mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 14:27:22 +00:00
Merge pull request #5442 from MicrosoftDocs/v-gmoor-fix-pr-5433
Corrections to layout/markup
This commit is contained in:
commit
102e080701
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Configure S/MIME for Windows 10
|
title: Configure S/MIME for Windows 10
|
||||||
description: S/MIME lets users encrypt outgoing messages and attachments so that only intended recipients with a digital ID, aka a certificate, can read them.
|
description: S/MIME lets users encrypt outgoing messages and attachments so that only intended recipients with a digital ID, also known as a certificate, can read them.
|
||||||
ms.assetid: 7F9C2A99-42EB-4BCC-BB53-41C04FBBBF05
|
ms.assetid: 7F9C2A99-42EB-4BCC-BB53-41C04FBBBF05
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
keywords: encrypt, digital signature
|
keywords: encrypt, digital signature
|
||||||
@ -47,32 +47,37 @@ A digitally signed message reassures the recipient that the message hasn't been
|
|||||||
## Choose S/MIME settings
|
## Choose S/MIME settings
|
||||||
|
|
||||||
On the device, perform the following steps: (add select certificate)
|
On the device, perform the following steps: (add select certificate)
|
||||||
|
|
||||||
1. Open the Mail app. (In Windows 10 Mobile, the app is Outlook Mail.)
|
1. Open the Mail app. (In Windows 10 Mobile, the app is Outlook Mail.)
|
||||||
|
|
||||||
2. Open **Settings** by tapping the gear icon on a PC, or the ellipsis (...) and then the gear icon on a phone.
|
2. Open **Settings** by tapping the gear icon on a PC, or the ellipsis (...) and then the gear icon on a phone.
|
||||||
|
|
||||||

|
:::image type="content" alt-text="settings icon in mail app" source="images/mailsettings.png":::
|
||||||
|
|
||||||
3. Tap **Email security**.
|
3. Tap **Email security**.
|
||||||
|
|
||||||

|
:::image type="content" alt-text="email security settings" source="images/emailsecurity.png":::
|
||||||
|
|
||||||
4. In **Select an account**, select the account for which you want to configure S/MIME options.
|
4. In **Select an account**, select the account for which you want to configure S/MIME options.
|
||||||
|
|
||||||
5. Make a certificate selection for digital signature and encryption.
|
5. Make a certificate selection for digital signature and encryption.
|
||||||
|
|
||||||
- Select **Automatically** to let the app choose the certificate.
|
- Select **Automatically** to let the app choose the certificate.
|
||||||
- Select **Manually** to specify the certificate yourself from the list of valid certificates on the device.
|
- Select **Manually** to specify the certificate yourself from the list of valid certificates on the device.
|
||||||
6. (Optional) Select **Always sign with S/MIME**, **Always encrypt with S/MIME**, or both, to automatically digitally sign or encrypt all outgoing messages.
|
6. (Optional) Select **Always sign with S/MIME**, **Always encrypt with S/MIME**, or both, to automatically digitally sign or encrypt all outgoing messages.
|
||||||
|
|
||||||
>**Note:** The option to sign or encrypt can be changed for individual messages, unless EAS policies prevent it.
|
> [!NOTE]
|
||||||
|
> The option to sign or encrypt can be changed for individual messages, unless EAS policies prevent it.
|
||||||
|
|
||||||
7. Tap the back arrow.
|
7. Tap the back arrow.
|
||||||
|
|
||||||
## Encrypt or sign individual messages
|
## Encrypt or sign individual messages
|
||||||
|
|
||||||
1. While composing a message, choose **Options** from the ribbon. On phone, **Options** can be accessed by tapping the ellipsis (...).
|
1. While composing a message, choose **Options** from the ribbon. On phone, **Options** can be accessed by tapping the ellipsis (...).
|
||||||
|
|
||||||
2. Use **Sign** and **Encrypt** icons to turn on digital signature and encryption for this message.
|
2. Use **Sign** and **Encrypt** icons to turn on digital signature and encryption for this message.
|
||||||
|
|
||||||

|
:::image type="content" alt-text="sign or encrypt message" source="images/signencrypt.png":::
|
||||||
|
|
||||||
## Read signed or encrypted messages
|
## Read signed or encrypted messages
|
||||||
|
|
||||||
@ -83,9 +88,10 @@ When you receive an encrypted message, the mail app will check whether there is
|
|||||||
When you receive a signed email, the app provide feature to install corresponding encryption certificate on your device if the certificate is available. This certificate can then be used to send encrypted email to this person.
|
When you receive a signed email, the app provide feature to install corresponding encryption certificate on your device if the certificate is available. This certificate can then be used to send encrypted email to this person.
