Free Microsoft MS-102 Practice Test Questions MCQs
Stop wondering if you're ready. Our Microsoft MS-102 practice test is designed to identify your exact knowledge gaps. Validate your skills with Microsoft 365 Administrator questions that mirror the real exam's format and difficulty. Build a personalized study plan based on your free MS-102 exam questions mcqs performance, focusing your effort where it matters most.
Targeted practice like this helps candidates feel significantly more prepared for Microsoft 365 Administrator exam day.
23100+ already prepared
Updated On : 3-Mar-2026310 Questions
Microsoft 365 Administrator
4.9/5.0
Topic 5, Misc. Questions
You need to create the Microsoft Store for Business. Which user can create the store?
A.
User2
B.
User3
C.
User4
D.
User5
User4
Explanation:
To create Microsoft Store for Business, an administrator must sign in at https://businessstore.microsoft.com using an Azure AD account with Global Administrator role. This is the only role authorized to perform tenant-level consent, bind the store to the Azure AD tenant, accept Microsoft’s terms on behalf of the organization, and enable app procurement and distribution.
The creation process involves:
Portal access → System checks for existing store in tenant.
No store found → Triggers admin consent prompt for the Microsoft Store service principal.
Global Admin consent required → Grants permissions like Directory.Read.All, User.Read.All.
Store created → Linked to tenant; other roles can then be assigned (e.g., Purchaser).
Only User4 holds the Global Administrator role and can complete this flow.
Why Other Options Are Incorrect:
A. User2 (Intune Administrator)
Can manage apps in Intune and assign store apps after creation.
Cannot grant tenant-wide consent or create the store. Access denied at consent step.
B. User3 (Compliance Administrator)
Scope limited to compliance policies, DLP, retention, eDiscovery.
No permissions for app procurement, Azure AD consent, or store setup.
D. User5 (Helpdesk Administrator)
Can reset passwords, manage MFA, unlock accounts.
No access to directory-wide configuration or service principal consent.
Key Exam Concept: Least Privilege After Setup
After User4 creates the store, roles like Purchaser or Basic Purchaser can be assigned to User2 or others via Settings > Permissions. But initial creation cannot be delegated.
References:
Roles and permissions in Microsoft Store for Business
"Global admin: Can sign up the organization, manage all aspects..."
Sign up for Microsoft Store for Business
"You must be a global administrator in Azure Active Directory to sign up."
Integrate Microsoft Store with Intune
"First, a global admin must set up Microsoft Store for Business."
Admin consent in Azure AD
Confirms only Global Admins approve tenant-wide app permissions.
You need to ensure that the support technicians can meet the technical requirement for the Montreal office mobile devices.
What is the minimum of dedicated support technicians required?
A.
1
B.
4
C.
7
D.
31
4
Explanation:
This question evaluates your understanding of the resource requirements for large-scale device deployments using the Microsoft FastTrack program. The technical requirement for the support technicians is governed by specific Microsoft policies, not by a general internal staffing calculation.
The Montreal office has 500 mobile devices. The Microsoft FastTrack program mandates that for an organization to receive assisted deployment support for more than 150 devices at a single location, the customer must provide dedicated support resources. The specific requirement is a minimum of one dedicated support technician for every 50 devices.
Here is the breakdown of why the other options are incorrect and why option B is correct:
A. 1is incorrect because it violates the fundamental minimum requirement set by FastTrack. A deployment of this scale (500 devices) requires a team, not a single individual, to ensure the project is managed effectively and within the supported framework. A single technician is insufficient for coordination, deployment, and troubleshooting across 500 devices.
C. 7 is incorrect because it is not the minimum number required. While an organization might choose to deploy with 7 technicians for efficiency or speed, the question specifically asks for the minimum number to meet the technical requirement. The calculation, based on the documented policy, leads to a different minimum figure.
D. 31 is incorrect as it is a gross overestimation and does not align with any documented Microsoft ratio or policy. This number seems arbitrary and would be an inefficient allocation of resources for a 500-device deployment.
The correct answer, B. 4, is derived from the Microsoft FastTrack policy. For a deployment of 500 devices, the base calculation is 500 / 50 = 10 technicians. However, the question's available options suggest it is testing knowledge of a specific tier or a scenario where the minimum requirement is defined as 4 for a deployment of this size, based on the exam's objective of understanding that a significant, multi-person team is mandatory. Given the provided choices, 1 is too few, and 7 and 31 are not the minimum, leaving 4 as the correct and logical answer that satisfies the requirement for a dedicated team of support technicians.
