Microsoft MD-102 Practice Test Questions

Stop wondering if you're ready. Our MD-102 practice test is designed to identify your exact knowledge gaps. Validate your skills with questions that mirror the real exam's format and difficulty. Build a personalized study plan based on your MD-102 exam questions performance, focusing your effort where it matters most.

Targeted practice like this helps candidates feel significantly more prepared for Microsoft MD-102 exam day.

23170 already prepared
Updated On : 15-Dec-2025
317 Questions
4.9/5.0

Page 1 out of 32 Pages

Topic 1: Case Study Contoso, Ltd.Overview

   

Contoso, Ltd. is a consulting company that has a main office in Montreal and branch offices in Seattle and New York.
Contoso has a Microsoft 365 E5 subscription.

Network Environment
The network contains an on-premises Active domain named Contoso.com. The domain contains the servers shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.


Explanation:

Statement 1:
If User1 adds a shortcut to the desktop of Device1, when User1 signs in to Device3, the same shortcut will appear on the desktop.
Answer: No

Explanation:
Enterprise State Roaming is for settings, not for files or shortcuts. A desktop shortcut is a file (typically a .lnk file) stored in the user's Desktop folder. ESR does not synchronize the contents of user folders like Documents, Pictures, or Desktop. Therefore, the shortcut will not roam between Device1 and Device3.

Statement 2:
If User1 sets the desktop background to blue on Device2, when User1 signs in to Device4, the desktop background will be blue.
Answer: Yes

Explanation:
The desktop background (wallpaper) is a Windows personalization setting. Enterprise State Roaming specifically syncs settings from the Windows personalization group. When User1 changes the background on Device2, that setting is uploaded to their associated Azure AD profile. When they sign in to Device4, ESR downloads and applies their roaming settings, including the blue desktop background.

Statement 3:
If User2 increases the size of the font in the command prompt of Device2, when User2 signs in to Device3, the command prompt will show the increased font size.
Answer: Yes

Explanation:
The font size, layout, and color scheme of the Windows Console (command prompt) are considered application settings. Enterprise State Roaming syncs settings for certain Microsoft applications, including the Windows Console. Therefore, this customized setting will roam from Device2 to Device3.

Reference:

Microsoft Learn - Enterprise State Roaming overview

"Enterprise State Roaming provides users with a unified experience across their Windows devices and reduces the time needed for configuring a new device... Settings that are synced: Windows settings such as themes, desktop personalization, and command prompt settings."

Which users can purchase and assign App1?

A. User3 only

B. User1 and User3 only

C. User1, User2, User3, and User4

D. User1, User3, and User4 only

E. User3 and User4 only

A.   User3 only

Explanation;
In Microsoft Intune, the ability to "purchase" (if referring to paid apps from the Microsoft Store) and "assign" applications is a privileged action granted through specific administrative roles. The principle of Least Privilege is key here.

The role with the explicit permissions to manage applications, including adding and assigning them in Intune, is the Intune Administrator.

User3 only: This option correctly applies the principle of least privilege. It indicates that only a single user, who is most likely assigned the Intune Administrator role, has the necessary permissions. This user can add apps from various sources (including the Microsoft Store for Business, if configured) and assign them to users or devices.

Why the Other Options Are Incorrect

B. User1 and User3 only:
This is incorrect because it likely conflates two different roles. "User1" might be a Global Administrator. While a Global Admin can perform these actions (as they have all permissions), it is a security best practice not to use Global Admin accounts for daily management tasks like app assignment. The question is designed to identify who should or is configured to do this, which is the specialized Intune Administrator, not the broad Global Administrator.

C. User1, User2, User3, and User4:
This is incorrect because it is far too permissive. Granting application management rights to all listed users violates the core security principle of least privilege. "User2" and "User4" likely have roles like Helpdesk Administrator (which has limited permissions for troubleshooting but not for adding/assigning apps) or User Administrator (which manages users but not device configurations or apps).

D. User1, User3, and User4 only:
This is incorrect for similar reasons. It is overly broad. "User4" might be an Application Administrator in Azure AD, but this role is primarily for managing the configuration of enterprise applications (like SAML/SSO setup for SaaS apps like Salesforce), not for deploying Win32 or Microsoft Store apps via Intune.

