Podcast
Questions and Answers
User1 needs to deploy new computers within Adatum. Which Azure AD role should be assigned to User1 to minimize administrative effort?
User1 needs to deploy new computers within Adatum. Which Azure AD role should be assigned to User1 to minimize administrative effort?
- Cloud Device Administrator (correct)
- Hybrid Identity Administrator
- Intune Administrator
- Global Administrator
Which devices are converted to Autopilot by the Profile1 configuration?
Which devices are converted to Autopilot by the Profile1 configuration?
- All devices in Group2, except for those in Group1
- All Windows PC devices in the adatum.com domain
- All devices in Group1, except for those in Group2 (correct)
- Only devices that are already enrolled in Autopilot
You need to enable users in GroupA to deploy new computers while minimizing administrative effort. What should you configure?
You need to enable users in GroupA to deploy new computers while minimizing administrative effort. What should you configure?
- Delegate control in the on-premises Active Directory to allow GroupA members to join computers to the domain. (correct)
- Add the users to the local administrators group on each computer.
- Assign the Intune Administrator role to the GroupA in Azure AD.
- Configure a dynamic group in Azure AD that only contains users in GroupA.
Which statement is correct regarding BitLocker Drive Encryption and Secure Boot settings on the devices?
Which statement is correct regarding BitLocker Drive Encryption and Secure Boot settings on the devices?
You need to ensure that only devices compliant with Intune policies can access Exchange Online. Which type of policy should you configure?
You need to ensure that only devices compliant with Intune policies can access Exchange Online. Which type of policy should you configure?
You are implementing Controlled folder access. Which folders are protected on Device2?
You are implementing Controlled folder access. Which folders are protected on Device2?
What is the purpose of the Intune connector for Active Directory?
What is the purpose of the Intune connector for Active Directory?
Which VPN connection types are supported by Connection1 and Connection2, respectively?
Which VPN connection types are supported by Connection1 and Connection2, respectively?
You deploy Boundary1. Which devices will have the network boundary of 192.168.1.0/24 applied?
You deploy Boundary1. Which devices will have the network boundary of 192.168.1.0/24 applied?
After 30 minutes of inactivity on a device managed by the iOS App Protection Policy, what will happen?
After 30 minutes of inactivity on a device managed by the iOS App Protection Policy, what will happen?
You have assigned the App Protection policy. After a user enters the wrong PIN five times, what action will occur?
You have assigned the App Protection policy. After a user enters the wrong PIN five times, what action will occur?
You need to customize the installation of Microsoft 365 Apps for enterprise. What are the correct steps to perform this task?
You need to customize the installation of Microsoft 365 Apps for enterprise. What are the correct steps to perform this task?
You need to determine the correct devices for app configuration policies. On which devices can you apply app configuration policies?
You need to determine the correct devices for app configuration policies. On which devices can you apply app configuration policies?
You need to prevent users from copying and pasting data to other apps. Which type of policy and how many policies should be set?
You need to prevent users from copying and pasting data to other apps. Which type of policy and how many policies should be set?
You want to install App1 before App2. You need to configure the App1 deployments first. What should you change?
You want to install App1 before App2. You need to configure the App1 deployments first. What should you change?
You have devices enrolled in Intune and you want to manage Apple1. What is the minimum app configuration policies required?
You have devices enrolled in Intune and you want to manage Apple1. What is the minimum app configuration policies required?
Which 'condition' setting should you add to CAPolicy1 to block only legacy authentication requests?
Which 'condition' setting should you add to CAPolicy1 to block only legacy authentication requests?
What settings should be updated in the Microsoft 365 Apps admin center to enable automatic installation of WebView2 Runtime and prevent users from submitting feedback?
What settings should be updated in the Microsoft 365 Apps admin center to enable automatic installation of WebView2 Runtime and prevent users from submitting feedback?
You need to deploy the Microsoft 365 Apps for Enterprise suite to all 10 computers. What should you do?
You need to deploy the Microsoft 365 Apps for Enterprise suite to all 10 computers. What should you do?
A Windows 11 is having issues with connectivity and has been offline for 30 days. You need to remove this device. What should you use?
A Windows 11 is having issues with connectivity and has been offline for 30 days. You need to remove this device. What should you use?
You need to review the startup times and restart frequencies of the devices in Intune. Which option would accomplish this task?
You need to review the startup times and restart frequencies of the devices in Intune. Which option would accomplish this task?
If you need to be able to install the 'latest' to Windows 10 devices, which update setting should you ensure is enabled 'Allow'?