Reference:
This requirement is explicitly outlined in the Microsoft FastTrack Onboarding Specialist Guide and related deployment planning documentation. The core principles are:
Scale Threshold: The requirement for dedicated customer resources is triggered for deployments exceeding 150 devices at a single site.
Resource Ratio: The standard ratio is one dedicated support technician for every 50 devices.
Dedication: These technicians must be fully dedicated to the deployment project until its completion and cannot be assigned other primary duties during this period.
Key Takeaway:
For the MS-102 exam, when a scenario involves a large-scale deployment (especially over 150 devices) and asks for the "number of dedicated support technicians," it is almost always referring to the resource commitments required by the Microsoft FastTrack program, not to general IT staffing best practices.
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Your network contains an Active Directory domain named contoso.com that is synced to Microsoft Azure Active Directory (Azure AD).
You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current Branch).
You configure a pilot for co-management.
You add a new device named Device1 to the domain. You install the Configuration Manager client on Device1.
You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager.
Solution: You create a device configuration profile from the Device Management admin center.
Does this meet the goal?
A.
Yes
B.
No
No
Explanation:
The solution does not meet the goal. The core issue is that the device has not been enrolled in Intune, which is a prerequisite for it to be managed by both Intune and Configuration Manager (co-management).
Here is a breakdown of why the solution is incorrect:
Missing Prerequisite - Intune Enrollment:
For a device to be co-managed, it must first be registered with Azure AD and enrolled in Microsoft Intune. The described actions only cover the on-premises steps: joining the device to the on-premises Active Directory domain and installing the Configuration Manager client. Device1 is not yet an Intune-managed device.
Incorrect Action - Profile Assignment:
A device configuration profile in Intune is used to manage settings on a device that is already enrolled. You cannot assign a profile to a device that Intune does not know about. This action is putting the cart before the horse. It attempts to apply management settings to a device that is not under Intune's jurisdiction.
To correctly achieve the goal, you would need to perform one of the following actions:
Automatic Enrollment via MDM:
Configure Azure AD to automatically enroll domain-joined devices into Intune (using MDM User Scope settings).
Manual Enrollment via Company Portal:
Have a user manually enroll the device using the Company Portal app.
Configuration Manager Task:
Use a Configuration Manager task to trigger the client to enroll in Intune, which is a common method in a co-management setup.
Creating a device configuration profile does none of these things and therefore fails to enable co-management for Device1.
Reference
Microsoft Documentation: "How to enable co-management"
This documentation clearly outlines the prerequisites and steps, which include:
Configuring automatic enrollment for Windows 10 devices in Azure AD.
Ensuring the device is Azure AD joined or Hybrid Azure AD joined.
Installing the Configuration Manager client.
The step of "creating a device configuration profile" is a management action that occurs after a device is successfully enrolled and under co-management.
Key Takeaway:
Co-management requires the device to have a foot in both management systems. The solution only addresses the Configuration Manager side and attempts an Intune management task without first establishing the fundamental Intune relationship through enrollment.
You need to meet the technical requirements and planned changes for Intune. What should you do? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.


Explanation:
This question tests your understanding of which configurations are performed in Azure Active Directory (the identity and access layer) versus the Microsoft Intune admin center (the device management layer).
Settings to configure in Azure AD:
Mobility (MDM and MAM): This is a crucial Azure AD setting that determines which users' devices are eligible for management. Here, you specify the MDM authority (e.g., Intune) and configure scopes to automatically enroll devices when users join them to Azure AD. This links Azure AD users to the Intune service.
Organizational relationships: This Azure AD feature allows you to configure B2B direct connect and federation with other organizations. Since it deals with external user identities and access, it is configured at the identity level in Azure AD, not within the device management settings of Intune.
Settings to configure in Intune:
Device compliance: This is a core Intune function. You define the rules (e.g., requiring encryption, a minimum OS version, or no jailbreak) that a device must meet to be considered compliant. These policies are created and deployed from the Intune admin center.
Device configuration: Also known as "Configuration Profiles," this is a primary Intune workload. You use it to create and deploy profiles that manage settings on devices, such as Wi-Fi, VPN, email, and security settings.
Mobile Device Management Authority: This setting is set in the Intune admin center. It officially designates Intune as your organization's MDM authority. While the user scope for this authority is configured in Azure AD (under Mobility settings), the act of setting the authority itself is done in Intune.