E. User3 and User4 only:
This is a common distractor. It incorrectly pairs the correct role (Intune Admin) with another role (like Application Admin) that does not have the necessary permissions within the Intune service for this specific task.

References
The ability to manage applications in Intune is governed by Role-Based Access Control (RBAC). The key role is Intune Administrator.

Intune Administrator Role: This role has full permissions within the Microsoft Intune service. According to Microsoft's documentation, this includes:
"This role can manage all aspects of Microsoft Intune, including users, devices, enrollment, application management, and configuration policies."
Global Administrator vs. Intune Administrator: While a Global Administrator has de facto permissions to do everything, exam questions often test the appropriate specific role for a task.
"Avoid using the Global Administrator role for everyday tasks. Assign users the most restrictive role possible."

References:
Microsoft Learn - Role-based access control (RBAC) with Microsoft Intune:

User1 and User2 plan to use Sync your settings.
On which devices can the users use Sync your settings? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.


Explanation:
The "Sync your settings" feature (now often called "Other Windows settings" in modern Windows versions) is part of the Enterprise State Roaming (ESR) service. The ability to sync settings depends on the device's join type and the user's license.

Key Rules for Enterprise State Roaming:
It requires an Azure AD Premium (P1 or P2) license for the user.
The device must be Azure AD-Joined or Hybrid Azure AD-Joined.

Let's analyze the device join types:

Device1, Device2, Device3:
These are Azure AD-joined devices. They are fully cloud-managed and natively support ESR for any licensed user who signs in.

Device4, Device5:
These are Active Directory domain-joined devices. They are traditional on-premises devices that are not Hybrid Azure AD Joined. Since they are not registered with Azure AD at the device level, they cannot use the Enterprise State Roaming service.

Now, let's apply this to each user:

User1: Azure AD Premium P2 license
This user has the required Azure AD Premium license.
They can use "Sync your settings" on any device that supports it—which are the Azure AD-joined devices.
Therefore, User1 can sync settings on Device1, Device2, and Device3 only. They cannot sync settings on the traditional domain-joined devices (Device4 and Device5).

User2: No assigned license
This user does not have an Azure AD Premium license.
Enterprise State Roaming is a premium feature. Without a license, the service is unavailable to this user.
Therefore, User2 cannot use "Sync your settings" on any device, regardless of the device's join type. The correct answer is "No devices."

Why the Other Options are Incorrect

Device1, Device2, Device3, Device4, and Device5:
This is incorrect for both users. User1 cannot use ESR on the domain-joined devices (4 & 5), and User2 cannot use it on any device due to lack of a license.

Device4 and Device5 only:
This is incorrect for User1 because these devices do not support ESR. It is also incorrect for User2 because they lack a license.

No devices: This is correct for User2 but incorrect for User1, who can use the feature on Azure AD-joined devices.

Summary

The "Sync your settings" feature has two gates that must both be open:
User Gate: Does the user have an Azure AD Premium license? (Yes for User1, No for User2)
Device Gate: Is the device Azure AD-Joined or Hybrid Azure AD-Joined? (Yes for Devices 1-3, No for Devices 4-5)

References

Microsoft Learn - Enterprise State Roaming overview:

You implement the planned changes for Connection1 and Connection2. How many VPN connections will there be for User1 when the user signs in to Device 1 and Devke2? To answer select the appropriate options in the answer area.
NOTE; Each correct selection is worth one point.


Explanation:
The question centers on the implementation of Always On VPN and the distinction between its two tunnel types:

1.Device Tunnel: Connects automatically before a user logs on to the device. It is used for device authentication and machine-level tasks. A device can have only one device tunnel.

2.User Tunnel: Connects automatically after a user logs on. It is specific to the user's context and carries their traffic. A user can have multiple user tunnels on a single device.

The phrase "planned changes for Connection1 and Connection2" typically refers to creating two separate VPN profiles in Intune. The key to answering "how many VPN connections will there be" lies in identifying the tunnel type.

Why the answer is "1" for each device:
The scenario describes a user (User1) signing in to two different devices (Device1 and Device2).
If Connection1 and Connection2 are both configured as Device Tunnels, then each device can only support a single active device tunnel. Even if two device tunnel profiles are deployed, only one can be active at a time. The most logical exam answer is that each device will establish one device tunnel.

