Summary
In this chapter, you explored the features of DPS. Although we only used a few devices in the examples provided, DPS allows you to provision millions of devices in a secure and scalable manner.
You learned some important concepts alongside device provisioning and saw how security is an integral part of the process. You have the option to use keys, certificates, or TPM. You also saw how allocation policies work and how to create custom allocation policies through functions. Last but not least, you learned how to implement group enrollments.
Now that you can effectively deploy thousands of devices, you need to learn how to monitor and manage them. In Chapter 4, Device Management and Monitoring, you will learn about what tools and processes you can use to monitor and manage your devices at scale.