Microsoft Intune EU Alternative 2026: PRISM-Participant, CLOUD Act 21/25 & Entra ID Under US Jurisdiction
Post #1204 in the sota.io EU Cyber Compliance Series
Microsoft Intune is the world's most widely deployed cloud-based endpoint management platform. For European enterprises under NIS2 Article 21(2)(g) and GDPR, the question is not whether Intune is feature-rich — it unquestionably is. The question is whether managing corporate devices through a platform operated by the first and longest-standing PRISM surveillance participant is compatible with European data sovereignty requirements.
The answer, as we will demonstrate, is increasingly difficult to justify to regulators.
CLOUD Act Risk Score: 21/25 (Highest in EU MDM Series)
Microsoft Corporation, Redmond, Washington — incorporated in the State of Washington.
| Risk Factor | Score |
|---|---|
| US parent company (principal place of business, WA) | 6/6 |
| PRISM participation (confirmed, original participant since 2007) | 5/5 |
| FedRAMP High authorization (GCC High) | 4/5 |
| FISA Section 702 compliance program | 3/4 |
| NSL/DOJ cooperation history | 2/3 |
| No EU-only legal entity for cloud ops | 1/2 |
| Total | 21/25 |
Microsoft scored 21/25 — the highest of the five MDM providers in this series and the highest score we have assigned to any MDM vendor. This is not a coincidence: Microsoft's government cloud portfolio, intelligence community relationships, and the structural integration of Entra ID into Windows management create an unusually dense exposure surface.
Microsoft Intune: What It Manages and What It Knows
Microsoft Intune (formerly Microsoft Endpoint Manager, now part of the Microsoft Intune suite) provides:
- MDM (Mobile Device Management): Full device management of Windows, macOS, iOS, Android
- MAM (Mobile Application Management): Application policy enforcement without full device enrollment
- Windows Autopilot: Zero-touch provisioning linked to Microsoft tenant
- Configuration Manager Cloud Attach: Hybrid management for on-prem SCCM estates
- Endpoint Analytics: Device performance and reliability metrics
- Microsoft Defender for Endpoint integration: Threat intelligence and telemetry correlation
Every one of these functions generates data that flows through Microsoft's US-controlled cloud infrastructure.
Five GDPR Problems Specific to Intune
Problem 1: Entra ID as the Identity Anchor Under US Jurisdiction
Microsoft Intune's conditional access policies, device compliance checking, and user authentication are inseparable from Entra ID (formerly Azure Active Directory). Entra ID is not a separate service — it is the identity fabric through which every Intune policy decision flows.
The CLOUD Act implication: Entra ID tenant data — including user identities, group memberships, authentication logs, multi-factor authentication records, and conditional access policy details — constitutes "electronic data" under 18 U.S.C. § 2703. The US Department of Justice can compel Microsoft to produce this data for any user worldwide whose data is stored on Microsoft infrastructure.
European enterprise identity is therefore under permanent US-jurisdiction exposure, regardless of whether the company's Entra ID region is set to "Europe."
Problem 2: PRISM — Microsoft Has Been Compliant Since 2007
The Snowden revelations confirmed what security researchers suspected: Microsoft was the first company to join the PRISM surveillance program in September 2007, predating Google (January 2009), Facebook (June 2009), and Apple (October 2012) by years.
PRISM (PRISM collection under FISA Section 702) allows the NSA to compel US electronic communication service providers to hand over communications and metadata of non-US persons outside the United States. Since Microsoft provides services to European enterprises, European employee data is in scope.
The EU Data Boundary Initiative (EUDB), which Microsoft markets as addressing data residency concerns, explicitly states in its own documentation that it does not provide protections against national security or law enforcement requests. Microsoft's EUDB FAQ acknowledges: "The EU Data Boundary does not affect the ability of Microsoft or any cloud service provider to respond to lawful government requests."
Problem 3: Windows Update for Business — WSUS Deprecation Creates Mandatory Cloud Lock-In
In June 2024, Microsoft officially deprecated WSUS (Windows Server Update Services) for update delivery. While WSUS remains operational for now, Microsoft has made clear that its future lies in cloud-managed update delivery via Intune and Windows Update for Business (WUfB).
WUfB sends telemetry about Windows Update deployment status, device hardware profiles, and patch compliance data to Microsoft's cloud. Under CLOUD Act jurisdiction, this patch telemetry — which reveals software vulnerability status across an enterprise's entire fleet — constitutes sensitive security data under US government reach.