|
||||||
|
|
||||||
1. Open a signed email.
|
1. Open a signed email.
|
||||||
|
|
||||||
2. Tap or click the digital signature icon in the reading pane.
|
2. Tap or click the digital signature icon in the reading pane.
|
||||||
|
|
||||||
3. Tap **Install.**
|
3. Tap **Install.**
|
||||||
|
|
||||||

|
:::image type="content" alt-text="message security information" source="images/installcert.png":::
|
||||||
|
|
||||||
|
|
@ -67,10 +67,12 @@ This table includes all available attributes/elements for the **Log** element. T
|
|||||||
|Application |String |The AppLocker identity for the app where the audit event happened. |
|
|Application |String |The AppLocker identity for the app where the audit event happened. |
|
||||||
|
|
||||||
### Examples
|
### Examples
|
||||||
|
|
||||||
Here are a few examples of responses from the Reporting CSP.
|
Here are a few examples of responses from the Reporting CSP.
|
||||||
|
|
||||||
#### File ownership on a file is changed from work to personal
|
#### File ownership on a file is changed from work to personal
|
||||||
```
|
|
||||||
|
```xml
|
||||||
<SyncML><SyncHdr/><SyncBody><Status><CmdID>1</CmdID><MsgRef>1</MsgRef><CmdRef>0</CmdRef><Cmd>SyncHdr</Cmd><Data>200</Data></Status><Status><CmdID>2</CmdID><MsgRef>1</MsgRef><CmdRef>2</CmdRef><Cmd>Replace</Cmd><Data>200</Data></Status><Status><CmdID>3</CmdID><MsgRef>1</MsgRef><CmdRef>4</CmdRef><Cmd>Get</Cmd><Data>200</Data></Status><Results><CmdID>4</CmdID><MsgRef>1</MsgRef><CmdRef>4</CmdRef><Item><Source><LocURI>./Vendor/MSFT/Reporting/EnterpriseDataProtection/RetrieveByTimeRange/Logs</LocURI></Source><Meta><Format xmlns="syncml:metinf">xml</Format></Meta><Data><?xml version="1.0" encoding="utf-8"?>
|
<SyncML><SyncHdr/><SyncBody><Status><CmdID>1</CmdID><MsgRef>1</MsgRef><CmdRef>0</CmdRef><Cmd>SyncHdr</Cmd><Data>200</Data></Status><Status><CmdID>2</CmdID><MsgRef>1</MsgRef><CmdRef>2</CmdRef><Cmd>Replace</Cmd><Data>200</Data></Status><Status><CmdID>3</CmdID><MsgRef>1</MsgRef><CmdRef>4</CmdRef><Cmd>Get</Cmd><Data>200</Data></Status><Results><CmdID>4</CmdID><MsgRef>1</MsgRef><CmdRef>4</CmdRef><Item><Source><LocURI>./Vendor/MSFT/Reporting/EnterpriseDataProtection/RetrieveByTimeRange/Logs</LocURI></Source><Meta><Format xmlns="syncml:metinf">xml</Format></Meta><Data><?xml version="1.0" encoding="utf-8"?>
|
||||||
<Reporting Version="com.contoso/2.0/MDM/Reporting">
|
<Reporting Version="com.contoso/2.0/MDM/Reporting">
|
||||||
<User UserID="S-1-12-1-1111111111-1111111111-1111111111-1111111111" EnterpriseID="corp.contoso.com">
|
<User UserID="S-1-12-1-1111111111-1111111111-1111111111-1111111111" EnterpriseID="corp.contoso.com">
|
||||||
@ -84,7 +86,8 @@ Here are a few examples of responses from the Reporting CSP.
