Back

M-MD102: Managing Endpoints

-
+

NOK 27.000


This study guide should help you understand what to expect on the exam and includes a summary of the topics the exam might cover and links to additional resources. The information and materials in this document should help you focus your studies as you prepare for the exam.

TARGET AUDIENCE:
Candidates for this exam have subject matter expertise deploying, configuring, protecting, managing, and monitoring devices and client applications in a Microsoft 365 environment. They manage identity, security, access, policies, updates, and apps for endpoints. They implement solutions for efficient deployment and management of endpoints on various operating systems, platforms, and device types. They implement and manage endpoints at scale by using Microsoft Intune, Windows 365, Windows Autopilot, Microsoft Defender for Endpoint, and Azure Active Directory (Azure AD), part of Microsoft Entra.
Endpoint administrators collaborate with architects, Microsoft 365 administrators, security administrators, and other workload administrators to plan and implement a modern workplace strategy that meets the business needs of an organization.
Candidates for this exam have experience with Azure AD and Microsoft 365 technologies including Intune. They must have strong skills and experience in deploying, configuring, and maintaining Windows client and non-Windows devices.
The candidates for the course are Microsoft 365 Endpoint Administrator who are responsible for deploying, configuring, securing, managing, and monitoring devices and client applications in a corporate setting. Their duties include managing identity, access, policies, updates, and apps. They work alongside the M365 Enterprise Administrator to develop and execute a device strategy that aligns with the requirements of a modern organization. Microsoft 365 Endpoint Administrators should be well-versed in M365 workloads and possess extensive skills and experience in deploying, configuring, and maintaining Windows 11 and later, as well as non-Windows devices. Their role emphasizes cloud services over on-premises management technologies.

COURSE PREREQUISITES:
The Modern Desktop Administrator must be familiar with M365 workloads and must have strong skills and experience of deploying, configuring, and maintaining Windows 11 and later, and non-Windows devices.

COURSE CONTENT:
Explore the Enterprise Desktop
This module covers modern endpoint management and enterprise desktop lifecycle concepts. It teaches the stages of the lifecycle (planning, deployment, maintenance) and provides a foundation for future learning.

• Describe the benefits of Modern Management.
• Explain the enterprise desktop life-cycle model.
• Describe considerations for planning hardware strategies.
• Describe considerations for post-deployment and retirement.
Explore Windows Edition
This module covers Windows OS editions, features, and installation methods. Learners gain a deeper understanding of the available editions and corresponding installation processes.

• Explain the differences between the different editions of Windows.
• Select the most suitable Windows device for your needs.
• Describe the minimum recommended hardware requirements for installing Windows 11.
Manage Azure Active Directory Identities
This module teaches how to use Azure AD effectively. You'll learn about RBAC, user roles, creating and managing users and groups, using Powershell cmdlets, and synchronizing objects from AD DS to Azure AD.

• Describe RBAC and user roles in Azure AD.
• Create and manage users in Azure AD.
• Create and manage groups in Azure AD.
• Use Windows PowerShell cmdlets to manage Azure AD.
• Describe how you can synchronize objects from AD DS to Azure AD.
Manage Device Authentication
In this module, you learn about device authentication and management in Azure Active Directory.

• Describe Azure AD join.
• Describe Azure AD join prerequisites, limitations and benefits.
• Join device to Azure AD.
• Manage devices joined to Azure AD.
Enroll Devices using Microsoft Configuration Manager
This module introduces students to client deployment options and some of the high-level management and monitoring options that are available using Configuration Manager.

• Describe Microsoft Endpoint Manager.
• Understand the advantages of managing a client with Configuration Manager.
• Deploy the Configuration Manager client.
• Monitor the Configuration Manager client.
• Manage Configuration Manager devices.
Enroll devices using Microsoft Intune
Students will learn how to configure and setup Intune to more easily manage Windows, Android, and iOS devices.

• Prepare Microsoft Intune for device enrollment.
• Configure Microsoft Intune for automatic enrollment.
• Explain how to enroll Windows, Android and iOS devices in Intune.
• Explain when and how to use Intune Enrollment Manager.
• Understand how to monitor and perform remote actions on enrolled devices.
Execute device profiles
Students learn about the various types of device profiles, and how to create and manage them.

