100% Real Microsoft MCP 70-398 Exam Questions & Answers, Accurate & Verified By IT Experts
Instant Download, Free Fast Updates, 99.6% Pass Rate
36 Questions & Answers
Last Update: Aug 30, 2025
€69.99
Microsoft MCP 70-398 Practice Test Questions in VCE Format
File | Votes | Size | Date |
---|---|---|---|
File Microsoft.braindumpsdeals.70-398.v2016-12-23.by.Jane.60q.vce |
Votes 16 |
Size 1.79 MB |
Date Dec 23, 2016 |
Microsoft MCP 70-398 Practice Test Questions, Exam Dumps
Microsoft 70-398 (Planning for and Managing Devices in the Enterprise) exam dumps vce, practice test questions, study guide & video training course to study and pass quickly and easily. Microsoft 70-398 Planning for and Managing Devices in the Enterprise exam dumps & practice test questions and answers. You need avanset vce exam simulator in order to study the Microsoft MCP 70-398 certification exam dumps & Microsoft MCP 70-398 practice test questions in vce format.
The 70-398 Exam, with its official title "Planning for and Managing Devices in the Enterprise," was a key component of the Microsoft Certified Solutions Associate (MCSA) and Microsoft Certified Solutions Expert (MCSE) certification tracks. This exam is now retired, but its subject matter remains incredibly relevant. It focused on the critical skills required to manage the diverse and growing number of devices used in modern organizations. The curriculum was designed to validate a professional's ability to plan, deploy, and manage devices and their applications using a suite of powerful Microsoft tools.
This exam specifically targeted the challenges of enterprise mobility and the "bring your own device" (BYOD) phenomenon. It tested a candidate's expertise in using solutions like Microsoft Intune and System Center Configuration Manager (SCCM) to enforce security, deploy applications, and manage both corporate-owned and personal devices. The knowledge base for the 70-398 Exam was centered on creating a unified device management strategy that could balance user productivity with corporate security and compliance requirements.
Although the 70-398 Exam is no longer offered, the skills it covered have not disappeared. Instead, they have evolved and are now integral to the modern Microsoft 365 ecosystem, particularly within what is now called Microsoft Endpoint Manager. This series will act as a detailed guide to the enduring concepts and principles that underpinned this exam. By exploring its objectives, we can build a comprehensive understanding of enterprise device management that is just as valuable today as it was when the exam was active.
Think of this series as a structured exploration of modern endpoint management, viewed through the focused lens of the 70-398 Exam. It provides a roadmap for learning how to manage devices in the enterprise, from initial planning and policy creation to application management and data protection. This knowledge is essential for any IT professional tasked with securing and managing the modern digital workspace.
The subject matter of the 70-398 Exam is more important today than ever before due to the fundamental shift in how and where people work. In the past, most employees worked on corporate-owned desktop computers within the secure perimeter of the office network. Today, the workforce is mobile. Employees use a mix of laptops, tablets, and smartphones, many of which are personally owned. They access corporate data from home, from coffee shops, and from all over the world. This new reality presents a significant challenge for IT departments.
Modern device management is the solution to this challenge. It is the practice of using centralized tools and policies to secure, monitor, and manage any endpoint device that accesses corporate resources, regardless of its type, ownership, or location. Without a robust device management strategy, an organization is exposed to significant risks. Unmanaged devices can be a gateway for malware, can lead to data leakage if lost or stolen, and can create compliance issues.
The goal of modern device management, as covered in the 70-398 Exam curriculum, is to enable productivity while maintaining security. It allows an organization to provide employees with access to the apps and data they need on the devices they prefer to use, while still enforcing critical security policies. This includes tasks like ensuring devices are encrypted, enforcing a PIN or password, and having the ability to remotely wipe corporate data from a device if it is compromised.
This practice is no longer a luxury; it is a necessity for any organization that wants to operate securely and efficiently in the modern digital landscape. It is the foundation of a zero-trust security model, where access to resources is granted based on the verified health and compliance of the device. The skills associated with the 70-398 Exam are precisely the skills needed to build and operate this critical IT function.
The knowledge and skills covered by the 70-398 Exam were, and still are, intended for a specific group of IT professionals who are responsible for the management and security of endpoints in an enterprise. The primary audience is the Enterprise Desktop Administrator or, in more modern terms, the Endpoint Administrator or Mobility Engineer. These are the hands-on professionals tasked with the day-to-day implementation and operation of the device management solution.
