🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided MD-102 Domain 1
Domain 1 — Module 2 of 7 29%
2 of 27 overall

MD-102 Study Guide

Domain 1: Prepare Infrastructure for Devices

  • Device Identity: Join, Register & Hybrid Free
  • Build the Right Device Groups
  • Intune Enrollment Essentials Free
  • Auto-Enrollment & Bulk Enrollment
  • Intune RBAC & Windows Hello for Business
  • Compliance Policies & Conditional Access
  • Windows LAPS & Local Group Management

Domain 2: Manage and Maintain Devices

  • Windows Autopilot: Choose Your Path Free
  • Autopilot: Device Names, ESP & Rollout
  • Provisioning Packages & Windows 11 Upgrades
  • Windows 365: Your PC in the Cloud
  • Configure Windows Devices with Intune
  • Config Profiles: Android, iOS & macOS
  • Control Admin Rights with EPM
  • Intune Suite: Apps, Analytics & Remote Help
  • Cloud PKI & Tunnel for MAM
  • Remote Actions & Device Queries

Domain 3: Manage Applications

  • App Deployment: Prepare & Package
  • Deploy Apps with Intune & App Stores
  • Microsoft 365 Apps: Deploy, Customize & Manage
  • App Protection Policies & Conditional Access
  • App Configuration: Managed Apps & Managed Devices

Domain 4: Protect Devices

  • Endpoint Security: Antivirus, Firewall & Encryption
  • Attack Surface Reduction & Security Baselines
  • Defender for Endpoint: Integrate & Onboard
  • Plan and Manage Windows Updates
  • Cross-Platform Updates & Delivery Optimization

MD-102 Study Guide

Domain 1: Prepare Infrastructure for Devices

  • Device Identity: Join, Register & Hybrid Free
  • Build the Right Device Groups
  • Intune Enrollment Essentials Free
  • Auto-Enrollment & Bulk Enrollment
  • Intune RBAC & Windows Hello for Business
  • Compliance Policies & Conditional Access
  • Windows LAPS & Local Group Management

Domain 2: Manage and Maintain Devices

  • Windows Autopilot: Choose Your Path Free
  • Autopilot: Device Names, ESP & Rollout
  • Provisioning Packages & Windows 11 Upgrades
  • Windows 365: Your PC in the Cloud
  • Configure Windows Devices with Intune
  • Config Profiles: Android, iOS & macOS
  • Control Admin Rights with EPM
  • Intune Suite: Apps, Analytics & Remote Help
  • Cloud PKI & Tunnel for MAM
  • Remote Actions & Device Queries

Domain 3: Manage Applications

  • App Deployment: Prepare & Package
  • Deploy Apps with Intune & App Stores
  • Microsoft 365 Apps: Deploy, Customize & Manage
  • App Protection Policies & Conditional Access
  • App Configuration: Managed Apps & Managed Devices

Domain 4: Protect Devices

  • Endpoint Security: Antivirus, Firewall & Encryption
  • Attack Surface Reduction & Security Baselines
  • Defender for Endpoint: Integrate & Onboard
  • Plan and Manage Windows Updates
  • Cross-Platform Updates & Delivery Optimization
Domain 1: Prepare Infrastructure for Devices Premium ⏱ ~10 min read

Build the Right Device Groups

Groups are how Intune targets policies, apps, and compliance checks to the right devices. Learn to plan dynamic, assigned, and nested groups in Microsoft Entra ID.

Why do device groups matter?

☕ Simple explanation

Think of groups as mailing labels on parcels.

You wouldn’t send the same parcel to every address. Groups let you label devices so the right policies, apps, and settings reach the right machines. “All Windows laptops in Finance” get the Finance apps. “All shared tablets in the warehouse” get kiosk mode. Without groups, you’d be stuck applying everything to everyone — or nothing to anyone.

Entra ID groups are the primary targeting mechanism in Microsoft Intune. Every policy, app assignment, compliance rule, and configuration profile is assigned to one or more groups. Without well-planned groups, you cannot effectively manage devices at scale.

Groups can contain devices, users, or both. For device management, you typically create device-based groups so policies follow the hardware regardless of who signs in.

Types of groups

Chen Wei at Meridian Bank manages 10,000+ devices. Manually adding devices to groups would take weeks and fall out of date immediately. That’s why understanding group types is critical.

FeatureAssigned GroupsDynamic Device GroupsDynamic User Groups
Members added byAdmin manuallyAutomatic rules based on device propertiesAutomatic rules based on user properties
Updates automaticallyNo — admin must maintainYes — re-evaluated as properties changeYes — re-evaluated as properties change
Best forPilot groups, exceptions, small setsLarge-scale targeting by OS, model, departmentTargeting by user location, job title, department
Licence requiredAny Entra ID tierEntra ID P1 or P2Entra ID P1 or P2
Example ruleN/A (manual)device.deviceOSType -eq 'Windows'user.department -eq 'Finance'
Evaluation timeInstant (manual add)Minutes to hours (depends on tenant size)Minutes to hours

Dynamic membership rules

Dynamic groups use rules that automatically add or remove members based on properties. Here are the most common patterns for device groups:

