ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 19 - PL-600 discussion

Report
Export

HOTSPOT

A company is creating a Power Platform solution to manage employees.

The company has the following requirements:

Allow only the human resource manager to change an employee’s employment status when an employee is dismissed. Allow only approved device types to access the solution and company data.

You need to recommend a solution that meets the requirements.

What should you recommend? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Question 19
Correct answer: Question 19

Explanation:

Box 1: Field security profile

Record-level permissions are granted at the entity level, but you may have certain fields associated with an entity that contain data that is more sensitive than the other fields. For these situations, you use field-level security to control access to specific fields.

Field-level security is available for the default fields on most out-of-box entities, custom fields, and custom fields on custom entities. Field-level security is managed by the security profiles.

Box 2: Compliancy policy

Compliance policy settings – Tenant-wide settings that are like a built-in compliance policy that every device receives. Compliance policy settings set a baseline for how compliance policy works in your Intune environment, including whether devices that haven’t received any device compliance policies are compliant or noncompliant.

Note: Mobile device management (MDM) solutions like Intune can help protect organizational data by requiring users and devices to meet some requirements. In Intune, this feature is called compliance policies.

Compliance policies in Intune:

Define the rules and settings that users and devices must meet to be compliant.

Include actions that apply to devices that are noncompliant. Actions for noncompliance can alert users to the conditions of noncompliance and safeguard data on noncompliant devices. Can be combined with Conditional Access, which can then block users and devices that don't meet the rules.

Reference:

https://docs.microsoft.com/en-us/power-platform/admin/field-level-security

https://docs.microsoft.com/en-us/mem/intune/protect/device-compliance-get-started

asked 05/10/2024
Jenny Silva
42 questions
User
0 comments
Sorted by

Leave a comment first