Bash, the Crucial Exams Chat Bot
AI Bot
Microsoft Intune Configuration and Policies Flashcards
Microsoft 365 Endpoint Administrator Associate MD-102 Flashcards
| Front | Back |
| Can Intune manage BYOD devices | Yes, Intune supports management of personally-owned devices (BYOD) without full control |
| How can an administrator define access permissions in Intune | By using role-based access control (RBAC) |
| How can updates be controlled via Intune | Through update policies such as Windows Update Ring or macOS update settings |
| How can you assign users to an Intune group | Through Azure Active Directory by creating groups and assigning users |
| How can you enforce compliance policies in Intune | By setting rules and requirements that devices must meet to access corporate resources |
| How do you deploy applications using Intune | Through the Apps section in the Intune console by assigning apps to devices or users |
| How does Intune handle lost or stolen devices | Devices can be remotely wiped or locked through the Intune portal |
| How is Conditional Access integrated with compliance policies | It uses compliance states from Intune to allow or block access to resources |
| How is device security ensured via Intune | Through policies like password rules, encryption enforcement, and endpoint protection |
| What are App Protection Policies in Intune | Policies that ensure corporate app data is secure, even on unmanaged devices |
| What are device compliance policies | Rules that define the minimum requirements for a device to be "compliant" |
| What are Group Policies in Intune | Sets of settings that define rules and configurations applied to a group of devices or users |
| What are managed profiles in Intune | Profiles that separate work and personal data on Android devices |
| What are the methods for enrolling devices in Intune | Automatic enrollment, manual enrollment, group policy enrollment, or using DEP/ABM for Apple devices |
| What feature helps detect and block threats in Intune-managed devices | Integration with Microsoft Defender ATP |
| What happens to non-compliant devices in Intune | They can be blocked from accessing corporate resources or flagged for remediation |
| What is a compliance status in Intune | Indicator of whether a device meets set compliance policies |
| What is a Managed App in Intune | An app specifically targeted by Intune for management purposes |
| What is Conditional Access in Intune | A feature that secures resources by requiring devices to meet compliance requirements before accessing |
| What is Conditional Access policy enforcement based on | Device compliance state, user risk level, and app behavior |
| What is device enrollment in Intune | The process of registering a device to be managed by Intune |
| What is Microsoft Intune used for | Cloud-based service for managing devices, applications, and security policies |
| What is Mobile Application Management (MAM) in Intune | Feature to protect and secure app data without managing the entire device |
| What is Multi-Identity capability in Intune | Ability for Intune-protected apps to distinguish between corporate and personal data |
| What is the benefit of using Compliance Reporting in Intune | It provides insights into the compliance state of devices managed by Intune |
| What is the purpose of device configuration policies | To define user and device settings for managed devices |
| What is the role of the Endpoint Manager Admin Console | It serves as the centralized portal for managing Intune configurations and policies |
| What platforms does Microsoft Intune support | Windows, macOS, Android, iOS, and Windows Phone |
| What tool helps troubleshoot Intune device issues | The Intune Troubleshooting Portal |
| What types of apps can be deployed through Intune | Line-of-business (LOB), store apps, web apps, and Win32 apps |
This deck focuses on configuring and managing devices and applications using Microsoft Intune, including compliance policies and conditional access settings.