• Describe the various types of device profiles in Intune.
• Explain the difference between built-in and custom profiles.
• Create and manage profiles.
Oversee device profiles
This module introduces students to monitoring profiles to ensure correct assignments and resolving conflicts when multiple profiles are applied.

• Monitor the assignments of profiles.
• Understand how profiles are synchronized and how to manually force synchronization.
• Use PowerShell to execute and monitor scripts on devices.
Maintain user profiles
Students learn about the benefits of various Windows user profiles, how to manage them, and how to facilitate profile data synchronization across multiple devices.

• Explain the various user profile types that exist in Windows.
• Describe how a user profile works.
• Configure user profiles to conserve space.
• Explain how to deploy and configure Folder Redirection.
• Explain Enterprise State Roaming.
• Configure Enterprise State Roaming for Azure AD devices.
Execute mobile application management
This module introduces Mobile Application Management (MAM). Students will learn about considerations for implementing MAM and will be introduced to the management of MAM using Intune and Configuration Manager.

• Explain Mobile Application Management
• Understand application considerations in MAM
• Explain how to use Configuration Manager for MAM
• Use Intune for MAM
• Implement and manage MAM policies
Deploy and update applications
In this module, you'll master deploying applications using Intune, Configuration Manager, Group Policy, and Microsoft Store Apps. These powerful tools and techniques will equip you to manage and maintain diverse applications across your organization effectively.

• Explain how to deploy applications using Intune and Configuration Manager
• Learn how to deploy applications using Group Policy
• Understand Microsoft Store Apps
• Learn how to deploy apps using Microsoft Store Apps
• Learn how to configure Microsoft Store Apps
Administer endpoint applications
In this module, you're introduced to managing apps on Intune managed devices. The module will then conclude with an overview of how to use IE Mode with Microsoft Edge.

• Explain how to manage apps in Intune
• Understand how to manage apps on non-enrolled devices
• Understand how to deploy Microsoft 365 Apps using Intune
• Learn how to configure and manage IE mode in Microsoft Edge
• Learn about app inventory options in Intune
Protect identities in Azure Active Directory
This module introduces students to the various authentication methods used to protect identities.

• Describe Windows Hello for Business
• Describe Windows Hello deployment and management
• Describe Azure AD Identity Protection
• Describe and manage self-service password reset in Azure AD
• Describe and manage multi-factor authentication
Enable organizational access
This module describes how clients can be configured to access organizational resources using a virtual private network (VPN).

• Describe how you can access corporate resources
• Describe VPN types and configuration
• Describe Always On VPN
• Describe how to configure Always On VPN
Implement device compliance
This module describes how to use compliance and conditional access policies to help protect access to organizational resources.

• Describe device compliance policy
• Deploy a device compliance policy
• Describe conditional access
• Create conditional access policies
Generate inventory and compliance reports
This module describes how to use Microsoft Endpoint Manager and Power BI to create compliance and custom reports.

• Generate inventory reports and Compliance reports using Microsoft Intune
• Report and monitor device compliance
• Create custom reports using the Intune Data Warehouse
• Use the Microsoft Graph API for building custom reports
Deploy device data protection
This module describes how you can use Intune to create and manage WIP policies that manage this protection. The module also covers implementing BitLocker and Encrypting File System.

• Describe Windows Information Protection
• Plan for Windows Information Protection usage
• Implement and use Windows Information Protection
• Describe the Encrypting File System (EFS)
• Describe BitLocker
Manage Microsoft Defender for Endpoint
This module explores using Microsoft Defender for Endpoint to provide additional protection and monitor devices against threats.

• Describe Microsoft Defender for Endpoint
• Describe key capabilities of Microsoft Defender for Endpoint
• Describe Microsoft Defender Application Guard
• Describe Microsoft Defender Exploit Guard
• Describe Windows Defender System Guard
Manage Microsoft Defender in Windows client
This module explains the built-in security features of Windows clients and how to implement them using policies.