For NIS2-regulated entities (operators of essential services, digital infrastructure providers), this means that their vulnerability remediation status is observable by US intelligence agencies.
Problem 4: Endpoint Analytics — Device Performance as Intelligence
Intune Endpoint Analytics uploads hardware and software performance data to Microsoft's cloud to provide insights on device health, app reliability, and restart frequency. This data includes:
- Device hardware configurations (CPU, RAM, storage models)
- Application crash rates and error codes
- Boot performance sequences
- OS version and patch levels
Under Article 5(1)(c) GDPR (data minimisation), uploading this operational intelligence to a US-jurisdiction cloud provider requires a legal basis. Under Schrems II and the absence of a replacement for Privacy Shield that explicitly covers FISA 702, that legal basis is difficult to establish.
Problem 5: Windows Autopilot — Corporate Device Enrollment Under Microsoft Account Control
Windows Autopilot, Microsoft's zero-touch provisioning solution, requires that each device's hardware hash be registered in Microsoft's cloud tenant. Device serial numbers, hardware hashes, and organisational unit assignments are stored in Microsoft's global enrollment service — a US-operated system — before the device ever reaches the employee.
This means that before European employees switch on their first corporate laptop, the device's entire identity is already registered in a US cloud system that is accessible under CLOUD Act warrants.
Microsoft's EU Data Boundary: What It Covers and What It Doesn't
Microsoft invested significantly in the EU Data Boundary initiative, announcing in January 2023 that it would store and process European customer data within the EU for its core cloud services, including Intune.
What the EUDB covers:
- Data at rest storage location
- Data processing location for normal operations
- Customer data residency (content data)
What the EUDB explicitly does not cover:
- National security requests under FISA 702
- CLOUD Act civil and criminal subpoenas
- National Security Letters under 18 U.S.C. § 2709
- Any law enforcement access request from US authorities
Microsoft's legal obligation as a US corporation is to comply with US government data access requests regardless of where the data is physically stored. The EU Data Boundary is a data residency commitment, not a legal sovereignty commitment. PRISM access, by definition, operates outside the normal Microsoft legal process framework.
EU-Native Alternatives: CLOUD Act Scores
| Vendor | Origin | CLOUD Act Score | Notes |
|---|---|---|---|
| Microsoft Intune | Redmond WA, USA | 21/25 | PRISM participant, FedRAMP High, WSUS deprecation lock-in |
| baramundi management suite | Augsburg, Germany | 0/25 | Freudenberg SE (German industrial group), fully EU-native |
| Matrix42 UEM | Frankfurt, Germany | 1/25 | German product heritage, Vector Capital US PE ownership (minor) |
| Cortado MDM | Berlin, Germany | 0/25 | Aiperia GmbH, Apple-certified, German legal entity |
| ACMP by Aagon | Soest NRW, Germany | 0/25 | 500+ enterprise customers, 100% German SME |
| Jamf (series #1) | Minneapolis MN, USA | 16/25 | Delaware corp, Nasdaq JAMF, prior MDM series post |
baramundi management suite (0/25) — Top EU-Native Choice for Windows-Heavy Enterprises
baramundi Software AG, Augsburg Bavaria, is a subsidiary of Freudenberg SE — the German industrial conglomerate behind Vileda, Klüber Lubrication, and Freudenberg Filtration Technologies. There is no US parent company, no US private equity investor, no US cloud dependency.
baramundi management suite provides:
- Full Windows client management (inventory, patch, software distribution)
- Mobile device management for iOS, Android, macOS
- Self-service portal for end users
- Vulnerability scanner integration
- GDPR-compliant on-premises deployment or EU-hosted SaaS
WSUS migration path: baramundi's patch management natively replaces WSUS functionality without requiring cloud connectivity to US servers. This is the structurally cleanest answer to Microsoft's WSUS deprecation strategy.
Matrix42 UEM (1/25) — Established German Enterprise Solution
Matrix42 AG, Frankfurt, has over 25 years of history in European endpoint management. The 1/25 score reflects Vector Capital's partial US private equity ownership — the corporate structure has some US investment exposure, but operational and legal entities remain German.
Matrix42 UEM offers unified endpoint management for Windows, macOS, Linux, iOS, and Android, with on-premises and EU-hosted deployment options. Its Silverback MDM component has a strong track record in German financial services and healthcare.