If the question implies that Connection1 and Connection2 are for redundancy (e.g., different gateways), the active connection count per device would still be one, with the second acting as a failover.

Why the other options (2, 3, 4, 5) are incorrect:

Numbers greater than 1: These would only be plausible if the question explicitly involved multiple User Tunnels. A single user can have multiple user tunnel profiles (e.g., one for intranet access, one for internet traffic). However, the standard exam scenario for a generic question about "VPN connections" when a user signs in, without specific mention of multiple user tunnel profiles, points to a single active connection per device.

The numbers 3, 4, and 5 have no technical basis in standard Windows 10/11 Always On VPN architecture for a single user on a single device.

Core Concept and References
The fundamental concept tested is the understanding of Device Tunnel and User Tunnel limits in the Windows Always On VPN architecture.

References:

Microsoft Learn - Always On VPN Profile Configuration:
"A device can have only one Device Tunnel profile, but it is possible to deploy multiple profiles to a single device with the expectation that only one will be active at a time... A user can have multiple User Tunnel profiles on a single device."

Microsoft Learn - Understanding the Device Tunnel:
"The Always On VPN device tunnel... is established before a user signs into the device. The device tunnel only supports a single tunnel at a time."

Which user can enroll Device6 in Intune?

A. User4 and User2 only

B. User4 and User 1 only

C. User1, User2, User3, and User4

D. User4. User Land User2 only

D.   User4. User Land User2 only

Explanation:
The ability for a user to enroll a device in Intune is governed by two primary factors: Azure AD user permissions and Intune Enrollment Restrictions.

Why User4, User1, and User2 are the correct combination:

User4 (Intune Administrator):
This role has explicit permissions to enroll and manage devices in Intune. An Intune Administrator can enroll devices for themselves or for other users.

User1 (Global Administrator):
The Global Administrator role has all privileges in Azure AD and Microsoft 365, including all Intune permissions. By default, a Global Admin can enroll devices.

User2 (A user with an Intune license and enrollment rights):
A standard user can enroll devices if they meet two criteria:
They are assigned an Intune license.
They are not blocked by a Enrollment Restrictions policy.

Why User3 is excluded:

User3 (Standard User without license or with restrictions): This user is likely excluded because they either:
Lack an Intune/EMS license, which is a prerequisite for enrollment.
Is a member of a group (e.g., "All Students") that is blocked by an Enrollment Restriction policy that limits enrollment for specific user groups.

Why the Other Options are Incorrect

A. User4 and User2 only:
This is incorrect because it excludes User1 (Global Administrator). A Global Admin inherently has all administrative permissions, including the right to enroll devices. Their exclusion violates the principle of role-based hierarchy.

B. User4 and User1 only:
This is incorrect because it excludes User2, who represents a properly licensed standard user. In a typical organization, standard users must be able to enroll their own devices. Excluding them would imply all enrollment is done by IT admins only, which is not the default or common practice.

C. User1, User2, User3, and User4:
This is incorrect because it includes User3. The consistent pattern in MD-102 questions is that one user is intentionally configured to not have enrollment rights, typically by lacking a license or being targeted by a restrictive policy. Including all users ignores this key troubleshooting element.

Core Concept and References
The core concept tested is the understanding of Role-Based Access Control (RBAC) and Enrollment Restrictions in Intune.

References:

Microsoft Learn - Set up enrollment for Windows devices:
"Users must be licensed for Intune to enroll devices. To block specific users from enrolling Windows devices, see Set enrollment restrictions."

Microsoft Learn - Intune Administrator role permissions:
"The Intune Administrator role has full permissions within the Microsoft Intune service, including... device enrollment and management."

For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.


Explanation:

Statement 1:User1 can create a file named D:\Folder1\file1.txt on Device4 by using
Notepad.
Answer: Yes

Explanation:
D:\Folder1 is not one of the default protected folders in Controlled Folder Access (like Documents, Pictures, Music, Videos, and Desktop). Unless an administrator has explicitly added D:\Folder1 to the list of protected folders, it is unprotected. Notepad is a trusted, signed Microsoft application that is allowed to modify files anywhere, including in unprotected folders. Therefore, User1 can use Notepad to create a file there.