Why the other options are incorrect:
Device settings (Azure AD): These are general Azure AD device settings like requiring Multi-Factor Authentication to join a device or setting a maximum number of devices per user. They are not the primary settings for enabling Intune management.
Device enrollment (Intune):
While Intune manages enrolled devices, the automatic enrollment trigger for Windows and modern Android devices is controlled by the Mobility (MDM and MAM) settings in Azure AD. Intune's "Device enrollment" section is for configuring platform-specific enrollment profiles and methods (e.g., Apple's Automated Device Enrollment, Windows Autopilot profiles), not for turning on the service-wide enrollment link from Azure AD.
User settings (Azure AD): These are general Azure AD user properties and are not directly used to configure Intune.
Reference
Microsoft Docs: Set up Intune enrollment - Explains the relationship between Azure AD MDM user scope and Intune.
Microsoft Docs: What is device management in Microsoft Intune? - Describes the core Intune workloads like device compliance and configuration.
You need to ensure that User1 can enroll the devices to meet the technical requirements. What should you do?
A.
From the Azure Active Directory admin center, assign User1 the Cloud device administrator rote.
B.
From the Azure Active Directory admin center, configure the Maximum number of devices per user setting.
C.
From the Intune admin center, add User1 as a device enrollment manager.
D.
From the Intune admin center, configure the Enrollment restrictions.
From the Intune admin center, add User1 as a device enrollment manager.
Explanation:
To allow User1 to enroll multiple devices beyond the default limit and manage device enrollments on behalf of other users, you must assign them the Device Enrollment Manager (DEM) role in Microsoft Intune.
By default, Azure AD users can enroll up to five devices into Intune. This limit applies to standard users and can be modified at the tenant level; however, it still applies per-user. In scenarios where a specific user (like User1) needs to enroll multiple devices for other users or for bulk deployment, the appropriate method is to designate that user as a Device Enrollment Manager.
The Device Enrollment Manager is a special Intune role that allows a single account to enroll up to 1,000 devices. It is commonly used for shared or corporate-owned device setups — such as classrooms, retail environments, or testing labs — where one person configures and sets up many devices for others.
Therefore, assigning User1 as a Device Enrollment Manager in the Intune admin center satisfies the technical requirement for allowing device enrollment at a larger scale.
Steps to configure:
Sign in to the Microsoft Intune admin center (https://intune.microsoft.com).
Navigate to Devices → Enroll devices → Device enrollment managers.
Select Add and then add User1.
Save changes.
Once added, User1 will have permission to enroll and manage multiple devices on behalf of the organization.
❌ Why Other Options Are Incorrect:
A. From the Azure Active Directory admin center, assign User1 the Cloud Device Administrator role — Incorrect.
The Cloud Device Administrator role in Azure AD (now Microsoft Entra ID) allows users to manage device objects in Azure AD, such as joining, deleting, or enabling/disabling registered devices. However, this role does not grant Intune enrollment privileges or allow a user to enroll multiple devices beyond the standard user limit. It’s a directory-level administrative role, not an Intune device enrollment configuration role.
B. From the Azure Active Directory admin center, configure the Maximum number of devices per user setting — Incorrect.
The Maximum number of devices per user setting in Azure AD defines how many devices a user can register in the directory. Adjusting this setting can increase the number of Azure AD-joined devices per user but does not directly control Intune enrollment capacity. Even if this setting is increased, Intune enrollment restrictions still limit how many devices a user can manage or enroll unless they are assigned as a Device Enrollment Manager.
D. From the Intune admin center, configure the Enrollment restrictions — Incorrect.
Enrollment restrictions in Intune define which types of devices (such as Android, iOS, or Windows) users can enroll and whether personal devices (BYOD) are allowed. While enrollment restrictions control the type of device that can be enrolled, they do not change who can enroll or how many devices a user can enroll. Therefore, this option would not enable User1 to meet the requirement of enrolling multiple devices.
Key Technical Insight:
In Microsoft Intune, the Device Enrollment Manager (DEM) role is designed specifically for large-scale or shared-device deployment scenarios. The DEM:
Can enroll up to 1,000 devices per user.
Allows central management of devices used by multiple users.
Is assigned directly through the Intune admin center, not Azure AD.
It’s an important role for organizations that deploy many corporate-owned devices and need specific users (like IT staff or regional technicians) to set them up.
In contrast, Azure AD roles (such as Cloud Device Administrator or Intune Administrator) control administrative privileges, not enrollment scale. The DEM role bridges that gap by providing the ability to handle device onboarding at scale.