Cortado MDM (0/25) — Apple-Specialist EU MDM
Cortado MDM from Aiperia GmbH, Berlin, is purpose-built for Apple device management in European enterprises. Cortado is Apple-certified and specialises in iOS, iPadOS, and macOS management. For enterprises with heterogeneous fleets, Cortado is typically paired with baramundi or Matrix42 for Windows coverage.
ACMP by Aagon (0/25) — German SME Champion
Aagon GmbH, Soest NRW, serves over 500 German enterprises with ACMP (Aagon Client Management Platform). ACMP covers patch management, software distribution, OS deployment, and asset management. It lacks the multi-platform MDM breadth of baramundi or Matrix42 but is the strongest on Windows-only estates.
The WSUS Deprecation Trap: A Strategic Analysis
Microsoft's WSUS deprecation deserves separate examination because it represents a deliberate architectural shift that reduces European enterprise options for maintaining Windows devices without US cloud dependency.
The timeline:
- 2024-06: Microsoft announces WSUS deprecation for update delivery
- 2025-12: WSUS expected to enter "no-new-updates" maintenance mode
- 2027+: Full decommission timeline (not yet confirmed)
The EU-sovereignty implication: organisations that currently use WSUS on-premises — with no Microsoft cloud connectivity for patch management — will face pressure to migrate to WUfB/Intune, which introduces CLOUD Act exposure. baramundi's Patch Management module is the primary EU-native mitigation. baramundi maintains its own patch database (independent of Windows Update cloud) and can deploy patches without any Microsoft cloud connectivity.
NIS2 Compliance Analysis
NIS2 Article 21(2)(g) requires "policies and procedures regarding the use of cryptography and, where appropriate, encryption." Notably, NIS2 Article 21(2)(d) also requires "supply chain security, including security-related aspects concerning the relationships between each entity and its direct suppliers or service providers."
The supply chain argument: If Microsoft Intune is your MDM platform, then Microsoft — a PRISM-participating entity under permanent FISA 702 surveillance — is a tier-1 supplier in your security infrastructure supply chain. NIS2 requires you to assess and manage supply chain security risk.
The ENISA Threat Landscape 2025 specifically lists US intelligence community access to European infrastructure as a state-level threat in the category "Supply chain attacks." Using a PRISM participant as your endpoint management platform creates a documented, assessable NIS2 supply chain risk.
German KRITIS-regulated entities (critical infrastructure under §8a BSIG) face additional scrutiny: KRITIS-Dachgesetz (in progress for 2026) will tighten supply chain requirements further, specifically addressing US-jurisdiction cloud dependencies for critical sector operators.
Pricing Comparison (2026)
| Solution | Deployment | Pricing | Notes |
|---|---|---|---|
| Microsoft Intune | SaaS (US cloud) | €6/user/month (standalone), included in M365 E3 | €6/user means €600/month per 100 users |
| baramundi management suite | On-prem or EU SaaS | €4-8/device/year (contact sales) | Lower TCO for stable device fleets |
| Matrix42 UEM | On-prem or EU SaaS | €5-10/device/year | Comparable to baramundi, stronger in large enterprise |
| Cortado MDM | EU SaaS | €2-4/device/month (Apple focus) | Less than Intune for Apple-only fleets |
| ACMP by Aagon | On-prem | Contact sales | Typically €3-6/device/year |
TCO consideration: For organisations already paying M365 E3/E5 (which includes Intune), the apparent incremental cost of Intune is zero. However, the true cost includes GDPR compliance overhead, DPA interaction risk, and the legal cost of demonstrating adequate safeguards for CLOUD Act-exposed data. EU-native alternatives avoid this compliance cost layer entirely.
12-Week Migration Guide: Intune → EU-Native MDM
Weeks 1-2: Inventory and Current-State Assessment
- Export Intune device inventory (Intune portal → Devices → All devices → Export)
- Document all active Configuration Profiles, Compliance Policies, and App Protection Policies
- Identify Windows Autopilot-registered devices (special handling required)
- Assess Entra ID Conditional Access dependencies (these are separate from MDM migration)
- Map M365/Entra ID sign-in integrations that Intune policies enforce
Key finding at this stage: Many organisations discover that Intune policies are tightly coupled to Entra ID Conditional Access. Migrating MDM without addressing Entra ID dependency only partially reduces CLOUD Act exposure.