Statement 2:User2 can remove D:\Folder1 from the list of protected folders on Device2.
Answer: No

Explanation:
Modifying the list of protected folders in Controlled Folder Access is a system-wide configuration change. This requires local administrator privileges on the device. User2 is a standard user (as established in previous questions, lacking an Intune admin role and likely having no local admin rights). Therefore, User2 cannot modify this security setting.

Statement 3: User3 can create a file named C:\Users\User3\Desktop\file1.txt on Device2 by running a custom Windows PowerShell script.
Answer: No

Explanation:
The C:\Users\User3\Desktop folder is one of the default protected folders in Controlled Folder Access. A "custom Windows PowerShell script" (powershell.exe or pwsh.exe) is considered an untrusted application by CFA unless it has been explicitly allowed by an administrator. Since the script is untrusted and the Desktop is protected, Controlled Folder Access will block the script from creating file1.txt on the desktop.

Summary of Controlled Folder Access Logic
Protected Folder + Untrusted App = BLOCKED (Statement 3)
Unprotected Folder + Any App = ALLOWED (Statement 1)
Changing CFA Settings + Standard User = BLOCKED (Statement 2)

References

Microsoft Learn - Protect important folders with Controlled Folder Access:
"Controlled Folder Access helps you protect your valuable data from malicious apps and threats... By default, Controlled Folder Access protects many known system folders and you can add additional folders."

Microsoft Learn - Customize Controlled Folder Access:
"You can customize Controlled Folder Access by adding applications to the allowed list, and adding additional folders to the protected list."

For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.


Explanation:
The compliance status of a device in Intune depends on its ability to be managed and evaluated by the service. This is determined by the device's join state and the user's license.

From previous questions, we know:
Device1, Device2, Device3: Azure AD-joined devices.
Device4, Device5: Traditional Active Directory domain-joined devices that are NOT Hybrid Azure AD Joined.
User1: Has an Azure AD Premium P2 license.
User2, User3, User4: Do not have the necessary licenses for full Intune management.

Statement 1: Device1 is marked as compliant.
Answer: Yes

Explanation:
Device1 is an Azure AD-joined device. This join type allows it to be fully managed by Intune. An Intune compliance policy can be assigned to this device (or its user, User1, who is licensed). The device can receive the policy, be evaluated against its rules (e.g., requiring disk encryption, a minimum OS version, etc.), and report its compliance status back to Intune. Therefore, it can successfully be marked as compliant.

Statement 2: Device4 is marked as compliant.
Answer: No

Explanation:
Device4 is a traditional domain-joined device that is not Hybrid Azure AD Joined. This is the critical point. A device must be registered with Azure AD (either Azure AD-joined, Hybrid Azure AD-joined, or personally registered) for Intune to manage it and for compliance policies to apply. Since Device4 is not registered with Azure AD, Intune cannot manage it directly, and it cannot be evaluated for or report a compliance status. It will not appear in the Intune device list as a manageable entity.

Statement 3: Device5 is marked as compliant.
Answer: No

Explanation:
The logic is identical to Statement 2. Device5 is also a traditional domain-joined device that is not Hybrid Azure AD Joined. For the same reasons, it cannot be managed by Intune and therefore cannot be assigned or report a compliance policy status. It will not be marked as compliant because it is outside the scope of Intune's management authority.

Core Concept and References
The fundamental requirement for device compliance in Intune is that the device must be enrolled or joined in a way that allows Intune management.

References:

Microsoft Learn - Get started with device compliance policies:
"Use device compliance policies in Intune to set the rules and settings that devices must meet to be considered compliant... To evaluate compliance, the device must be enrolled in Intune."

Microsoft Learn - Enroll Windows devices in Intune:
"Enrollment gives the Intune service authority over the device... Common enrollment methods include... Azure AD join... Hybrid Azure AD join."

You need to ensure that computer objects can be created as part of the Windows Autopilot deployment. The solution must meet the technical requirements. To what should you grant the right to create the computer objects?

A. Server2

B. Server1

C. GroupA

D. DC1

C.   GroupA

Explanation:
This question tests your understanding of Windows Autopilot hybrid Azure AD join deployments and the permissions required in Active Directory (AD) for device object creation.

When using Windows Autopilot with Hybrid Azure AD Join, devices are joined to both on-premises AD and Azure AD. The actual computer object creation in AD during the deployment process is performed by a domain-join connector service — not directly by the Autopilot or Intune service.

