MS-102 Step-by-Step Guide: Real Admin Scenarios for Entra, Intune, Purview, and Defender
From Practice Questions to Real Admin Wins: Step-by-Step MS-102 Scenarios (With Exact Portal Paths and Verification)
If you have ever worked through MS-102 practice questions and felt confident about the answer but not the execution, you are not alone. The exam compresses real-world admin work into short scenarios. Your job as a Microsoft 365 admin is to translate those scenarios into the correct control plane, the right portal, and a repeatable implementation.
This post does exactly that.
You will find seven shuffled MS-102-style scenarios, rewritten as practical playbooks. Each one includes:
- What the scenario is testing
- Step-by-step portal instructions
- Verification steps (how to prove it worked)
- Common pitfalls and rollback guidance
Question 1: Require MFA for App1 only (not tenant-wide)
What this scenario is testing
This is a Microsoft Entra Conditional Access requirement. Per-user MFA is not granular enough when the requirement is โMFA for only one application.โ
Step-by-step (Microsoft Entra admin center)
- Open Microsoft Entra admin center.
- Go to Protection โ Conditional Access.
- Select Create new policy.
- Name:
CA - Require MFA for App1. - Under Users:
- Select the target user/group.
- Exclude emergency access (break-glass) accounts.
- Under Target resources (Cloud apps):
- Choose Select apps โ select App1.
- Under Grant controls:
- Select Grant access.
- Check Require multi-factor authentication.
- Set Enable policy to Report-only first (recommended).
- Click Create.
Verify
- Sign into App1 as a test user and confirm MFA is prompted.
- Sign into another app and confirm MFA is not forced by this policy.
- Review Entra Sign-in logs:
- Open the sign-in event โ Conditional Access tab โ confirm the policy applied.
Common pitfalls
- Not excluding break-glass accounts.
- Turning it on globally before validation.
- Another Conditional Access policy already forcing MFA for all apps.
Rollback
- Set the policy to Off or revert to Report-only.
Question 2: Enable BitLocker automatically for Windows 10 devices enrolling in Intune
What this scenario is testing
A compliance policy checks encryption. It does not enable BitLocker. To turn on BitLocker you must use a configuration approach, typically Endpoint security disk encryption.
Step-by-step (Intune admin center)
- Go to Intune admin center.
- Navigate to Endpoint security โ Disk encryption.
- Select Create policy.
- Platform: Windows 10 and later.
- Profile: BitLocker.
- Configure:
- Enable BitLocker silently where supported
- Store recovery keys in Microsoft Entra ID
- Set encryption method (XTS-AES is common)
- Assign to your target group.
- Select Create.
Verify
- On the device, run:
manage-bde -statusConfirm protection is On. - In Entra admin center (device object), confirm a BitLocker recovery key is present.
- In Intune, confirm the policy shows as Succeeded for the device.
Common pitfalls
- Only creating a compliance policy and expecting encryption to happen.
- TPM not ready, device not compatible, or user not a local admin in certain configurations.
- Assigning to the wrong group (user vs device targeting mismatch).
Rollback
- Remove the assignment or set the disk encryption policy to Not configured for affected settings.
Question 3: User2 fails to sign in as user2@fabrikam.com (UPN mismatch / domain issue)
What this scenario is testing
This is a UPN suffix alignment and sync issue. โAllow log on locallyโ is irrelevant to cloud authentication. For synced identities, you must add the UPN suffix in on-prem AD, update the UPN, then sync.
Step-by-step (On-prem AD: Add UPN suffix)
- Open Active Directory Domains and Trusts.
- Right-click the top node โ Properties.
- Under UPN Suffixes, add:
fabrikam.com. - Click Add โ OK.
Step-by-step (Update User2 UPN)
- Open Active Directory Users and Computers.
- Locate User2 โ Properties.
- Go to Account tab.
- Update User logon name to end with
@fabrikam.com. - Click Apply โ OK.
Step-by-step (Force Azure AD Connect sync)
On the Azure AD Connect server:
Start-ADSyncSyncCycle -PolicyType Delta
Verify
- In Entra admin center โ Users โ User2:
- Confirm the UPN changed to
user2@fabrikam.com.
- Confirm the UPN changed to
- Test sign-in.
Common pitfalls
- Domain not verified in Microsoft 365/Entra.
- Editing cloud UPN while the user is synced (will revert).
- Multiple identity sources (cloud-only vs synced) not understood.
Rollback
- Revert the UPN to the previous suffix and re-sync.
Question 4: Enforce encryption + Defender real-time protection, and block noncompliant devices
What this scenario is testing
You must build a compliance definition and an enforcement gate:
- Intune compliance policy defines what โcompliantโ means.
- Conditional Access blocks access for devices that are not compliant.
