Modern adversaries are ruthless and constantly innovating. An authenticated employee on a compromised personal laptop or a corporate device that has missed a critical patch, or with an inactive antivirus, provides a clear, unfettered path to an adversary to get a foothold into the organization’s network. This leads to an authenticated, trusted entry point for adversaries to deploy malware, ransomware, and perform data exfiltration, while remaining hidden in plain sight.
While enforcing user authentication controls with verification is crucial, it’s equally important to make sure that the devices that they are using to access resources, data and applications are verified and compliant as well.

NetBird integrates with Microsoft Intune enabling you to effortlessly evolve your security posture beyond the capabilities of traditional VPNs, firewalls and IDS/IPS solutions. Aligning with the foundational principles of Zero Trust, NetBird helps you close the loop between user identity and device integrity, paving the shift forward from a reactive security model to a proactive, automated secure access solution.
Define a baseline for device health and enforce it automatically: With the NetBird and Intune integration, make sure that all Windows and macOS devices connecting to your critical resources, applications and data, are managed and meet your strict compliance policies. For example, you can automatically allow or deny the connection to go through after checking for device encryption, whether the endpoint protection is running and up-to-date, the latest OS security patches are installed and more.
Automate enforcement in real time: If a device is flagged as non-compliant in Microsoft Intune; due to a user disabling the firewall or when a malware is detected, NetBird automatically blocks the connection to your resources. This happens in real time, eliminating time-consuming ticket queues, or manual human intervention. As and when the device becomes compliant again, access is instantly and automatically restored, achieving a security posture that is not only robust, but also dynamic and resilient.

Combine identity-aware access policies and device compliance: Combine granular identity-aware access policies with the real-time device compliance status from Intune. For example, you can create a policy that allows the DevOps admin group to access the production Kubernetes API, but only if they are connecting from an Intune-compliant device running the allowed OS version and active endpoint protection. This level of precision and security control limits lateral movement and shrinks your attack surface.
Get Started in Minutes
The integration of NetBird and Microsoft Intune allows you to build a Zero Trust network that is not only aware of who is connecting, but also the state of the device they are connecting from. Deploy the NetBird client at scale, in minutes, across your entire fleet of devices using Microsoft Intune. Be sure to check out the documentation and the walk-through video .
