Bash, the Crucial Exams Chat Bot
AI Bot
Microsoft Intune Configuration and Policies Flashcards
Microsoft 365 Endpoint Administrator Associate MD-102 Flashcards
| Front | Back |
| Can Intune manage BYOD devices | Yes, Intune supports management of personally-owned devices (BYOD) without full control |
| How can an administrator define access permissions in Intune | By using role-based access control (RBAC) |
| How can updates be controlled via Intune | Through update policies such as Windows Update Ring or macOS update settings |
| How can you assign users to an Intune group | Through Azure Active Directory by creating groups and assigning users |
| How can you enforce compliance policies in Intune | By setting rules and requirements that devices must meet to access corporate resources |
| How do you deploy applications using Intune | Through the Apps section in the Intune console by assigning apps to devices or users |
| How does Intune handle lost or stolen devices | Devices can be remotely wiped or locked through the Intune portal |
| How is Conditional Access integrated with compliance policies | It uses compliance states from Intune to allow or block access to resources |
| How is device security ensured via Intune | Through policies like password rules, encryption enforcement, and endpoint protection |
| What are App Protection Policies in Intune | Policies that ensure corporate app data is secure, even on unmanaged devices |
| What are device compliance policies | Rules that define the minimum requirements for a device to be "compliant" |
| What are Group Policies in Intune | Sets of settings that define rules and configurations applied to a group of devices or users |
| What are managed profiles in Intune | Profiles that separate work and personal data on Android devices |
| What are the methods for enrolling devices in Intune | Automatic enrollment, manual enrollment, group policy enrollment, or using DEP/ABM for Apple devices |
| What feature helps detect and block threats in Intune-managed devices | Integration with Microsoft Defender ATP |
| What happens to non-compliant devices in Intune | They can be blocked from accessing corporate resources or flagged for remediation |
| What is a compliance status in Intune | Indicator of whether a device meets set compliance policies |
| What is a Managed App in Intune | An app specifically targeted by Intune for management purposes |
| What is Conditional Access in Intune | A feature that secures resources by requiring devices to meet compliance requirements before accessing |
| What is Conditional Access policy enforcement based on | Device compliance state, user risk level, and app behavior |
| What is device enrollment in Intune | The process of registering a device to be managed by Intune |
| What is Microsoft Intune used for | Cloud-based service for managing devices, applications, and security policies |
| What is Mobile Application Management (MAM) in Intune | Feature to protect and secure app data without managing the entire device |
| What is Multi-Identity capability in Intune | Ability for Intune-protected apps to distinguish between corporate and personal data |
| What is the benefit of using Compliance Reporting in Intune | It provides insights into the compliance state of devices managed by Intune |
| What is the purpose of device configuration policies | To define user and device settings for managed devices |
| What is the role of the Endpoint Manager Admin Console | It serves as the centralized portal for managing Intune configurations and policies |
| What platforms does Microsoft Intune support | Windows, macOS, Android, iOS, and Windows Phone |
| What tool helps troubleshoot Intune device issues | The Intune Troubleshooting Portal |
| What types of apps can be deployed through Intune | Line-of-business (LOB), store apps, web apps, and Win32 apps |
Front
What is the purpose of device configuration policies
Click the card to flip
Back
To define user and device settings for managed devices
Front
How can you enforce compliance policies in Intune
Back
By setting rules and requirements that devices must meet to access corporate resources
Front
What are device compliance policies
Back
Rules that define the minimum requirements for a device to be "compliant"
Front
How can you assign users to an Intune group
Back
Through Azure Active Directory by creating groups and assigning users
Front
What is Microsoft Intune used for
Back
Cloud-based service for managing devices, applications, and security policies
Front
How is Conditional Access integrated with compliance policies
Back
It uses compliance states from Intune to allow or block access to resources
Front
What is device enrollment in Intune
Back
The process of registering a device to be managed by Intune
Front
What is Mobile Application Management (MAM) in Intune
Back
Feature to protect and secure app data without managing the entire device
Front
What is Conditional Access in Intune
Back
A feature that secures resources by requiring devices to meet compliance requirements before accessing
Front
How can updates be controlled via Intune
Back
Through update policies such as Windows Update Ring or macOS update settings
Front
What is the benefit of using Compliance Reporting in Intune
Back
It provides insights into the compliance state of devices managed by Intune
Front
What are Group Policies in Intune
Back
Sets of settings that define rules and configurations applied to a group of devices or users
Front
What platforms does Microsoft Intune support
Back
Windows, macOS, Android, iOS, and Windows Phone
Front
What is a Managed App in Intune
Back
An app specifically targeted by Intune for management purposes
Front
How does Intune handle lost or stolen devices
Back
Devices can be remotely wiped or locked through the Intune portal
Front
What is Multi-Identity capability in Intune
Back
Ability for Intune-protected apps to distinguish between corporate and personal data
Front
How do you deploy applications using Intune
Back
Through the Apps section in the Intune console by assigning apps to devices or users
Front
What is the role of the Endpoint Manager Admin Console
Back
It serves as the centralized portal for managing Intune configurations and policies
Front
What are the methods for enrolling devices in Intune
Back
Automatic enrollment, manual enrollment, group policy enrollment, or using DEP/ABM for Apple devices
Front
What types of apps can be deployed through Intune
Back
Line-of-business (LOB), store apps, web apps, and Win32 apps
Front
What is a compliance status in Intune
Back
Indicator of whether a device meets set compliance policies
Front
What happens to non-compliant devices in Intune
Back
They can be blocked from accessing corporate resources or flagged for remediation
Front
What are managed profiles in Intune
Back
Profiles that separate work and personal data on Android devices
Front
How is device security ensured via Intune
Back
Through policies like password rules, encryption enforcement, and endpoint protection
Front
What feature helps detect and block threats in Intune-managed devices
Back
Integration with Microsoft Defender ATP
Front
What tool helps troubleshoot Intune device issues
Back
The Intune Troubleshooting Portal
Front
What is Conditional Access policy enforcement based on
Back
Device compliance state, user risk level, and app behavior
Front
What are App Protection Policies in Intune
Back
Policies that ensure corporate app data is secure, even on unmanaged devices
Front
How can an administrator define access permissions in Intune
Back
By using role-based access control (RBAC)
Front
Can Intune manage BYOD devices
Back
Yes, Intune supports management of personally-owned devices (BYOD) without full control
1/30
This deck focuses on configuring and managing devices and applications using Microsoft Intune, including compliance policies and conditional access settings.