Step-by-step A (Create the compliance policy)
- Intune admin center โ Devices โ Compliance policies โ Create policy.
- Platform: Windows 10 and later.
- Configure compliance settings to require:
- Encryption (BitLocker)
- Microsoft Defender Antivirus / real-time protection (as available)
- Assign to the target users/devices.
- Create.
Step-by-step B (Create Conditional Access enforcement)
- Entra admin center โ Protection โ Conditional Access โ Create new policy.
- Users: target group (exclude break-glass).
- Target resources: select required apps (often All cloud apps in exam scenarios).
- Grant controls:
- Require device to be marked as compliant
- Enable Report-only first, then On.
Verify
- In Intune: device โ Device compliance shows Compliant/Noncompliant.
- Attempt access from a noncompliant device and confirm it is blocked.
- Check Entra sign-in logs to confirm the CA decision.
Common pitfalls
- Enabling CA before devices have time to enroll and evaluate compliance.
- Missing exclusions for emergency access accounts.
- Confusing โcomplianceโ with โconfiguration.โ Compliance does not remediate.
Rollback
- Switch CA policy back to Report-only or Off.
- Adjust compliance rules or assignment scope.
Question 5: Engineering users must enroll mobile devices and get a higher device limit
What this scenario is testing
This is Intune Enrollment restrictions plus priority handling:
- Device type restrictions determine which platforms can enroll.
- Device limit restrictions determine how many devices a user can enroll.
- If a user matches multiple restrictions, the highest priority policy applies.
Step-by-step A (Confirm platform enrollment is allowed)
- Intune admin center โ Devices โ Enrollment โ Enrollment restrictions.
- Open Device type restrictions.
- Confirm that Engineering is allowed to enroll the needed platform (iOS/Android).
- If needed, create a dedicated restriction:
- Create restriction โ allow required platforms โ assign to Engineering โ raise priority.
Step-by-step B (Confirm device limit for Engineering)
- Go to Device limit restrictions.
- Ensure the Engineering policy sets the correct device limit (example: 15).
- Ensure Engineering restriction has the correct priority relative to Default.
Verify
- Enroll a test device using an Engineering user.
- Confirm enrollment succeeds and device appears in Intune.
Common pitfalls
- Users belong to multiple groups and get caught by a higher priority rule.
- Fixing device limit while platform is blocked (or vice versa).
Rollback
- Lower the priority of the Engineering rule or revert limit.
- Temporarily assign Engineering to Default if needed to restore service.
Question 6: Configure Attack Simulation Training (Credential Harvest + training)
What this scenario is testing
This is about configuring Attack simulation training campaigns and selecting appropriate technique and training experiences.
Step-by-step (Microsoft 365 Defender portal)
- Open Microsoft 365 Defender.
- Go to Email & collaboration โ Attack simulation training.
- Select Launch a simulation.
- Choose the social engineering technique:
- Example: Credential harvest
- Configure:
- Target users/group
- Payload template
- Scheduling
- Select the training experience:
- Example: Mass Market Phishing
- Launch the simulation.
Verify
- Confirm campaign status shows running/completed.
- Review results: click rate, credential entry attempts, training completion.
Common pitfalls
- Launching tenant-wide without piloting.
- Training content that does not match the simulated technique.
Rollback
- Stop/cancel the simulation campaign and adjust scope.
Question 7: Auto-labeling policy. What do you do first?
What this scenario is testing
Auto-labeling can impact a lot of content quickly. The correct first step is simulation mode to validate match quality and reduce false positives.
Step-by-step (Microsoft Purview compliance portal)
- Open Microsoft Purview compliance portal.
- Go to Information protection / Sensitivity labels (UI varies).
- Create or edit an Auto-labeling policy.
- Select locations:
- Exchange, SharePoint, OneDrive (as required)
- Define conditions:
- Sensitive info types (SITs) or classifiers
- Choose the label to apply.
- Set policy mode to Simulation.
- Run simulation and review results.
- Tune conditions.
- Move to enforce mode only after results are acceptable.
Verify
- Review simulation report outputs.
- After enabling, verify labeled items in the targeted workloads.
Common pitfalls
- Enabling enforcement immediately, creating widespread mislabeling.
- Scoping too broadly without a pilot.
Rollback
- Switch policy back to Simulation or disable it.
- Adjust conditions and scope.
Cheat Sheet: Which portal do I use?
- App-specific MFA: Entra Conditional Access
- BitLocker enablement: Intune Endpoint security (Disk encryption)
- UPN sign-in mismatch: On-prem AD UPN suffix + Azure AD Connect sync
- Block noncompliant devices: Intune compliance + Entra Conditional Access
- Mobile enrollment controls: Intune Enrollment restrictions
- Attack simulations: Microsoft 365 Defender
- Auto-labeling: Microsoft Purview (Simulation first)