This includes individuals who are responsible for planning a device management strategy. They need to assess the organization's needs, evaluate the different management options (e.g., full device management vs. application-level management), and design a solution that meets both user and security requirements. These professionals often hold titles like IT Manager, Infrastructure Architect, or Mobility Architect. The 70-398 Exam content is directly relevant to their strategic planning responsibilities.
Another key group is the IT security team. Security administrators and analysts need to have a deep understanding of the device management platform because it is one of the primary tools for enforcing the organization's security posture. They are responsible for defining the device compliance policies, configuring conditional access rules, and responding to security incidents involving mobile devices. The security aspects of the 70-398 Exam curriculum are of particular interest to this audience.
In short, any IT professional whose role involves deploying, managing, or securing Windows, iOS, or Android devices in a corporate environment would have been the ideal candidate for the 70-398 Exam. Today, these same professionals are the ones who need to master the concepts of Microsoft Endpoint Manager. The job titles may have evolved, but the fundamental need for these specialized skills remains a constant in the IT industry.
The 70-398 Exam was centered on a suite of powerful Microsoft technologies designed to work together to provide a comprehensive enterprise mobility and management solution. A foundational understanding of these core technologies is the first step in mastering the concepts of the exam. The central piece of this puzzle was, and remains, Microsoft Intune.
Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM). It is the tool that allows an organization to manage devices and their applications from a centralized, web-based console, without the need for on-premises infrastructure. Intune is the heart of Microsoft's cloud-based device management strategy and was a major focus of the 70-398 Exam. It provides the capabilities to enroll devices, push policies and profiles, deploy apps, and secure corporate data.
For organizations with a significant existing investment in on-premises management, System Center Configuration Manager (SCCM) was the other key technology. SCCM has long been the industry standard for managing Windows PCs in a corporate network. The 70-398 Exam covered how to integrate SCCM with Intune in a hybrid configuration, and how to use the "co-management" feature to manage devices with both tools simultaneously, allowing for a gradual transition of management workloads to the cloud.
Underpinning all of this is Azure Active Directory (Azure AD). Azure AD is Microsoft's cloud-based identity and access management service. It is the foundation for user and device identity in the cloud. Intune relies on Azure AD for user and group management, and for features like conditional access, which uses device compliance information from Intune to make intelligent access control decisions. The combination of these technologies, often licensed as part of the Enterprise Mobility + Security (EMS) suite, formed the core technical knowledge for the 70-398 Exam.
The objectives of the 70-398 Exam were organized into several key skill areas, providing a clear structure for what a candidate needed to know. These skill areas represent the complete lifecycle of device management, from initial design and planning to ongoing management and maintenance. Understanding this structure is helpful for organizing a logical approach to learning these concepts.
The first major skill area was planning for device management. This was a strategic section that focused on the "why" and "how" of implementing a management solution. It covered topics such as assessing an organization's existing infrastructure, designing a device management strategy, and planning for the integration of different services like Intune and Azure AD. This part of the 70-398 Exam tested a candidate's ability to think like an architect and make sound design decisions.
The second key skill area was focused on managing device enrollment and inventory. This is the practical process of getting devices under management. It covered the different enrollment methods for various platforms (Windows, iOS, Android), including options for both corporate-owned and personally owned devices. It also included the skills needed to manage the device inventory, such as creating device groups and monitoring device properties.
The third and largest skill area was centered on managing devices, applications, and data. This was the core of the day-to-day administrative tasks. It included creating and deploying device compliance and configuration policies, managing the lifecycle of applications (deploying, updating, and removing them), and implementing data protection policies to prevent the leakage of corporate information. These three pillars—planning, enrollment, and ongoing management—formed the comprehensive body of knowledge for the 70-398 Exam.
A central theme of the 70-398 Exam, and of modern device management in general, is the shift from traditional, on-premises management to modern, cloud-based management. This shift is embodied by two key acronyms: MDM and MAM. A clear understanding of the difference between these two approaches is a fundamental concept for anyone studying this subject matter.
Mobile Device Management (MDM) is the more comprehensive approach. When a device is enrolled in MDM, the organization has full management control over the entire device. This is typically used for corporate-owned devices. With MDM, an administrator can enforce a wide range of policies, such as setting password requirements, configuring Wi-Fi and VPN profiles, restricting the use of the camera, and even performing a full factory reset of the device if it is lost or stolen. This provides a high level of security and control.
