Profiles used to authenticate users for secure remote access
Profiles used to authenticate users for corporate access
Profiles used to authenticate users for email access
Profiles used to authenticate users through Wi-Fi
Configurations for Microsoft Intune
Cloud-based service in the enterprise mobility management space
Applications management
Applications not adhering to compliance policy set by Intune
Reports