Explore the Enterprise Desktop Flashcards

1
Q

What is modern endpoint management?

A

A new approach to managing Windows devices, similar to managing mobile devices, that simplifies deployment, improves security, and enhances user experience.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the key benefits of modern endpoint management?

A

Simplified deployment and management, improved security, better user experience, lower costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What types of devices can be managed with a modern endpoint management platform?

A

Desktop PCs, HoloLens, Surface Hubs, company-owned devices, employee-owned devices, and mobile devices (iOS and Android).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does Windows Autopilot simplify device provisioning?

A

It automates device setup, joining devices to Azure AD and enrolling them in Intune, and applying user and organizational settings without custom OS images.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the benefit of using a modern endpoint management approach for updates?

A

It simplifies keeping Windows and Microsoft 365 apps up-to-date without the need for complex on-premises infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name three built-in security features of Microsoft 365 that contribute to intelligent security.

A

(Any three of these) Windows Hello, Windows Defender ATP, Windows Information Protection, Microsoft Entra Identity Protection, Conditional Access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the Microsoft Intelligent Security Graph?

A

A system that uses billions of signals and machine learning to provide security insights and help protect company data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do proactive insights improve device management?

A

They allow IT to discover and address device and app issues before they impact end users, increasing confidence in updates and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of an established device life cycle in an organization?

A

To ensure users have the right technologies to be productive, manage resources effectively, and prevent end-of-life devices from becoming a liability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the six phases of the enterprise desktop life cycle?

A

Planning, 2. Purchasing, 3. Deployment, 4. Operations, 5. Support, 6. Upgrade and Retire.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What activities are typically included in the “Planning” phase of the device life cycle?

A

Defining a strategy for system management, including hardware and software standards, security policies, and deployment methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What key tasks are performed during the “Deployment” phase?

A

Installing the operating system, enrolling devices in management systems (e.g., Intune), and deploying applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the primary goal of the “Operations” phase?

A

Ensuring systems are functioning correctly, are secure, and meet performance and availability requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What types of activities are included in the “Support” phase?

A

Providing end-user training, troubleshooting issues, and offering assistance with using systems and applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What happens during the “Upgrade and Retire” phase?

A

Replacing old devices, retiring obsolete hardware, and unenrolling devices from the organization’s management systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What factors should organizations consider when planning for new systems?

A

Existing device inventory, upgrade feasibility, operating system misconfigurations, and future needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the key elements of the “Computer strategy” stage in the planning phase?

A

Image and hardware standardization, environment design, replacement frequency, mobile device vs. desktop usage, and BYOD policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is involved in the “Computer selection” stage?

A

Choosing hardware, software, and peripherals, and conducting design configuration and application compatibility testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What should be considered when evaluating “Deployment methods” during planning?

A

The costs associated with each method, the suitability for different scenarios, and whether a cloud-based or on-premises solution is needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is “Demand forecasting” in the context of IT planning?

A

Predicting future computing resource requirements to determine purchasing needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the purpose of “Design configuration”?

A

Determining how to utilize new features and incorporate them into the overall plan, including new tools, resources, and settings.

22
Q

What activities are included in the “Purchasing” stage?

A

Negotiation, contracts, vendor management, shipping, and disposal of packaging materials.

23
Q

What are the major cost factors to consider during the purchasing phase?

A

Hardware, software, accessories, deployment process, and hardware staging.

24
Q

What is involved in “Hardware staging”?

A

Securely storing, unpacking, inspecting, and inventorying new systems before deployment.

25
What are the key steps in the "Building" phase of desktop deployment?
Streamlining the process, developing the process, testing, configuration, and managing logistics.
26
What is the purpose of the "Testing" step in the building phase?
To identify and correct errors in the OS configuration or deployment process before rollout.
27
What does the "Configuration" step involve?
Developing automation solutions, configuring standardized images or device configurations, and planning for network access.
28
What is included in "Managing the logistics" during the building phase?
Storing computers, deploying hardware, communicating with end users, and potentially coordinating with hardware vendors for pre-shipment configuration.
29
How does the deployment team typically approach the deployment phase?
They deploy in phases, stabilizing each phase before moving on, and use early phases to validate configurations and user experience.
30
What is "Enrollment" in the context of modern device management?
Configuring an existing device to meet organizational requirements and granting it access to resources without redeploying the OS.
31
What are the benefits of using enrollment for mobile devices and BYOD scenarios?
It allows organizations to manage a range of devices and scenarios, from basic email access to full device management, while accommodating different requirements for various user groups.
32
What are some best practices for managing data during deployment?
Migrating essential data to the cloud or network shares before deployment, using in-place upgrades whenever possible, and leveraging tools like USMT for local data and settings migration.
33
What is the purpose of the User State Migration Tool (USMT)?
To capture and migrate user accounts, files, OS settings, and application settings to a new Windows installation.
34
What are the three phases of application deployment planning?
Managing application inventory and compatibility, 2. Packaging applications, 3. Providing life-cycle support.
35
What is the first step in understanding the impact of application compatibility changes?
Gathering an application inventory.
36
What is an effective way to reduce the number of applications in an environment and associated costs?
Standardizing application versions across the organization.
37
What are some methods for obtaining silent installation commands for applications?
Checking installation guides, searching internet forums, or using command-line options like /help or /? with the setup application.
38
What is Microsoft Application Virtualization (App-V)?
A technology that provides application packaging and sequencing to create virtual applications. (Note: App-V will be end-of-life in April 2026.)
39
What are the main aspects of application life-cycle support?
Deploying new applications, installing new versions of existing applications, and updating applications.
40
What are the common options for application delivery in an organization?
Automatic installation (e.g., during deployment), on-demand installation through a portal, and access to applications on personal devices.
41
What are the key features of Microsoft Intune for application management?
Supports various application installation types (Office, app packages, LOB apps), application policies for data protection, and compliance-based access control.
42
When is virtual application delivery beneficial?
When the client device cannot run the application locally. Applications are installed on a server or Cloud PC and accessed remotely.
43
What are some examples of virtual application delivery solutions?
Azure Virtual Desktop and Windows 365.
44
What factors should be considered when deciding whether to upgrade or retire existing computer hardware?
Age of the computers, performance, cost of upgrading compared to replacement, and the availability of facilities for refurbishment and storage.
45
What are some key considerations for upgrading software on user workstations?
Upgrading applications to new versions requires more planning and testing than applying simple updates.
46
What is the focus of the "Retirement" phase in the device lifecycle?
Safely and efficiently removing a system from production when it is no longer useful.
47
What logistical factors should be considered during the retirement phase?
Minimizing user disruption during computer pickup, preparing computers for resale (including data wiping), managing inventory and paperwork, and handling packing and shipping.
48
What should be done with sensitive information on hard drives of retired computers?
Ensure that sensitive data is securely removed before the device leaves the organization, using appropriate software tools or hardware solutions.
49
What factors should be considered regarding the value of retired equipment?
Residual or resale value for accounting purposes, potential for charitable donations, and tax implications.
50
What challenges and considerations are associated with BYOD device retirement or unenrollment?
Balancing the need to remove organizational data with protecting the user's personal information. Selective wiping of applications and data may be necessary.
51
What is a crucial step before allowing BYOD devices to access organizational resources?
Informing users about the organization's policies regarding data removal and device wiping upon retirement or unenrollment.
52