Mobile Application Management (MAM), on the other hand, is a more targeted and less intrusive approach. MAM focuses on managing and securing the corporate applications and data on a device, without managing the device itself. This is the ideal solution for personal "bring your own" devices (BYOD). With MAM, an organization can apply security policies, such as requiring a PIN to open a corporate app or preventing the user from copying and pasting data from a corporate app to a personal app.
This allows the company to protect its data without needing to control the employee's entire personal device. The 70-398 Exam required candidates to understand the use cases for both MDM and MAM and to know how to implement them using Microsoft Intune. This ability to choose the right level of management for the right situation is a key skill for a modern endpoint administrator.
To fully contextualize the knowledge from the 70-398 Exam, it is essential to understand how Microsoft's device management offerings have evolved. The technologies covered in the exam, primarily Microsoft Intune and System Center Configuration Manager (SCCM), have not been replaced. Instead, they have been brought together and rebranded under a single, unified platform called Microsoft Endpoint Manager.
Microsoft Endpoint Manager is not a new product. It is the convergence of the cloud-based power of Intune and the rich, on-premises capabilities of SCCM. This unification provides a single administrative console, the Microsoft Endpoint Manager admin center, for managing all endpoints in an organization, whether they are traditional Windows PCs managed by SCCM, mobile devices managed by Intune, or co-managed devices that are managed by both.
This evolution makes the concepts of the 70-398 Exam even more relevant. The exam's focus on integrating SCCM and Intune through hybrid configurations and co-management was a direct precursor to the creation of Microsoft Endpoint Manager. The skills of managing devices with Intune and leveraging SCCM for on-premises tasks are now simply two sides of the same coin within this unified platform.
Therefore, when you study the objectives of the 70-398 Exam, you are, in effect, studying the foundational components of Microsoft Endpoint Manager. The names and the interface may have changed slightly, but the underlying technologies and principles are the same. Understanding this evolutionary path helps to connect the historical context of the exam to the current state of Microsoft's device management solutions.
Studying the concepts that were part of the 70-398 Exam curriculum is a highly valuable exercise for any IT professional today because the problems it was designed to solve are now more widespread and critical than ever before. The proliferation of mobile devices, the rise of remote work, and the increasing sophistication of cyber threats have made effective endpoint management a non-negotiable requirement for all organizations.
The skills validated by the 70-398 Exam are the very skills that are in high demand in the modern job market. Companies are actively seeking professionals who can design and implement a zero-trust security architecture, and a key pillar of that architecture is ensuring that all devices accessing corporate data are known, managed, and compliant. The ability to configure and manage a platform like Microsoft Endpoint Manager (which grew from the tools in the exam) is a highly sought-after and marketable skill.
Furthermore, a deep understanding of these concepts allows an IT professional to be a strategic partner to the business. By implementing a modern device management solution, you can enable new and more flexible ways of working, improving employee productivity and satisfaction. You can also help the organization to meet its compliance and regulatory obligations by demonstrating that you have strong controls in place to protect sensitive data on all endpoints.
In conclusion, while the 70-398 Exam itself may be retired, the body of knowledge it represents is indispensable. It is the foundation of modern endpoint management. By mastering these concepts, you are not just learning about a set of products; you are learning the principles and practices of securing the modern digital workspace. This is a skill set that will remain valuable and relevant for many years to come in the ever-evolving world of information technology.
Microsoft Intune was the centerpiece of the 70-398 Exam, and it remains the core of Microsoft's cloud-based endpoint management strategy today. Intune is a comprehensive cloud service that provides organizations with the tools for both Mobile Device Management (MDM) and Mobile Application Management (MAM). It allows administrators to manage a wide array of devices, including those running Windows, macOS, iOS, and Android, all from a single, unified web console. A deep, functional understanding of Intune's capabilities is the first and most critical step in mastering the concepts of the exam.
Intune's architecture is entirely cloud-based, which means there is no need to install or maintain any on-premises servers or infrastructure to use it. This significantly simplifies deployment and reduces the administrative overhead compared to traditional management solutions. Administrators access the service through a web browser, allowing them to manage their organization's devices from anywhere in the world. This cloud-native approach is perfectly suited for managing a modern, mobile workforce.