If you need to be able to install the 'latest' to Windows 10 devices, which update setting should you ensure is enabled 'Allow'?
Android Enterprise contains corporate owned work profile and is enrolled in Microsoft Intune. What configuration settings should you modify in the device restriction profiles?
Android Enterprise contains corporate owned work profile and is enrolled in Microsoft Intune. What configuration settings should you modify in the device restriction profiles?
You need to ensure you can apply Defender policies. What should you do?
You need to ensure you can apply Defender policies. What should you do?
Which actions to minimize Microsoft Defender firewall?
Which actions to minimize Microsoft Defender firewall?
Your company must increase security. How do you configure PowerShell's to prevent suspicious scripts running on devices?
Your company must increase security. How do you configure PowerShell's to prevent suspicious scripts running on devices?
To migrate existing Default Domain Policies GPO, what device configuration profile is used?
To migrate existing Default Domain Policies GPO, what device configuration profile is used?
You want enable Android device to use Android work. What settings needs to be configured?
You want enable Android device to use Android work. What settings needs to be configured?
You're setting up Kiosk. What two items should you configure?
You're setting up Kiosk. What two items should you configure?
You can configure the devices to be connected and retrieve Windows updates from the internet and from other computers to local network. How are you able to configure the Delivery Optimization.
You can configure the devices to be connected and retrieve Windows updates from the internet and from other computers to local network. How are you able to configure the Delivery Optimization.
For an Azure, AD tenant to create notification1 too group 1, which statement must be true?
For an Azure, AD tenant to create notification1 too group 1, which statement must be true?
You are looking to start remote connection to computer 2. What must occur first?
You are looking to start remote connection to computer 2. What must occur first?
You are preparing for Autopilot, what first steps needs to occur?
You are preparing for Autopilot, what first steps needs to occur?
You are working with Microsoft Deployment and modifying the WinPE settings. What step should you take Next?
You are working with Microsoft Deployment and modifying the WinPE settings. What step should you take Next?
When users join windows 10 computer. What must you extract?
When users join windows 10 computer. What must you extract?
To enable the Windows Remote Management (WinRM) service on Computer1?
To enable the Windows Remote Management (WinRM) service on Computer1?
In Microsoft Intune Deployment. Which three actions should you perform?
In Microsoft Intune Deployment. Which three actions should you perform?
Which policy allows you to access specific microsoft exchange online.
Which policy allows you to access specific microsoft exchange online.
Flashcards
adatum.com Domain
adatum.com Domain
An on-premises Active Directory domain is named adatum.com. It contains servers like DC1, Server1, and Server2, with roles such as Domain Controller and Member Server.
User1's Role
User1's Role
User1 is assigned the Cloud Device Administrator role and is a member of GroupA.
User2 Role
User2 Role
User2 has the Azure AD Joined Device Local Administrator role & belongs to GroupB
User3 Role
User3 Role
Signup and view all the flashcards
User4 Role
User4 Role
Signup and view all the flashcards
Device1
Device1
Signup and view all the flashcards
Device2
Device2
Signup and view all the flashcards
Device3
Device3
Signup and view all the flashcards
Device4
Device4
Signup and view all the flashcards
Device5
Device5
Signup and view all the flashcards
Device1 Configuration
Device1 Configuration
Signup and view all the flashcards
Device2 Configuration
Device2 Configuration
Signup and view all the flashcards
Device3 Configuration
Device3 Configuration
Signup and view all the flashcards
Device4 Configuration
Device4 Configuration
Signup and view all the flashcards
Device5 Configuration
Device5 Configuration
Signup and view all the flashcards
Policy1
Policy1
Signup and view all the flashcards
Policy2
Policy2
Signup and view all the flashcards
Policy3
Policy3
Signup and view all the flashcards
Compliance Policy Settings
Compliance Policy Settings
Signup and view all the flashcards
Compliance
Compliance
Signup and view all the flashcards
Compliance Period
Compliance Period
Signup and view all the flashcards
Protection 1
Protection 1
Signup and view all the flashcards
autopilot profile
autopilot profile
Signup and view all the flashcards
Boundary 1
Boundary 1
Signup and view all the flashcards
Connection 1
Connection 1
Signup and view all the flashcards
CAPolicy1
CAPolicy1
Signup and view all the flashcards
Study Notes
- The study notes cover information related to Microsoft MD-102 exam, focusing on endpoint administration, Microsoft Intune, and Active Directory within the context of a consulting company called Adatum Corporation.
Adatum Corporation Overview
- Adatum is a consulting firm with offices in Montreal, Seattle, and New York and uses a Microsoft 365 E5 subscription.
