IL - Plan, Deploy and Configure Microsoft InTune - Exam 70-398

Course Overview

This course covers planning, deploying and configuring Microsoft Intune for mobile device management (MDM), mobile application management (MAM) and software deployment and updates on Windows. The course also covers iOS and Android devices. The course commences with signing up for an Intune tenant, adding users, groups and policies. Mobile device management and mobile application management are covered in detail, drawing out the differences between each and the capabilities on each type of device. To make full use of an Intune tenant, it is necessary to understand integration with Office 365 and Microsoft Azure Active Directory; these will be covered in detail as well as an overview of the remaining Enterprise Mobility and Security products.

This course will help prepare you for the Microsoft Certification Exam 70-398, Planning for and Managing Devices in the Enterprise. 

Course Details
  • Duration: 5 Days
  • Level: 300

Who this course is designed for
  • IT Pros that have experience with Windows 10 use, deployment and management

What You Will Learn

  • Planning for Microsoft Intune
  • The Intune Portals
  • Compliance
  • Configuration
  • Applications
  • Alerts, Troubleshooting and reporting
  • Intune as part of the Enterprise Mobility and Security product suite


  • Basic administrative experience with Office 365
  • Basic PowerShell scripting


Module 1:  Plan for Microsoft Intune 

This module covers planning for Microsoft Intune, device management, identity and device management strategies and concludes with signing up for an Intune trial tenant.

• Plan Licensing and product requirements and capabilities
• Mobile device management strategy cloud vs hybrid
• Identity strategy – Users / Groups
• Physical device considerations BYOD / CYOD
• Use of the Intune Portals
• License assignment

MODULE 2: Compliance 

This module is all about device compliance. Compliance policies help protect company data; you need to ensure that any devices used to access company data comply with the rules you define. The rules could include using an 8 digit PIN to access a device and ensuring all data is encrypted when stored on a device.

• Compliance in Intune
• Create a compliance policy
• Using multiple compliance policies

MODULE 3: Configuration   

This module discusses configuration of devices in Intune. Configuration policies, conditional access, exchange active sync and corporate device enrollment.

• Configuration in Intune
• Android
• Android for Work
• iOS
• Mac OS X
• Windows
• Software
• Computer Management
• Common device settings

MODULE 4: Managing Applications and Updates   

This module discusses mobile application management without enrollment on iOS and Android devices. In addition it covers the ability to side load and deep link apps and the use of the Intune Software publisher.

• Managing Applications
• Monitoring Applications
• Setup applications
• Intune App protection
• Company Portal apps
• Windows Software Updates

MODULE 5: Enrolling devices, Alerts, troubleshooting and reporting 

This module discusses enrolling mobile devices, the Intune alerts categories and capabilities. Reporting is covered in depth and general troubleshooting hints and tips.

• Enrolling devices
• iOS Certificates
• Alerts overview
• Device alerts
• Policy alerts
• Service alerts
• Reporting
• Troubleshooting

MODULE 6: Monitoring and Reporting 

This module focuses on monitoring and reporting Microsoft InTune and devices

• Monitoring
• Troubleshooting
• App Protection• 

MODULE 7: Intune as part of the Enterprise Mobility and Security product suite 

This module discusses Microsoft Intune as part of the Enterprise Mobility and Security suite of products.

• Azure Active Directory
• Azure Information Protection
• Microsoft Cloud App Security
• Microsoft Advanced Threat Analytics
• Microsoft Identity Manager

MODULE 8: Networking

This module discuss basic Linux networking and routing. Networking concepts are demonstrated on a stand-alone Linux system.

MODULE 9: Service Configuration 

There are a wide variety of services or daemons to be configured and managed by system administrators. We take a look at a number of the most commonly used ones. Items are demonstrated throughout the lecture, and students set up one of their VMs to be a server providing a number of maintenance-related services to another VM, which they set up as a client. They set up another VM as a web server with a database, and test accessing the web application.

MODULE 10: System Monitoring and Trouble-shooting 

Monitoring system performance and activity is an important aspect of system administration. Students will learn where to find various log files and how to use basic performance monitoring commands. The impact of altering process priorities is demonstrated as well as how to view performance metrics. Demonstrate generating reports and using configuration management tools. Students perform a lab activity where they observe how to control processes and use the performance monitoring techniques discussed.

MODULE 11: Storage Management 

Although it’s part of managing the system, it gets its own module. There will be some amount of theoretical discussion in this module, because students will not have access to systems with direct physical-attached hardware or clusters of systems. However, a variety of topics having to do with managing partitions, logical volumes and file systems is demonstrated and practiced in the lab activity.


Contact the experts at Opsgility to schedule this class at your location or to discuss a more comprehensive readiness solution for your organization. Contact us to enroll or book a class

Contact Us
Looking for on-demand training?