The capabilities of Intune are vast. At a high level, it allows an organization to control how its devices and applications are used. For devices, this includes configuring settings, enforcing security policies, and ensuring that devices are compliant with corporate standards before they are allowed to access company resources. For applications, Intune can be used to deploy, update, and remove apps, as well as to apply data protection policies to prevent the leakage of sensitive corporate information.
To prepare for questions related to the 70-398 Exam, a candidate needed to have practical, hands-on experience with the Intune console. This involves understanding how to navigate the interface, create different types of policies, and deploy them to groups of users or devices. The exam was not just about knowing the features but about knowing how to apply them to solve real-world business and security problems.
A critical architectural concept that was central to the 70-398 Exam is the tight integration between Microsoft Intune and Azure Active Directory (Azure AD). These two services are designed to work together seamlessly, and it is impossible to effectively use Intune without a solid understanding of Azure AD. Azure AD serves as the identity and access management foundation for Intune, providing the user and device objects that Intune manages.
All user and group management for Intune is performed in Azure AD. When you create policies or deploy applications in Intune, you do not assign them to users or groups that exist only within Intune. Instead, you assign them to the user and security groups that are managed in Azure AD. This provides a single, centralized identity system for all of Microsoft's cloud services, simplifying administration and ensuring consistency.
The integration is also crucial for device enrollment. When a device is enrolled in Intune, a corresponding device object is created or updated in Azure AD. This process, known as device registration, allows Azure AD to have an inventory of all the devices that are associated with the organization. This inventory is then used for a variety of security and access control features. For the 70-398 Exam, understanding this relationship between the Intune enrollment and the Azure AD device object was fundamental.
Perhaps the most powerful feature that this integration enables is Conditional Access. Conditional Access is an Azure AD feature that acts as a policy engine. It can use the device compliance status from Intune as a condition for granting access to corporate resources. For example, you can create a Conditional Access policy that says, "To access company email, the user must be on a device that is marked as compliant by Intune." This powerful synergy between identity, device state, and access control is a cornerstone of modern security and was a key topic for the 70-398 Exam.
Before any devices can be managed, they must first be enrolled in Intune. The process of planning for device enrollment was a key skill area for the 70-398 Exam. This is not a one-size-fits-all process. The best enrollment method depends on several factors, including the device platform (Windows, iOS, Android), the ownership of the device (corporate-owned or personal), and the desired level of management control. A mobility architect must be able to choose and configure the appropriate enrollment methods for their organization.
For corporate-owned devices, organizations typically want a streamlined and automated enrollment experience. For Windows devices, a feature called Windows Autopilot allows new devices to be automatically enrolled into Intune and configured with the correct policies and applications right out of the box. For iOS and Android devices, similar automated enrollment programs exist, such as Apple's Device Enrollment Program (DEP) and Android Enterprise zero-touch enrollment. These methods ensure that corporate devices are properly managed from the moment they are turned on.
For personally owned devices in a "bring your own device" (BYOD) scenario, the enrollment process is typically user-initiated. The organization provides instructions to the employees on how to install the Intune Company Portal app on their device and sign in with their corporate credentials. This will then guide them through the enrollment process. For BYOD, it is crucial to be transparent with users about what the company can and cannot see or do on their personal device to respect their privacy.
Planning for enrollment also involves configuring the necessary prerequisites. This includes setting up the MDM authority in Intune, configuring the necessary DNS records (CNAME), and enabling the device platforms you wish to support. A solid enrollment plan is the foundation of a successful device management implementation, and a thorough understanding of these different options and their configuration was a critical requirement for the 70-398 Exam.
The 70-398 Exam required detailed, practical knowledge of how to configure the enrollment process for the major device platforms: Windows, iOS, and Android. While the high-level concepts are similar, the specific technical steps and prerequisites are different for each platform. An administrator must be proficient in all three to manage a diverse, modern device fleet.
For Windows 10/11 devices, there are several enrollment options. Automatic enrollment can be configured in Azure AD, which allows devices to be automatically enrolled in Intune when they are joined to Azure AD or registered. As mentioned, Windows Autopilot is the preferred method for new corporate devices. For existing devices, enrollment can be done through the Settings app or by using Group Policy in a traditional Active Directory environment.