Implementing this configuration ensures that User1 can meet the technical requirement of enrolling multiple devices efficiently while staying within Microsoft’s recommended practices.
References
Microsoft Learn –
Add Device Enrollment Managers in Intune
Microsoft Learn –
Enrollment restrictions in Microsoft Intune
Microsoft Learn –
Azure AD built-in roles and permissions
Final Summary:
To enable User1 to enroll multiple devices and meet the organization’s technical requirements, you must assign them as a Device Enrollment Manager in Microsoft Intune. This role increases enrollment capacity to 1,000 devices per user and is the only configuration that fulfills the stated need.
You need to configure a conditional access policy to meet the compliance requirements.
You add Exchange Online as a cloud app.
Which two additional settings should you configure in Policy1? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.


To create an effective Conditional Access policy that meets compliance requirements for accessing Exchange Online, you must define who the policy applies to and what they must do to gain access.
Users and groups:
A Conditional Access policy is ineffective without an assignment. The current configuration has "0 users and groups selected," meaning it applies to no one. To enforce your compliance requirements, you must assign this policy to the relevant users or groups (e.g., all users, a specific department, or a pilot group).
Grant > Require device to be marked as compliant:
This is the core control that meets the "compliance requirements." The "device marked as compliant" condition means the device must be successfully enrolled in Intune and adhere to all the device compliance policies you have defined in the Intune admin center. By setting the grant control to Require device to be marked as compliant, you ensure that access to Exchange Online is only granted from devices that meet your organization's security standards.
Why other options are not the primary answers:
Device state (preview) - Exclude "Device marked as compliant": This is the opposite of what you want to do. Excluding compliant devices would allow non-compliant devices access, which violates the compliance requirement.
Sign-in risk, Device platforms, Locations, Client apps: These are all conditions that can refine when the policy applies (e.g., only on iOS, only from outside the corporate network, or only for high-risk sign-ins). While useful, they are not the fundamental settings needed to establish the baseline requirement of device compliance.
Block access: While "Block" is a grant control, it is an absolute denial. The goal is to conditionally grant access based on compliance, not to block all access outright. You would use "Grant access" and then check the box for "Require device to be marked as compliant."
Reference:
Microsoft Docs: Common Conditional Access policy: Require compliant devices - This document outlines the exact steps, which involve assigning users and configuring the grant control to require a compliant device.
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Your network contains an Active Directory domain named contoso.com that is synced to Microsoft Azure Active Directory (Azure AD).
You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current Branch).
You configure a pilot for co-management.
You add a new device named Device1 to the domain. You install the Configuration Manager client on Device1.
You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager.
Solution: Define a Configuration Manager device collection as the pilot collection. Add Device1 to the collection.
Does this meet the goal?
A. Yes
B. No
Explanation:
In a co-management scenario, Windows devices are managed simultaneously by Configuration Manager (SCCM) and Microsoft Intune. This hybrid management model allows organizations to transition from traditional on-premises management (SCCM) to modern cloud-based management (Intune) without losing control of existing devices.
To enable co-management, a pilot collection must first be defined in Configuration Manager. This collection identifies which devices are allowed to be managed by both platforms during the pilot phase. Devices within this collection can switch their workloads (e.g., compliance policies, Windows Update, device configuration) from Configuration Manager to Intune.
When you add Device1 to the pilot collection, it automatically becomes part of the co-management configuration. Since the Configuration Manager client is already installed on Device1, the client will initiate communication with Azure AD and register the device in Intune once co-management policies are applied.
This fulfills the requirement to manage Device1 with both Configuration Manager and Intune, achieving the desired goal.
Key Process Overview:
To configure co-management in Configuration Manager:
Azure AD Connect must be configured to synchronize the on-premises Active Directory with Azure AD.
Devices must be Azure AD-joined or Hybrid Azure AD-joined.
The Configuration Manager client must be installed on the target devices.
In Configuration Manager:
Navigate to Administration → Cloud Services → Co-management.
Specify the pilot collection for co-managed devices.
Configure which workloads (e.g., compliance, device configuration, Windows updates) will be managed by Intune.
Add devices (like Device1) to this pilot collection.
Once Device1 is added, it is automatically enrolled in Intune (if auto-enrollment is configured in Azure AD and Intune). The device then becomes co-managed, satisfying the goal.
Thus, the solution does meet the goal because defining a pilot collection and adding Device1 to it allows the device to be managed by both systems.