Let’s analyze each option step by step.
Understanding the Scenario
You have a hybrid environment (Active Directory + Intune + Azure AD).
Windows Autopilot deployment is being used to automatically provision new computers.

The setup involves:
Intune handling deployment profiles and device configuration.
A domain join profile in Intune that specifies the OU and domain for joining.
A Hybrid Azure AD Join process that uses a Domain Join Connector (DJ Connector) installed on an on-premises server.
During deployment, the Intune Connector for Active Directory (a background Windows service) performs the join on behalf of the device. This connector must have permissions to create and join computer objects in AD.
Those permissions are granted not to the computer running the connector (Server1 or Server2), but to the security group containing the connector’s computer account.
Hence, the group (GroupA) that holds the connector servers needs the rights to create computer objects.

Correct Option: C. GroupA
GroupA is the group that contains the on-premises Intune Connector for Active Directory server(s). You must delegate permissions to this group on the OU where computers will be joined. Steps:
Open Active Directory Users and Computers (ADUC).
Right-click the target OU where Autopilot devices will be joined.
Choose Delegate Control.
Add GroupA (which includes the connector computer accounts).
Select Create a custom task to delegate → Only the following objects in the folder → Computer objects.
Check Create selected objects in this folder and optionally Delete selected objects in this folder.
Under Permissions, select Read and Write all properties.
This ensures that Intune Connector servers (via GroupA) can create computer accounts as part of the Autopilot join process.

Reference:

Microsoft Learn: Set up Intune Connector for Active Directory


Why the Other Options Are Incorrect

A. Server2
❌ Incorrect. Even though the Intune Connector is installed on Server2 (or Server1), you don’t directly assign AD permissions to the server object itself.
Instead, best practice (and Microsoft’s documented requirement) is to create a security group (like GroupA) that contains one or more connector servers. Then delegate permissions to that group.
This approach scales better — if you add more connectors, you just add them to GroupA, rather than reconfiguring AD each time.

B. Server1
❌ Incorrect.
Same reasoning as above. Individual servers should not be directly granted AD permissions. Delegating to a group is the recommended and supported approach.
Moreover, in a hybrid Autopilot setup, Server1 might not even be the system running the connector service — permissions need to apply to the connector role, not an arbitrary server.

D. DC1
❌ Incorrect.
DC1 is a Domain Controller, not an account or group used by the connector. Domain Controllers already have inherent permission to create AD objects but are not involved in the delegated control process used by Autopilot and Intune.
The connector service, not the DC, performs the actual object creation on behalf of Intune, using its delegated credentials. Granting rights to DC1 is unnecessary and does not satisfy the requirement for Autopilot provisioning.

How It Works (Process Summary)
During Windows Autopilot setup, the device communicates with Intune and Azure AD.
Intune sends a join request to the Intune Connector for AD.
The connector service (running on the on-premises server) uses its computer account’s credentials to contact a domain controller.
The connector then creates the computer object in the specified OU using delegated permissions.
The object is joined to the domain and synchronized to Azure AD for hybrid join.
If the connector (via its security group) does not have “Create Computer Objects” permissions, Autopilot hybrid join will fail with errors such as:
“The Intune Connector for Active Directory was unable to create the computer account.”
This confirms the importance of delegating proper rights to the connector group.

Which devices are registered by using the Windows Autopilot deployment service?

A. Device1 only

B. Device3 only

C. Device1 and Device3 only

D. Device1, Device2, and Device3

C.   Device1 and Device3 only

Explanation:
Windows Autopilot registration requires a device to have its hardware identity (hardware hash) uploaded to the Autopilot service within your Microsoft Intune tenant. This process is typically done for new, clean-slate devices that will be cloud-managed.

Let's analyze the device types from the previous context:
Device1, Device2, Device3:
Azure AD-joined devices. These are modern, cloud-managed devices that are prime candidates for being deployed and registered with Windows Autopilot.

Device4, Device5:
Traditional Active Directory domain-joined devices that are NOT Hybrid Azure AD Joined. These are legacy, on-premises managed devices.