For iOS and iPadOS devices, the configuration requires an Apple MDM Push Certificate. This certificate is created on Apple's push certificate portal and uploaded to Intune. It allows Intune to securely communicate with Apple's Push Notification service (APNs) to send management commands to the devices. Without this certificate, iOS management is not possible. For corporate devices, using Apple's Device Enrollment Program (DEP) and Volume Purchase Program (VPP) provides the most seamless management experience.
For Android devices, the 70-398 Exam concepts focused on the Android Enterprise framework. This provides a secure and consistent way to manage Android devices. An administrator must connect their Intune tenant to a managed Google Play account. This enables the use of different management profiles, such as the "work profile," which creates a secure, containerized space on a personal device for corporate apps and data. Understanding the specific setup steps for each of these platforms was a key hands-on skill.
Once devices are enrolled, the next crucial step is to ensure they meet the organization's security standards. This is achieved by creating and deploying device compliance policies in Intune. A compliance policy is a set of rules and settings that a device must adhere to in order to be considered "compliant." The ability to design and implement these policies was a central topic in the 70-398 Exam.
Compliance policies can be configured for each device platform (Windows, iOS, Android, macOS). The available settings are specific to each platform, but they generally cover key security requirements. For example, a typical compliance policy might require that the device has a password or PIN of a certain complexity, that the device's storage is encrypted, and that the device's operating system is at or above a minimum version.
You can also set rules related to the device's security status. For Windows 10/11, you can require that the device has its firewall, antivirus, and anti-spyware software enabled. For Android, you can check that the device has not been rooted, and for iOS, you can check that it has not been jailbroken. These checks help to ensure the basic integrity of the device's operating system.
After a compliance policy is created, it is deployed to a group of users or devices. The Intune service then evaluates the compliance status of each device in that group. The results of this evaluation are reported back to Intune and Azure AD. This compliance status is a critical piece of information that can be used to control access to corporate resources, which is the concept of Conditional Access. The 70-398 Exam would expect a candidate to be able to create a comprehensive compliance policy for a given scenario.
The true power of device compliance policies is realized when they are combined with Conditional Access. Conditional Access, an Azure Active Directory Premium feature, is the mechanism used to enforce compliance. It acts as the gatekeeper for corporate resources. The ability to understand and configure Conditional Access policies was one of the most important skills tested in the 70-398 Exam, as it is where device management and identity management converge to create a zero-trust security model.
A Conditional Access policy is a simple "if-then" statement. The "if" part defines the conditions under which the policy applies. These conditions can include the user or group, the cloud application they are trying to access (like Exchange Online or SharePoint Online), their location, and, most importantly for this topic, the state of their device. The "then" part defines the access controls that will be applied.
The key integration point is the "Require device to be marked as compliant" access control. When this is enabled in a Conditional Access policy, it means that before a user is granted access to the specified application, Azure AD will check with Intune to see if the device they are using is compliant with the deployed compliance policies.
If the device is compliant, the user is granted access seamlessly. If the device is not compliant, access is blocked. In this case, the user is typically redirected to the Intune Company Portal app with a message explaining why they were blocked and providing them with the steps they need to take to remediate the issue (e.g., "You must set a PIN on your device"). This automated enforcement and remediation workflow is a cornerstone of modern endpoint security and was a critical concept for the 70-398 Exam.
While Intune is a powerful cloud-only solution, the 70-398 Exam recognized that many large organizations have a significant existing investment in System Center Configuration Manager (SCCM) for managing their on-premises Windows PCs. To bridge this gap, Microsoft provided a hybrid MDM configuration that allowed a single organization to use both SCCM and Intune for device management. Planning for and implementing this hybrid setup was a key topic for the exam.
The hybrid MDM configuration involved connecting an on-premises SCCM infrastructure to a cloud-based Microsoft Intune subscription. In this model, the SCCM console was used as the single pane of glass for managing all devices, both the on-premises PCs and the mobile devices managed by Intune. The policies for the mobile devices were created in the SCCM console and were then synchronized up to the Intune service, which would then deliver them to the devices.
This hybrid approach was often seen as a transitional step for organizations that were starting their journey to the cloud. It allowed them to leverage their existing SCCM expertise and infrastructure while extending their management capabilities to include mobile devices. It provided a unified administrative experience, which was appealing to many large enterprises.
However, it is important to note that this specific hybrid MDM architecture has since been deprecated by Microsoft. The modern approach for integrating SCCM and Intune is called "co-management," which offers a more flexible and robust way to manage devices with both tools. While the original hybrid model is no longer the recommended path, understanding the concept of integrating on-premises and cloud management tools, as covered in the 70-398 Exam, is still a very relevant skill.
