Appendix A - Differences between Intune MAM and Intune EMM

The table below lists the differences between MAM & EMMClosed Enterprise Mobility Management. A set of tools and processes to secure and manage company-owned or employee-owned (BYOD) devices irrespective of their locations./UEMClosed Unified Endpoint Management. An architecture and approach that controls different types of devices such as computers, smartphones and IoT devices from a centralized command point. deployments when it comes to Mobile Security solution:

 

Intune MAM

Intune EMM

Deployment

Company Portal installed - Android

Must

Must

Company Portal installed - iOS

Need Authenticator

Must

Authenticator app installed - Android

Need Authenticator

Not needed

Authenticator app installed - iOS

Need Authenticator

Not needed

One touch (MSFT Sign in from device)

Zero-touch deployment

X  (No App-Config)

Protection

Apps analysis - Android

Apps analysis - iOS

√ - if personal apps are discoverable by Intune

Network vector (e.g. MiTM)

OS Exploits

Jailbreak/root detection

ONP (Anti-phishing, download prevention, anti-bot, URLF, etc.)

ONP with SSLClosed Secure Sockets Layer. The standard security technology for establishing an encrypted link between a web server and a browser.

Mitigation

Intune Conditional Access AAD

Mobile SecurityConditional Access (ONP)

All Actions supported in Intune *

According to MSFT Docs

According to MSFT Docs

Note - See device compliance configurations here.

Deploying a CA certificate using Zero-Touch for HTTPS Traffic Inspection

  1. In your Mobile Security dashboard, go to Policy and expand your policy profile (example, Global).

  2. Click any one of these:

    • Device

    • Application

    • File

    • Network

  3. Click Network Protection.

  4. Go to HTTPS Settings and select the HTTPS Inspection checkbox.

    The Enable SSL Inspection window appears.

  5. Click Continue.

  6. In the Inspection CA section, select the CA certificate that ONP will use to inspect HTTPS traffic on the end-user device.

    Select one of these:

    • Centralized CA across several policies - Allows you to use the centralized CA certificate across several policies. To generate the centralized CA certificate, go to Settings > Central HTTPS Inspection Root CA.

      Note - If you initially chose to use a centralized CA certificate but later changed to a different CA certificate option:

      • The current policy will no longer use the centralized certificate.

      • The centralized CA certificate remains active and continues to be associated with all other policies in your account.

    • CA Certificate per policy - If your organization uses a UEM, you can generate a new CA certificate for each policy, download and deploy it on the end-user device through UEM.

      Note - Check Point recommends you renew the CA certificate at least two weeks before the expiration date. To renew the CA certificate, see sk181288.

Note - When using different policies for device groups, the enforcement of the certificate pushed by UEM Name may take up to 24 hours on iOS devices. This limitation is not relevant if you use the Global policy for the entire fleet of devices.