Common device group rules

ScenarioRule Syntax
All Windows devices(device.deviceOSType -eq "Windows")
All iOS devices(device.deviceOSType -eq "iPhone") -or (device.deviceOSType -eq "iPad")
All Android devices(device.deviceOSType -contains "Android")
All Autopilot devices(device.devicePhysicalIds -any (_ -startsWith "[ZTDID]"))
Devices with a specific naming prefix(device.displayName -startsWith "TUI-")
Corporate-owned devices only(device.deviceOwnership -eq "Company")
Devices enrolled in the last 7 days(device.registeredDateTime -ge "2026-04-14T00:00:00Z")
💡 Exam tip: Autopilot device group rule

The rule (device.devicePhysicalIds -any (_ -startsWith "[ZTDID]")) is a frequently tested concept. It catches all devices registered via Windows Autopilot using their Zero-Touch Device ID. This is how you target Autopilot deployment profiles to the right devices before they even boot up for the first time.

If the exam asks “how do you assign an Autopilot profile to devices before they’re enrolled?” — the answer involves a dynamic group with this ZTDID rule.

Planning a group strategy

Chen Wei’s group strategy at Meridian Bank:

Group NameTypeRule / MembersPurpose
All Corporate WindowsDynamic DevicedeviceOSType -eq "Windows" AND deviceOwnership -eq "Company"Windows security baselines, BitLocker encryption
All Corporate iOSDynamic DevicedeviceOSType -eq "iPhone" OR deviceOSType -eq "iPad"iOS compliance policy, managed app config
Autopilot DevicesDynamic DevicedevicePhysicalIds contains ZTDIDAutopilot deployment profile targeting
Finance DepartmentDynamic Useruser.department -eq "Finance"Finance-specific apps and DLP policies
Pilot Group - IT TeamAssigned15 IT staff manually addedTest new policies before broad rollout
Kiosk TabletsAssigned50 shared warehouse tabletsKiosk mode config profile
VIP ExecutivesAssignedC-suite manually addedRelaxed compliance (longer grace periods)

Key principles

  1. Use dynamic groups for scale — anything over 50 devices should be dynamic
  2. Use assigned groups for exceptions — pilot groups, VIPs, special hardware
  3. Avoid overlapping groups with conflicting policies — a device in two groups with different Wi-Fi configs gets unpredictable results
  4. Name groups consistently — prefix with purpose: Intune-Compliance-, Intune-Config-, Intune-Apps-
  5. Test dynamic rules before going live — Entra admin center has a “Validate rules” feature
ℹ️ Deep dive: nested groups and limitations

Nested groups (groups inside groups) are supported in Entra ID but have important limitations in Intune:

  • App assignments support nested groups
  • Compliance policies support nested groups
  • Configuration profiles do NOT evaluate nested group membership — only direct members

If Chen Wei adds a group inside another group, some policies will apply to nested members and others won’t. The safest approach: use flat, non-nested groups for Intune targeting unless you’ve confirmed the specific workload supports nesting.

Exam tip: If a question involves a device not receiving a configuration profile and it’s in a nested group — that’s likely the issue.

Device categories

When devices enroll, users can select a device category (e.g., “Corporate”, “BYOD”, “Shared”). Admins create these categories in Intune, and they flow to Entra ID as a device property — which dynamic groups can use.

This creates a workflow:

  1. Admin creates device categories in Intune admin center
  2. User selects a category during enrollment
  3. Device automatically joins a dynamic group based on that category
  4. Policies and apps assigned to that group apply immediately

Example: Aroha at CloudForge creates categories “Corporate Laptop” and “Shared Kiosk.” When a device enrolls as “Shared Kiosk,” it automatically gets kiosk-mode policies.

🎬 Video walkthrough

🎬 Video coming soon

Build the Right Device Groups — MD-102 Module 2

Build the Right Device Groups — MD-102 Module 2

~10 min

Flashcards

Question

What's the difference between assigned groups and dynamic groups?

Click or press Enter to reveal answer

Answer

Assigned groups: admin manually adds/removes members. Dynamic groups: membership is automatic based on rules that evaluate device or user properties. Dynamic groups require Entra ID P1 or P2.

Click to flip back

Question

What dynamic group rule catches all Windows Autopilot devices?

Click or press Enter to reveal answer

Answer

(device.devicePhysicalIds -any (_ -startsWith "[ZTDID]")) — this matches devices registered via Autopilot using their Zero-Touch Device ID.

Click to flip back

Question

Do Intune configuration profiles support nested group membership?

Click or press Enter to reveal answer

Answer

No. Configuration profiles only evaluate direct group members. If a device is in a nested (child) group, it may not receive the profile. App assignments and compliance policies DO support nested groups.

Click to flip back

Knowledge Check

Knowledge Check

Chen Wei needs to automatically target a compliance policy to all corporate-owned Windows devices at Meridian Bank. Which approach is most efficient?

Knowledge Check

A device at Meridian Bank is assigned to a configuration profile through a nested group, but the profile isn't applying. What's the most likely cause?


Next up: Intune Enrollment Essentials — configuring enrollment settings so devices can start receiving policies.

← Previous

Device Identity: Join, Register & Hybrid

Next →

Intune Enrollment Essentials

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.