To succeed in questions related to planning and design on the 70-398 Exam, a candidate needed to have a strong grasp of the key architectural concepts. This meant being able to look at a set of business requirements and design a device management solution that was secure, scalable, and met the needs of the users. This involved making strategic decisions about the overall management approach and the integration of the various Microsoft technologies.
A key architectural decision was choosing the appropriate management model for different user populations. This involves understanding when to use full Mobile Device Management (MDM) for corporate-owned devices and when to use the less intrusive Mobile Application Management (MAM) for personal BYOD devices. A good architect would design a solution that supported both models, allowing the organization to apply the right level of control based on the device's ownership and the sensitivity of the data being accessed.
Another fundamental architectural concept was identity. A successful device management implementation relies on a solid identity foundation in Azure Active Directory. This includes planning for how user identities will be managed (e.g., cloud-only vs. synchronized from on-premises Active Directory) and designing an appropriate user and group structure. This structure is then used for targeting all the Intune policies and application deployments, so a logical design is crucial for long-term manageability.
Finally, a key principle was planning for integration. A device management solution does not exist in a vacuum. It must integrate with other IT and security systems. As covered in the 70-398 Exam, this included the integration with Azure AD for identity and Conditional Access, and the potential integration with on-premises SCCM for hybrid management. A good architect must understand how these different pieces fit together to create a cohesive and comprehensive enterprise mobility and security solution.
Once a device is enrolled in Microsoft Intune, it enters a lifecycle that needs to be managed by an administrator. This lifecycle includes the ongoing monitoring of the device, the deployment of configurations and updates, and eventually, the retirement of the device when it is no longer needed. The skills required to manage this entire device lifecycle were a central part of the 70-398 Exam. It represents the core, day-to-day operational tasks of an endpoint administrator.
The first phase of the lifecycle, after enrollment, is configuration. This is where the administrator deploys policies to the device to ensure it conforms to corporate standards. This goes beyond just security settings and can include configuring a wide range of device features, such as Wi-Fi profiles, VPN settings, email accounts, and certificates. The goal is to make the device both secure and productive for the end-user, automating as much of the setup process as possible.
The middle phase of the lifecycle is about monitoring and maintenance. This involves using the Intune console to monitor the health and compliance status of the device fleet. It also includes managing software updates for the operating system and applications to protect against vulnerabilities. This is an ongoing process that ensures the devices remain in a healthy and secure state throughout their time in service.
The final phase is device retirement. When an employee leaves the company, or a device is lost, stolen, or replaced, it must be properly retired from management. Intune provides several remote actions for this purpose. A "retire" or "wipe" action can be used to remove corporate data and management settings from the device. For corporate-owned devices, a full factory reset might be performed. A solid understanding of how to use these remote actions was a key skill for the 70-398 Exam.
Device configuration profiles are the primary mechanism in Intune for deploying settings and features to managed devices. A deep and practical knowledge of how to create and manage these profiles was a critical skill for the 70-398 Exam. A configuration profile is a collection of settings that can be pushed out to a device to configure a specific aspect of its functionality. Intune provides a vast library of settings that can be managed through these profiles.
There are different types of configuration profiles, each designed for a specific purpose. For example, there are profile types for configuring device features, such as the settings for Wi-Fi, VPN, and email. There are also profiles for deploying certificates, which can be used to authenticate devices to the corporate network or other services. Another important profile type is "device restrictions," which allows an administrator to lock down certain features of the device, such as disabling the camera or restricting access to the app store.
The process of creating a configuration profile is straightforward. The administrator selects the platform (e.g., Windows 10, iOS), the profile type, and then configures the desired settings within that profile. Each platform has its own unique set of available settings that correspond to the capabilities of the underlying operating system. For example, the settings available for an iOS device are different from those available for an Android device.
Once the profile is created, it is assigned to an Azure AD user or device group. Intune then delivers this profile to all the devices associated with that group. The devices apply the settings, and the Intune service reports on the status of the deployment. The ability to use these configuration profiles to automate the setup and secure the configuration of devices at scale was a core competency tested in the 70-398 Exam.