Network Environment
- The on-premises network uses an Active Directory domain called adatum.com and uses a hybrid Azure AD tenant with the same name.
- The domain contains the below servers:
- DC1: Windows Server 2019, Domain controller
- Server1: Windows Server 2016, Member server
- Server2: Windows Server 2019, Member server
Users and Groups
- The adatum.com tenant contains the users:
- User1: Cloud Device Administrator, Member of GroupA
- User2: Azure AD Joined Device Local Administrator, Member of GroupB
- User3: Global Reader, Member of GroupA and GroupB
- User4: Global Administrator, Member of Group1
- All users have a Microsoft Office 365 license and EMS E3 license and Enterprise State Roaming enabled for Group1 and GroupA.
- Group1 and Group2 are assigned a membership type of Assigned.
Devices
- The corporation uses Windows 10 devices joined to Azure AD and enrolled in Microsoft Intune.
- Devices configuration
- Device1: Corporate-owned, Member of Group1, Scope: Default, BitLocker: Yes, Secure Boot: No, VPN: VPN1
- Device2: Corporate-owned, Member of Group1, Group2, Scope: Tag2, BitLocker: Yes, Secure Boot: Yes, VPN: VPN1, VPN3
- Device3: Personally-owned, Member of Group1, Scope: Tag1, BitLocker: No, Secure Boot: No, VPN: VPN3
- Device4: Personally-owned, Member of Group2, Scope: Tag2, BitLocker: No, Secure Boot: Yes, VPN: None
- Device5: Corporate-owned, Member of Group3, Scope: Default, BitLocker: Yes, Secure Boot: No, VPN: None
- All Azure AD joined devices have an executable file
C:\AppA.exe
and a folder namedD:\Folder1
.
Microsoft Intune Configuration
- Microsoft Intune uses below compliance policies:
- Policy1: Require BitLocker only, Assigned to Group1
- Policy2: Require Secure Boot only, Assigned to Group1
- Policy3: Require BitLocker and Secure Boot, Assigned to Group2
- Compliances policy settings: Devices with no compliance policy assigned are compliant, and enhanced jailbreak detection is disabled, and a compliance status validity period is 30 days.
- Automatic Enrollment configs are:
- MDM user scope: GroupA
- MAM user scope: GroupB
- Endpoint protection configuration profile settings:
- Name: Protection1
- Folder protection: Enabled
- List of apps that have access to protected folders:
C:\*\AppA.exe
- List of additional folders that need to be protected:
D:\Folder1
- Assignments: Group2 and GroupB
Windows Autopilot Configuration
- The Intune connector for AD must be installed on Server1.
- Windows Autopilot profile settings:
- Name: Profile 1
- Convert all targeted devices to Autopilot: Yes
- Device type: Windows PC.
- OOBE settings:
- Deployment mode: User-Driven
- Join to Azure AD as: Azure AD joined
- Skip AD connectivity check: No
- Language (Region): Operating system default
- Automatically configure keyboard: Yes
- Hide Microsoft Software License Terms, Privacy settings, and Hide change account options, User account type: Standard
- No to Allow White Glove OOBE and Apply device name template
- Included groups: Group 1
- Excluded groups Group 2
- Planned changes:
- Purchase a new Windows 10 device named Device6 and enroll the device in Intune
- New computers will be deployed by using Windows Autopilot and will be hybrid Azure AD joined.
- Microsoft Intune will deploy Boundary1
- Name: Boundary1
- Network boundary: 192.168.1.0/24
- Scope tags: Tag1
- Assignments: Group1, Group2
- The Microsoft Intune will deploy Connection1 and Connection2
- Connection1: VPN1, L2TP, Group1, Group2, GroupA
- Connection2: VPN2, IKEv2, GroupA, GroupB
Technical requirements
- Users in GroupA need the ability to deploy new computers.
- Minimize administrative effort.
iOS App Protection Policy
- Access Requirements:
- PIN for access: Require, Type: Numeric
- Simple PIN: Allow, Minimum PIN length: 6
- Touch ID instead of PIN for access: Allow
- Override biometrics timeout: Require, Timeout: 30 minutes of inactivity
- Face ID instead of PIN for access: Block
- PIN reset days: 0
- App PIN: Require, Credentials for access: Require
- Access requirements rechecked after 30 minutes of inactivity
- Conditional Launch:
- Max PIN attempts: 5, Action: Reset PIN
- Offline grace period: 720 minutes / 30 days
- Jailbroken/rooted devices: Block access
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.