offers proactive threat hunting, allowing organizations to proactively search for and identify potential threats within their network. It integrates seamlessly with other Microsoft security solutions, such as Microsoft Defender XDR, to provide a unified and holistic security approach. With its centralized management console, organizations can easily deploy, configure, and monitor the security solution across their entire network.

    Microsoft Defender for Endpoint is a robust and scalable security solution that helps organizations protect their endpoints and data from evolving cyber threats.

    Microsoft Intune is a comprehensive cloud-based service that allows you to remotely manage mobile devices and mobile applications without worrying about the security of your organization’s data. Device and app management can be used on company-owned devices as well as personal devices.

    In an increasingly mobile workforce, Microsoft Intune keeps your sensitive data safe while on the move. Microsoft Intune makes it possible for your team members to work anywhere using their mobile devices. Microsoft Intune provides both the flexibility and the control needed for securing all your data on the cloud, no matter where the device with the data is located.

    Microsoft Intune Device Management Key Features

    With Microsoft Intune Device Management you can:

    • Ensure devices and apps are compliant with your security requirements.
    • Rapidly deploy and authenticate apps on all company devices.
    • Remotely access devices to troubleshoot issues or to remove data from them.
    • Generate reports for all devices in the system.
    • Monitor the way users access and share information to protect company information.
    • Set rules and configure settings on personal and organization-owned devices to access data and networks.
    • Create user groups and device groups, allowing you to rapidly access many users and devices simultaneously.

    Mobile Application Management

    Mobile application management in Intune is designed to protect your organization’s data at the application level.

    With Microsoft Intune Application Management you can:

    • Configure apps to run with specific settings enabled.
    • Update existing apps that are already on the device.
    • See reports on which apps are used and monitor their usage.
    • Selectively wipe organization data from apps.
    • Add mobile apps to user groups and devices.

    As part of Microsoft's Enterprise Mobility + Security (EMS) suite, Intune integrates with Microsoft Entra ID for access control and with Azure Information Protection for data protection. It also integrates with Microsoft 365 Applications.

    Reviews from Real Users

    Microsoft Intune stands out among its competitors for a number of reasons. Two major ones are its ability to secure all devices under its management and the flexibility that the solution offers its users.

    A computing services manager notes, "Its security is most valuable. It gives us a way to secure devices, not only those that are steady. We do have a few tablets and other devices, and it is a way for us to secure these devices and manage them. We know they're out there and what's their status. We can manage their life cycle and verify that they're updated properly."

    The head of IT engineering at a financial services company writes, "The one feature we find most useful is the Mobile Application Manager. There are two types: we have the complete MDM and the Mobile Application Manager (MAM). We don't give our users phones, it is their own personal phone, and we need to allow them to have access to the company details on their phone. We need to create a balance between their own personal data and the company data. We deploy the Mobile Application Manager for them so that we won't be able to interfere with their own personal data."

    Sample Customers
    Petrofrac, Metro CSG, Christus Health
    Mitchells and Buzzers, Callaway
    Top Industries
    REVIEWERS
    Financial Services Firm19%
    Computer Software Company16%
    Energy/Utilities Company7%
    Comms Service Provider7%
    VISITORS READING REVIEWS
    Educational Organization22%
    Computer Software Company13%
    Government8%
    Financial Services Firm7%
    REVIEWERS
    Financial Services Firm19%
    Computer Software Company18%
    Comms Service Provider10%
    Manufacturing Company6%
    VISITORS READING REVIEWS
    Educational Organization23%
    Computer Software Company12%
    Government7%
    Financial Services Firm7%
    Company Size
    REVIEWERS
    Small Business40%
    Midsize Enterprise17%
    Large Enterprise43%
    VISITORS READING REVIEWS
    Small Business22%
    Midsize Enterprise33%
    Large Enterprise45%
    REVIEWERS
    Small Business38%
    Midsize Enterprise14%
    Large Enterprise48%
    VISITORS READING REVIEWS
    Small Business20%
    Midsize Enterprise33%
    Large Enterprise47%
    Buyer's Guide
    Microsoft Defender for Endpoint vs. Microsoft Intune
    March 2024
    Find out what your peers are saying about Microsoft Defender for Endpoint vs. Microsoft Intune and other solutions. Updated: March 2024.
    771,212 professionals have used our research since 2012.

    Microsoft Defender for Endpoint is ranked 5th in Microsoft Security Suite with 182 reviews while Microsoft Intune is ranked 3rd in Microsoft Security Suite with 165 reviews. Microsoft Defender for Endpoint is rated 8.0, while Microsoft Intune is rated 8.0. The top reviewer of Microsoft Defender for Endpoint writes "Eliminates the need to look at multiple dashboards by automatically providing one XDR dashboard to show the security score of each subscription". On the other hand, the top reviewer of Microsoft Intune writes "We can manage all aspects of our devices from a single console, easy to scale, and quick to deploy". Microsoft Defender for Endpoint is most compared with Symantec Endpoint Security, Intercept X Endpoint, SentinelOne Singularity Complete, CrowdStrike Falcon and ESET Endpoint Protection Platform, whereas Microsoft Intune is most compared with Jamf Pro, VMware Workspace ONE, ManageEngine Endpoint Central, Microsoft Entra ID and AWS Systems Manager. See our Microsoft Defender for Endpoint vs. Microsoft Intune report.

    See our list of best Microsoft Security Suite vendors.

    We monitor all Microsoft Security Suite reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.