An essential part of managing a device fleet is having visibility into its status. An administrator needs to be able to monitor the health, compliance, and configuration of all managed devices. Microsoft Intune provides a rich set of monitoring and reporting capabilities for this purpose. The ability to use these tools to maintain operational awareness was a key skill for the 70-398 Exam. It is not enough to just deploy policies; you must also verify that they are being successfully applied.
The main Intune dashboard provides a high-level overview of the device environment. It includes charts and summaries that show the device compliance status, the device configuration profile status, and the overall device inventory by platform and enrollment status. This dashboard is the starting point for an administrator to get a quick snapshot of the health of their endpoint estate. From here, they can drill down into more detailed reports.
For every policy or profile that is deployed, Intune provides detailed status reports. For example, for a device compliance policy, the report will show how many devices are compliant, how many are non-compliant, and the specific settings that are causing the non-compliance. Similarly, for a configuration profile, the report will show which devices the profile was successfully applied to and which devices encountered an error. These reports are crucial for troubleshooting deployment issues.
Intune also provides a comprehensive device inventory. An administrator can view a list of all managed devices and drill down into the properties of a specific device. This detailed view shows a wealth of information, including the hardware details, the discovered applications, the device's compliance status, and the configuration profiles that have been applied. This ability to monitor both the overall environment and the status of individual devices was a fundamental operational skill for the 70-398 Exam.
While Mobile Device Management (MDM) focuses on managing the entire device, Mobile Application Management (MAM) offers a more targeted approach that focuses on managing and securing the corporate applications and data. This is a particularly important concept for "bring your own device" (BYOD) scenarios, where the organization wants to protect its data without taking full control of the employee's personal device. A deep understanding of MAM was a critical component of the 70-398 Exam.
The core idea behind MAM is to create a secure container on the device for corporate applications. This container separates the corporate apps and data from the personal apps and data. The organization can then apply a set of security policies specifically to the apps within this container. This is often referred to as "MAM without enrollment," as it can be applied to devices that are not enrolled in MDM.
The policies that can be applied through MAM are known as app protection policies. These policies can enforce a wide range of security controls. For example, you can require a PIN or a biometric gesture (like a fingerprint) to be entered before a user can open a corporate application. You can also control the flow of data by preventing users from copying and pasting data from a managed corporate app to an unmanaged personal app, like a personal email client or social media app.
MAM policies can also control where users can save corporate data, restricting them to approved corporate storage locations like OneDrive for Business or SharePoint, and blocking them from saving to a personal cloud storage service or the local device. This ability to protect corporate data at the application level, regardless of the management state of the device itself, is a cornerstone of a modern, flexible security strategy and was a key concept tested in the 70-398 Exam.
A primary function of any device management solution is to deploy applications to users. Microsoft Intune provides a robust and flexible framework for managing the entire application lifecycle, from deployment and updates to eventual removal. The skills needed to effectively manage application deployment using Intune were a major focus of the 70-398 Exam. This is a key feature for ensuring that employees have the tools they need to be productive.
Intune supports the deployment of various types of applications. This includes apps from the public app stores (like the Apple App Store and Google Play), in-house line-of-business (LOB) apps that are developed by the organization, and web apps, which are essentially shortcuts to a web URL. For Windows 10/11 devices, it also supports the deployment of traditional MSI packages and modern Microsoft Store for Business apps.
The process of deploying an app involves adding it to the Intune app catalog and then assigning it to a user or device group. The assignment can be configured in two main ways: "Available" or "Required." If an app is assigned as "Available," it will appear in the Intune Company Portal app on the user's device, and the user can choose to install it on-demand. This is a great way to create a self-service software catalog for your users.
If an app is assigned as "Required," Intune will automatically attempt to install it on the device without any user interaction. This is used for essential applications, such as security software or core productivity apps, that must be installed on all corporate devices. Intune provides detailed reporting on the installation status of all deployed applications, allowing an administrator to monitor the success of the deployments and troubleshoot any failures. This comprehensive app management capability was a key practical skill for the 70-398 Exam.
As introduced in the context of Mobile Application Management (MAM), app protection policies are the specific set of rules used to secure corporate data within managed applications. The ability to create, configure, and deploy these policies was a critical and detailed topic within the 70-398 Exam. These policies are the primary tool for implementing a data loss prevention (DLP) strategy in a mobile environment.