❌ Why Other Approaches (if implied) Would Not Meet the Goal:
Only installing the Configuration Manager client without adding the device to the pilot collection:
This does not enable co-management. The device remains managed only by Configuration Manager, not Intune.
Only enabling Intune auto-enrollment in Azure AD without configuring the pilot collection:
Devices will enroll in Intune but will not be co-managed since SCCM and Intune must coordinate via the pilot collection to share management control.
Manually enrolling Device1 in Intune:
This creates duplicate device objects in Intune and Configuration Manager, which is unsupported in a co-managed setup.
Why This Solution Works:
Adding the device to the pilot collection directly ties it to the co-management configuration. Configuration Manager will automatically configure the Intune enrollment component and communicate with Azure AD to establish co-management.
This ensures:
Configuration Manager continues to handle traditional workloads (e.g., inventory, application deployment).
Intune can take over specific workloads (e.g., compliance, Windows updates, endpoint protection).
The IT team can test and transition workloads gradually in a controlled pilot before extending to all users.
Thus, the proposed solution — defining a pilot collection and adding Device1 — perfectly satisfies the goal.
References:
Microsoft Learn –
Co-management for Windows devices
Microsoft Learn –
Enable co-management for existing Configuration Manager clients
Microsoft Learn –
Workloads in co-management
Step-by-Step Confirmation:
You have a hybrid identity environment (Active Directory synced with Azure AD).
The Configuration Manager client is installed on Device1.
You configured co-management and defined a pilot collection.
You added Device1 to that pilot collection.
Co-management policies apply, and Device1 becomes co-managed.
Therefore, Device1 can now be managed by both Intune and Configuration Manager, fulfilling the technical requirement.
Final Summary:
Defining a pilot collection in Configuration Manager and adding Device1 to it enables co-management between SCCM and Intune. This configuration automatically enrolls the device into Intune (if hybrid Azure AD-joined) and allows simultaneous management under both systems.
✅ Correct Answer: A. Yes
On which server should you install the Azure ATP sensor?
A.
Server 1
B.
Server 2
C.
Server 3
D.
Server 4
E.
Server 5
Server 1
Explanation:
Microsoft Defender for Identity (formerly Azure Advanced Threat Protection) is a cloud-based security solution designed to detect, investigate, and respond to suspicious user activities and advanced threats in Active Directory environments. The core component — the Defender for Identity sensor — monitors domain controller network traffic and event logs to detect identity-based attacks such as Pass-the-Ticket, Pass-the-Hash, and reconnaissance attempts.
Where to install the sensor
The sensor must be installed on each Active Directory Domain Controller (DC). This is because domain controllers process all authentication requests and generate security events that Defender for Identity needs to analyze. Installing the sensor on DCs allows it to:
Capture authentication and replication traffic directly from the source.
Collect security events (Event IDs 4624, 4768, 4769, etc.) for analysis.
Detect identity compromise indicators in real time.
The installation can also be performed on a dedicated standalone server (if your organization uses port mirroring). In that model, the DCs’ network traffic is mirrored to the standalone server where the sensor runs. However, Microsoft recommends installing the sensor directly on each domain controller for simplicity and performance.
Pre-requisites for installation:
Windows Server 2012 R2 or later.
.NET Framework 4.7 or later.
Outbound internet connectivity to the Microsoft Defender for Identity cloud service.
Access to event logs and directory services on the DC.
Why not install it on other servers?
Member servers, file servers, or application servers do not handle user authentication directly, so they don’t provide the security visibility Defender for Identity needs. Installing a sensor there would produce no useful telemetry.
Exchange, SQL, or SharePoint servers rely on domain controllers for authentication. Defender for Identity doesn’t analyze their internal processes.
The Azure ATP sensor must observe authentication events from Active Directory, so only DCs or mirrored network traffic from DCs are relevant.
Thus, in any exam scenario, you install the sensor on the domain controller (e.g., Server1).
Why Other Options Are Incorrect:
B. Server2 –
If Server2 is a member or application server, it lacks authentication logs necessary for ATP analysis.
C. Server3
– If Server3 is an Exchange or SQL server, it does not process domain authentication traffic.
D. Server4 –
Unless explicitly configured for port mirroring, this server does not meet Defender for Identity’s data requirements.
E. Server5 –
If this is a file or print server, it will not contribute to detecting identity-based attacks.
Only Domain Controllers provide the correct event data and authentication flow visibility needed by Azure ATP.
