How do you or your organization use this solution?
Please share with us so that your peers can learn from your experiences.
Our primary use case for this solution is to implement conditional access policies to restrict mobile users from accessing emails until their devices comply.
We have several different use cases. We have a BYOD (Bring Your Own Device) policy for corporate owned devices, and managing those devices is our responsibility.
My primary use case for this solution is for MDM. We use it to manage our devices and phones. We want to make sure that data is not stolen from the devices of our staff. Staff members often bring their own devices to work, and we need to manage that.
We use this primarily for security on our devices. We use this product because it came with the bundle from Microsoft.
Our primary use case is using Microsoft Intune MAM, which is the mobile application management. We are using basically it for application management type needs.
The primary use case is managing mobile devices and applications. It really answers the question of managing BYOD end-point devices.
We use it for the inventory of phones and deployment of Office 365. It is used for conditional access.
We use it for the following: * MDM * EMM * Cloud app protection.