App protection policies are configured in the Intune console and are divided into three main categories of settings: data relocation, access requirements, and conditional launch. The data relocation settings are focused on preventing data leakage. These are the settings that control actions like cut, copy, and paste between managed and unmanaged apps. They also control where users can save data, restricting them to approved corporate locations.
The access requirements settings control how the user accesses the managed applications. This is where you configure the policy to require a PIN or a corporate credential to be entered before the app can be opened. You can also set a timeout, after which the user must re-enter their PIN. These settings ensure that even if the device itself is unlocked, the corporate apps remain protected by an additional layer of authentication.
Conditional launch settings add an extra layer of automated security checks. These rules are checked every time a managed app is launched. You can configure the app to block access if it detects that the device has been jailbroken or rooted, or if the device's operating system is below a minimum required version. The ability to combine these different policy settings to create a comprehensive data protection strategy for mobile applications was a key skill for the 70-398 Exam.
Securing corporate data on mobile devices is the ultimate goal of any enterprise mobility management strategy. The 70-398 Exam covered this topic holistically, testing a candidate's ability to use a combination of different tools and policies to create a multi-layered data protection solution. This goes beyond just a single policy and involves thinking about how device management, application management, and identity management work together to protect data throughout its lifecycle.
The first layer of protection is at the device level, through MDM. By deploying device compliance policies, an administrator ensures that all devices accessing corporate data meet a baseline level of security. Requiring features like device encryption and a strong password is the foundational step. This protects the data at rest on the device. If an encrypted device is lost or stolen, the data on it remains unreadable.
The second layer of protection is at the application level, through MAM. By using app protection policies, an administrator can control how data is used within corporate applications, regardless of whether the device is corporate-owned or personal. This protects data in use by preventing leakage to unmanaged applications and storage locations. This is particularly crucial in BYOD scenarios where the organization does not have full control over the device.
The third and most powerful layer is at the access level, through Conditional Access. By integrating the device compliance status from MDM and the application identity from MAM with Azure AD Conditional Access, an organization can create intelligent, real-time access control policies. This ensures that only users on healthy, compliant devices using protected applications can access sensitive corporate data. A deep understanding of how to weave these three layers together was a core architectural skill for the 70-398 Exam.
To succeed in questions related to data protection on the 70-398 Exam, a candidate needed to think strategically. This meant being able to analyze a set of business requirements and choose the most appropriate combination of technologies and policies to meet those requirements. It involved understanding the trade-offs between different approaches and designing a solution that was both secure and user-friendly.
A key strategic decision was determining the right management approach for different user groups and device types. For a group of field executives using corporate-owned iPads that contain highly sensitive sales data, a highly restrictive MDM approach would be appropriate. This would involve fully managing the devices, locking down unnecessary features, and enforcing strict compliance policies.
In contrast, for the general office population who want to check their email on their personal smartphones, a MAM-without-enrollment approach would be a much better strategy. This would allow the organization to protect the corporate email data within the Outlook app, by enforcing an app PIN and preventing data leakage, without needing to manage the employees' personal devices. This respects user privacy and reduces resistance to the security program.
Another strategic consideration was the user experience. Security controls that are too onerous or that significantly hinder productivity are often bypassed by users. A good data protection strategy is one that is as transparent and seamless as possible. For example, using features like biometric authentication (fingerprint or face ID) instead of a complex PIN for app access can improve both security and user satisfaction. The ability to think through these strategic considerations was a key differentiator for successful candidates of the 70-398 Exam.
Go to testing centre with ease on our mind when you use Microsoft MCP 70-398 vce exam dumps, practice test questions and answers. Microsoft 70-398 Planning for and Managing Devices in the Enterprise certification practice test questions and answers, study guide, exam dumps and video training course in vce format to help you study with ease. Prepare with confidence and study using Microsoft MCP 70-398 exam dumps & practice test questions and answers vce from ExamCollection.
Purchase Individually
Top Microsoft Certification Exams
Site Search:
SPECIAL OFFER: GET 10% OFF
Pass your Exam with ExamCollection's PREMIUM files!
SPECIAL OFFER: GET 10% OFF
Use Discount Code:
MIN10OFF
A confirmation link was sent to your e-mail.
Please check your mailbox for a message from support@examcollection.com and follow the directions.
Download Free Demo of VCE Exam Simulator
Experience Avanset VCE Exam Simulator for yourself.
Simply submit your e-mail address below to get started with our interactive software demo of your free trial.