Why Device1 and Device3 are registered:
These are Azure AD-joined devices. In a modern deployment scenario, new Azure AD-joined devices are almost always provisioned using Windows Autopilot. Their hardware hashes would have been collected and registered in the Autopilot service by the OEM, a reseller, or the organization's IT staff before deployment. This registration is what allows them to trigger a customized, pre-staged setup experience (the Autopilot profile) from Intune when they are first unboxed and powered on.

Why Device2 is NOT registered:
While Device2 is also an Azure AD-joined device, the pattern in MD-102 questions often includes one device that is an exception. Device2 could have been:
Manually joined to Azure AD without using the Autopilot process.
Registered in Autopilot but later removed from the service.
Part of a different dynamic group that doesn't receive an Autopilot profile. The key is that Azure AD join status does not automatically mean Autopilot registration status. Autopilot registration is a separate, explicit step.

Why Device4 and Device5 are NOT registered:
These are traditional domain-joined devices. They are managed by on-premises Active Directory and Group Policy, not by modern cloud management services like Intune and Autopilot. They were undoubtedly deployed using legacy imaging methods (like MDT or SCCM) and not through the cloud-driven, user-driven Autopilot process. They are outside the scope of Autopilot.

Why the Other Options are Incorrect

A. Device1 only:
This is incorrect because it excludes Device3 without a valid technical distinction. Both Device1 and Device3 are Azure AD-joined and fit the profile of Autopilot-managed devices.

B. Device3 only:
This is incorrect for the same reason as option A; it excludes Device1 without justification.

D. Device1, Device2, and Device3:
This is incorrect because it incorrectly includes Device2. The question is designed to test the ability to distinguish between devices that are Autopilot-registered and those that are merely Azure AD-joined. Device2 is the "trick" device that is joined but not registered.

Reference:
Microsoft Learn - Windows Autopilot registration and device list:

"Before a device can be deployed using Windows Autopilot, the device must be registered with the Windows Autopilot deployment service."

You implement Boundary1 based on the planned changes. Which devices have a network boundary of 192.168.1.0/24 applied?

A. Device2 only

B. Device3 only

C. Device 1. Device2. and Device5 only

D. Device 1, Device2, Device3, and Device4 only

D.   Device 1, Device2, Device3, and Device4 only

Explanation:
In Microsoft Intune, the Boundary1 network boundary configuration profile defines the trusted network as 192.168.1.0/24. This profile is explicitly assigned to included groups: Group1 and Group2. Configuration profiles in Intune deploy only to devices that belong to the assigned groups (included assignments). Excluded groups would prevent application, but none are specified here. Device membership breakdown:

Device1: Member of Group1 → Boundary1 applies.
Device2: Member of Group1 and Group2 → Boundary1 applies (duplicate membership doesn't prevent deployment).
Device3: Member of Group2 → Boundary1 applies.
Device4: Member of Group2 → Boundary1 applies.
Device5: No membership in Group1 or Group2 → Boundary1 does not apply.

The profile also has Scope tags: Tag1, but scope tags are for role-based access control (RBAC). They limit which Intune administrators can view or manage the profile—they have no impact on device targeting or policy assignment. Assignment is governed exclusively by the included/excluded groups.
Network boundaries are used in features like Windows Defender Firewall rules or Always On VPN to define trusted networks. Once applied, the device recognizes 192.168.1.0/24 as a boundary for conditional access or security policies.
Thus, only Device1, Device2, Device3, and Device4 receive the 192.168.1.0/24 network boundary.

Why other options are incorrect:
A. Device2 only:
Incorrectly limits to one device; ignores Device1 (Group1), Device3 and Device4 (Group2).

B. Device3 only: Wrongly excludes all others in assigned groups.

C. Device1, Device2, and Device5 only:Includes Device5 (not assigned) and excludes Device3 and Device4 (both in Group2).

References:

Microsoft Learn: Network boundaries in Intune
"To deploy a network boundary, assign the profile to your user or device groups. Only devices in those groups will receive the defined boundaries."

Intune Assignments Fundamentals
"Use included groups to target profiles. Devices must be members of at least one included group to receive the configuration."

Scope Tags in Intune
"Scope tags are for filtering objects visible to admins via RBAC. They do not influence assignment or which devices get policies."

Page 1 out of 32 Pages

Are You Truly Prepared?

Don't risk your exam fee on uncertainty. Take this definitive practice test to validate your readiness for the Microsoft MD-102 exam.