• Describe Windows Security capabilities
• Describe Windows Defender Credential Guard
• Manage Microsoft Defender Antivirus

• Manage Windows Defender Firewall
• Manage Windows Defender Firewall with Advanced Security
Manage Microsoft Defender for Cloud Apps
This module covers Microsoft Defender for Clouds Apps, focusing on securing sensitive data, its relevance in dynamic work settings, and effective utilization for improved security posture.

• Describe Microsoft Defender for Cloud Apps
• Plan for Microsoft Defender for Cloud Apps usage
• Implement and use Microsoft Defender for Cloud Apps
Assess deployment readiness
Discusses some of the tools that you can use to perform detailed assessment of existing deployments, and describes some of the challenges that you may face.

• Describe the guidelines for an effective enterprise desktop deployment.
• Explain how to assess the current environment.
• Describe the tools that you can use to assess your current environment.
• Describe the methods of identifying and mitigating application compatibility issues.
• Explain considerations for planning a phased rollout.
Deploy using the Microsoft Deployment Toolkit
Discusses the shifts from traditional to modern management and where on-premises solutions best fit in today's. enterprise.

• Describe the fundamentals of using images in traditional deployment methods.
• Describe the key benefits, limitations, and decisions when planning a deployment of – Windows using Microsoft Deployment Toolkit (MDT).
• Describe how Configuration Manager builds upon MDT and how both can work in harmony.
• Explain the different options and considerations when choosing the user interaction experience during deployment, and which methods and tools support these experiences.
Deploy using Microsoft Configuration Manager
This module explains the common day to day tasks that Administrators would use Configuration Manager to perform.

• Describe the capabilities of Configuration Manager.
• Describe the key components of Configuration Manager.
• Describe how to troubleshoot Configuration Manager deployments.
Deploy Devices using Windows Autopilot
Use Autopilot to deploy new hardware or refreshing an existing hardware with the organization's desired configuration, without using the traditional imaging process.

• Explain the benefits of modern deployment for new devices.
• Describe the process of preparing for an Autopilot deployment.
• Describe the process of registering devices in Autopilot.
• Describe the different methods and scenarios of Autopilot deployments.
• Describe how to troubleshoot common Autopilot issues.
• Describe the process of deployment using traditional methods.
Implement dynamic deployment methods
Use dynamic provisioning methods such as Subscription Activation, Provisioning packages, and Azure AD join to reconfigure an existing operating system.

• Describe how Subscription Activation works.
• Describe the benefits of Provisioning Packages.
• Explain how Windows Configuration Designer creates Provisioning Packages.
• Describe the benefits of using MDM enrollment with Azure AD join.
Plan a transition to modern endpoint management
Explore considerations and review the planning of transitioning to modern management, focusing on migration and newly provisioned devices.

• Identify usage scenarios for Azure AD join.
• Identify workloads that you can transition to Intune.
• Identify prerequisites for co-management.
• Identify considerations for transitioning to modern management.
• Plan a transition to modern management using existing technologies.
• Plan a transition to modern management using Microsoft Intune.
Manage Windows 365
This module teaches managing Microsoft's cloud-based PC management solution, Windows 365, offering personalized, secure Windows 11 experience from any device. Learn features, setup, management, security, deployment options, and licensing to optimize your environment.

• Describe the key features of Windows 365
• Describe the Windows 365 management experience
• Describe the Windows 365 security model
• Describe the Windows 365 deployment options
• Describe the Windows 365 licensing model
Manage Azure Virtual Desktop
Learn to manage Azure Virtual Desktop, a cloud-based VDI solution providing personalized, secure Windows 11 experiences. Understand key features, management, security, and deployment options for optimizing your environment.

• Describe the key features of Azure Virtual Desktop
• Describe the Azure Virtual Desktop management experience
• Describe the Azure Virtual Desktop security model

• Describe the Azure Virtual Desktop deployment options

COURSE OBJECTIVE:
In this course, students will learn to plan and execute an endpoint deployment strategy using contemporary deployment techniques and implementing update strategies. The course introduces essential elements of modern management, co-management approaches, and Microsoft Intune integration. It covers app deployment, management of browser-based applications, and key security concepts such as authentication, identities, access, and compliance policies. Technologies like Azure Active Directory, Azure Information Protection, and Microsoft Defender for Endpoint are explored to protect devices and data.

FOLLOW ON COURSES:
Not available. Please contact.