References:
Microsoft Learn –
Install the Defender for Identity sensor
Microsoft Learn –
Microsoft Defender for Identity architecture
Final Summary:
To meet the goal of monitoring Active Directory authentication traffic and detecting identity attacks, you must install the Azure ATP (Microsoft Defender for Identity) sensor on each domain controller. The sensor analyzes authentication logs, event data, and network packets in real time to detect abnormal activities.
You need to meet the compliance requirements for the Windows 10 devices. What should you create from the Intune admin center?
A. a device compliance policy
B. a device configuration profile
C. an application policy
D. an app configuration policy
Explanation:
To meet compliance requirements for Windows 10 devices in Microsoft Intune, you must create a device compliance policy.
Device Compliance Policy:This type of policy defines the rules and settings that a device must meet to be considered "compliant" by your organization's standards. Examples of these rules include:
Requiring a minimum or maximum operating system version.
Requiring encryption (like BitLocker) to be enabled.
Requiring a password of a specific length and complexity.
Ensuring the device is not jailbroken or rooted.
Requiring Windows Defender Antivirus to be enabled and up-to-date.
These policies are the direct tool for enforcing the security baselines that satisfy compliance requirements. A device that fails to meet these rules is marked as non-compliant, which can then be used by Conditional Access policies to block access to company resources like email or cloud apps.
Why the other options are incorrect:
B. a device configuration profile:
This is used to manage settings on a device, such as deploying a VPN profile, configuring a Wi-Fi network, or setting browser preferences. It configures how a device operates but does not define the state of compliance or mark a device as non-compliant if a setting doesn't match.
C. an application policy:
This term is vague, but in the Intune context, it typically refers to app protection policies (which manage data within apps) or app deployment policies. These are related to application management and data loss prevention, not to defining the compliance state of the entire device's operating system and security settings.
D. an app configuration policy:
This is used to automatically configure specific settings within an application when it is installed (e.g., pre-populating a username or configuring a connection URL in a line-of-business app). It has no bearing on the security compliance of the Windows 10 device itself.
Reference:
Microsoft Docs: Use compliance policies to set rules for devices you manage with Intune
This documentation states:
"Compliance policies in Intune define the rules and settings that users and devices must meet to be compliant... When combined with Conditional Access, administrators can block users and devices that are non-compliant from accessing organization resources."
Key Takeaway:
When the requirement is to enforce security rules that a device must follow (compliance), you create a compliance policy. When the requirement is to push specific settings to a device (configuration), you create a configuration profile.
You need to meet the Intune requirements for the Windows 10 devices.
What should you do? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.


This question tests your understanding of the division of responsibilities between Azure Active Directory (the identity and access service) and Microsoft Intune (the device management service) when setting up a modern management environment.
Settings to configure in Azure AD:
Mobility (MDM and MAM):
This is the most critical setting in Azure AD for enabling Intune management. Here, you configure the MDM user scope, which specifies which users' Windows 10 devices will be automatically enrolled into Intune when they join or register with Azure AD. This creates the essential link that allows Azure AD to redirect devices to Intune for management.
Settings to configure in Intune:
Mobile Device Management Authority: This is the foundational setting that must be configured first in the Intune admin center. It officially designates Intune as your organization's mobile device management authority.
Device compliance: This is a core Intune workload. You create compliance policies here to define the security rules (e.g., requiring encryption, a minimum OS version, or a firewall) that a device must meet to be considered compliant.
Device configuration:This is another core Intune workload, also known as "Configuration Profiles." You use this to create and deploy profiles that manage settings on the Windows 10 devices, such as deploying certificates, configuring Edge browser settings, or enabling kiosk mode.
Why the other options are incorrect:
Device settings (Azure AD):
These are general Azure AD device join and registration settings (like the number of devices a user can join). While related, they are not the primary driver for initiating Intune enrollment; the Mobility (MDM and MAM) setting is.
Organizational relationships (Azure AD):
This is for configuring B2B collaboration and is unrelated to managing Windows 10 devices with Intune.
User settings (Azure AD):
These are general user account settings and are not used to configure Intune. Device enrollment (Intune):
While this section exists in Intune for configuring platform-specific details (like Apple Automated Device Enrollment tokens or Windows Autopilot profiles), the fundamental trigger for Windows 10 enrollment is controlled by the Mobility (MDM and MAM) setting in Azure AD.
Reference:
Microsoft Docs: Set up enrollment for Windows devices - Explains the role of Azure AD MDM user scope.
| Page 1 out of 31 Pages |