Weeks 3-4: Select EU-Native Replacement and Plan Architecture
- Choose primary MDM: baramundi (Windows-heavy), Matrix42 (hybrid enterprise), Cortado (Apple-heavy)
- Decision: on-premises deployment or EU-hosted SaaS (both options maintain 0/25 CLOUD Act score)
- Plan the Entra ID dependency: either retain Entra ID (accepting residual US exposure) or plan parallel identity migration to Keycloak/Authentik/Zitadel
- License procurement and infrastructure sizing
Weeks 5-6: Parallel Deployment
- Deploy EU-native MDM alongside Intune (not replacing yet)
- Enroll 10-20 pilot devices in new MDM
- Import baseline configuration profiles
- Test patch management pipeline (especially WUfB replacement via baramundi Patch Management)
Weeks 7-8: Compliance Policy Migration
- Recreate compliance policies in EU-native MDM
- Validate device health checks, encryption enforcement, PIN policies
- Test app protection policies (MAM equivalent)
Weeks 9-10: Bulk Device Migration
- Migrate remaining devices in cohorts (by department or building)
- Validate Windows Update delivery without Microsoft cloud connectivity
- Document compliance evidence for each device
Weeks 11-12: Intune Decommission and Documentation
- Remove devices from Intune
- Cancel/downgrade M365 licenses if Intune was the primary driver
- Important: Intune license cancellation does not automatically remove Autopilot registrations — these must be manually deleted from the Windows Autopilot portal
- Produce GDPR Article 30 processing activity update: remove Microsoft Intune from data processing inventory
- Produce NIS2 supply chain risk register update: document elimination of PRISM-participant dependency
Decision Framework: Should Your Organisation Migrate?
Is Microsoft Intune your primary or sole MDM platform?
│
├── YES → Does your organisation fall under any of the following?
│ ├── NIS2 Annex I/II entity (critical infrastructure)
│ ├── German KRITIS-regulated entity (§8a BSIG)
│ ├── EU financial services under DORA
│ ├── Healthcare under EU MDR or national health data law
│ ├── Processing special categories (Art. 9 GDPR) via managed devices
│ └── Public sector (EU institutions, German Bundesbehörden, etc.)
│ │
│ ├── YES to any → MIGRATE. PRISM exposure + NIS2 supply chain risk
│ │ is documentable and assessable.
│ │ → Start with baramundi or Matrix42
│ │
│ └── NO → Evaluate. Consider DPA inquiry risk and CLOUD Act exposure.
│ Migration is advisable but not immediately mandatory.
│
└── NO → Intune as secondary/legacy → Phase out on your normal refresh cycle.
No emergency migration needed.
Summary: The PRISM Premium You Didn't Know You Were Paying
Microsoft Intune is exceptional enterprise software. It is deeply integrated with the Microsoft ecosystem, broadly supported, and administratively convenient for organisations already committed to M365. None of this changes the legal reality.
Microsoft has been a PRISM participant since September 2007 — longer than any other cloud provider. The EU Data Boundary Initiative, while operationally useful, provides no protection against FISA 702 or CLOUD Act demands. Entra ID integration means that European enterprise identity — the foundation of who can access which device, which application, and which data — sits on infrastructure that is accessible to US intelligence agencies.
For NIS2-regulated entities in 2026, this is not a theoretical risk. It is a documented supply chain risk that falls squarely within the Article 21 risk management obligations.
baramundi, Matrix42, and Cortado MDM each provide migration paths that eliminate this exposure. The migration is complex — particularly for organisations with deep Windows Autopilot and Entra ID integration — but the 12-week framework above provides a structured path.
The WSUS deprecation timeline adds urgency: organisations that act now can migrate on their own schedule. Those who wait until WSUS reaches end-of-life will face simultaneous pressure from Microsoft's cloud push and their own NIS2 compliance assessments.
Further Reading
- Jamf EU Alternative 2026 — EU MDM Series #1
- AWS SES EU Alternative 2026 — Email API Under CLOUD Act
- EU Endpoint Security Comparison 2026
- EUCS Cloud Certification Levels Explained 2026
EU-Native Hosting
Ready to move to EU-sovereign infrastructure?
sota.io is a German-hosted PaaS — no CLOUD Act exposure, no US jurisdiction, full GDPR compliance by design. Deploy your first app in minutes.