Which three actions should you perform in sequence?
DRAG DROP You need to meet the technical requirements for the LEG department computers. Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. View AnswerAnswer: Explanation: Reference: https://docs.microsoft.com/en-us/windows/deployment/update/windows-analytics-azure-portal
You have a Microsoft 365 E5 subscription that uses Microsoft Intune
HOTSPOT You have a Microsoft 365 E5 subscription that uses Microsoft Intune. You have the Windows 11 devices shown in the following table. You deploy the device compliance policy shown in the exhibit. (Click the Exhibit tab.) For each of the following statements, select Yes if the statement is true....
Which condition should you add to CAPolicy1?
You have a Microsoft 365 E5 subscription that contains a user named User! and a web app named Appl. App1 must only accept modern authentication requests. You plan to create a Conditional Access policy named CAPolicy1 that will have the following settings: • Assignments ° Users or workload identities: User1...
What should you include in the recommendation?
HOTSPOT You need to recommend a solution to meet the device management requirements. What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Reference: https://github.com/MicrosoftDocs/IntuneDocs/blob/master/intune/app-protection-policy.md https://docs.microsoft.com/en-us/azure/information-protection/configure-usage-rights#do-not-forward-option-for-emails
What should you do?
You have a Microsoft 365 E5 subscription that contains 500 macOS devices enrolled in Microsoft Intune. You need to ensure that you can apply Microsoft Defender for Endpoint antivirus policies to the macOS devices. The solution must minimize administrative effort. What should you do?A . From the Microsoft Endpoint Manager...
Which devices have a network boundary of 192.168.1.0/24 applied?
You implement Boundary1 based on the planned changes. Which devices have a network boundary of 192.168.1.0/24 applied?A . Device2 onlyB . Device3 onlyC . Device 1. Device2. and Device5 onlyD . Device 1, Device2, Device3, and Device4 onlyView AnswerAnswer: D Explanation: Reference: https://docs.microsoft.com/en-us/mem/intune/configuration/network-boundary-windows
You have an Azure AD tenant named contoso.com that contains the users shown in the following table
HOTSPOT You have an Azure AD tenant named contoso.com that contains the users shown in the following table. You have a computer named Computer1 that runs Windows 10. Computer1 is in a workgroup and has the local users shown in the following table. UserA joins Computer1 to Azure AD by...
Which devices can be upgraded by using each method?
HOTSPOT You have a Microsoft 365 subscription that uses Microsoft Intune Suite. You use Microsoft Intune to manage devices. Azure AD joined Windows devices enroll automatically in Intune. You have the devices shown in the following table. You are preparing to upgrade the devices to Windows 11. All the devices...
Which setting of the compliance policy should you configure for each requirement?
DRAG DROP You have a Microsoft 365 subscription. The subscription contains computers that run Windows 11 and are enrolled in Microsoft Intune. You need to create a compliance policy that meets the following requirements: • Requires BitLocker Drive Encryption (BitLocker) on each device • Requires a minimum operating system version...
What is the best recommendation to achieve the goal?
Your company standardizes on Windows 10 Enterprise for all users. Some users purchase their own computer from a retail store. The computers run Windows 10 Pro. You need to recommend a solution to upgrade the computers to Windows 10 Enterprise, join the computers to Azure AD, and install several Microsoft...