|
|||||||
```
|
```
|
||||||
|
|
||||||
#### A work file is uploaded to a personal webpage in Edge
|
#### A work file is uploaded to a personal webpage in Edge
|
||||||
```
|
|
||||||
|
```xml
|
||||||
<SyncML><SyncHdr/><SyncBody><Status><CmdID>1</CmdID><MsgRef>1</MsgRef><CmdRef>0</CmdRef><Cmd>SyncHdr</Cmd><Data>200</Data></Status><Status><CmdID>2</CmdID><MsgRef>1</MsgRef><CmdRef>2</CmdRef><Cmd>Replace</Cmd><Data>200</Data></Status><Status><CmdID>3</CmdID><MsgRef>1</MsgRef><CmdRef>4</CmdRef><Cmd>Get</Cmd><Data>200</Data></Status><Results><CmdID>4</CmdID><MsgRef>1</MsgRef><CmdRef>4</CmdRef><Item><Source><LocURI>./Vendor/MSFT/Reporting/EnterpriseDataProtection/RetrieveByTimeRange/Logs</LocURI></Source><Meta><Format xmlns="syncml:metinf">xml</Format></Meta><Data><?xml version="1.0" encoding="utf-8"?>
|
<SyncML><SyncHdr/><SyncBody><Status><CmdID>1</CmdID><MsgRef>1</MsgRef><CmdRef>0</CmdRef><Cmd>SyncHdr</Cmd><Data>200</Data></Status><Status><CmdID>2</CmdID><MsgRef>1</MsgRef><CmdRef>2</CmdRef><Cmd>Replace</Cmd><Data>200</Data></Status><Status><CmdID>3</CmdID><MsgRef>1</MsgRef><CmdRef>4</CmdRef><Cmd>Get</Cmd><Data>200</Data></Status><Results><CmdID>4</CmdID><MsgRef>1</MsgRef><CmdRef>4</CmdRef><Item><Source><LocURI>./Vendor/MSFT/Reporting/EnterpriseDataProtection/RetrieveByTimeRange/Logs</LocURI></Source><Meta><Format xmlns="syncml:metinf">xml</Format></Meta><Data><?xml version="1.0" encoding="utf-8"?>
|
||||||
<Reporting Version="com.contoso/2.0/MDM/Reporting">
|
<Reporting Version="com.contoso/2.0/MDM/Reporting">
|
||||||
<User UserID="S-1-12-1-1111111111-1111111111-1111111111-1111111111" EnterpriseID="corp.contoso.com">
|
<User UserID="S-1-12-1-1111111111-1111111111-1111111111-1111111111" EnterpriseID="corp.contoso.com">
|
||||||
@ -101,7 +104,8 @@ Here are a few examples of responses from the Reporting CSP.
|
|||||||
```
|
```
|
||||||
|
|
||||||
#### Work data is pasted into a personal webpage
|
#### Work data is pasted into a personal webpage
|
||||||
```
|
|
||||||
|
```xml
|
||||||
<SyncML><SyncHdr/><SyncBody><Status><CmdID>1</CmdID><MsgRef>1</MsgRef><CmdRef>0</CmdRef><Cmd>SyncHdr</Cmd><Data>200</Data></Status><Status><CmdID>2</CmdID><MsgRef>1</MsgRef><CmdRef>2</CmdRef><Cmd>Replace</Cmd><Data>200</Data></Status><Status><CmdID>3</CmdID><MsgRef>1</MsgRef><CmdRef>4</CmdRef><Cmd>Get</Cmd><Data>200</Data></Status><Results><CmdID>4</CmdID><MsgRef>1</MsgRef><CmdRef>4</CmdRef><Item><Source><LocURI>./Vendor/MSFT/Reporting/EnterpriseDataProtection/RetrieveByTimeRange/Logs</LocURI></Source><Meta><Format xmlns="syncml:metinf">xml</Format></Meta><Data><?xml version="1.0" encoding="utf-8"?>
|
<SyncML><SyncHdr/><SyncBody><Status><CmdID>1</CmdID><MsgRef>1</MsgRef><CmdRef>0</CmdRef><Cmd>SyncHdr</Cmd><Data>200</Data></Status><Status><CmdID>2</CmdID><MsgRef>1</MsgRef><CmdRef>2</CmdRef><Cmd>Replace</Cmd><Data>200</Data></Status><Status><CmdID>3</CmdID><MsgRef>1</MsgRef><CmdRef>4</CmdRef><Cmd>Get</Cmd><Data>200</Data></Status><Results><CmdID>4</CmdID><MsgRef>1</MsgRef><CmdRef>4</CmdRef><Item><Source><LocURI>./Vendor/MSFT/Reporting/EnterpriseDataProtection/RetrieveByTimeRange/Logs</LocURI></Source><Meta><Format xmlns="syncml:metinf">xml</Format></Meta><Data><?xml version="1.0" encoding="utf-8"?>
|
||||||
<Reporting Version="com.contoso/2.0/MDM/Reporting">
|
<Reporting Version="com.contoso/2.0/MDM/Reporting">
|
||||||
<User UserID="S-1-12-1-1111111111-1111111111-1111111111-1111111111" EnterpriseID="corp.contoso.com">
|
<User UserID="S-1-12-1-1111111111-1111111111-1111111111-1111111111" EnterpriseID="corp.contoso.com">
|
||||||
@ -118,7 +122,8 @@ Here are a few examples of responses from the Reporting CSP.
|
|||||||
```
|
```
|
||||||
|
|
||||||
#### A work file is opened with a personal application
|
#### A work file is opened with a personal application
|
||||||
```
|
|
||||||
|
```xml
|
||||||
<SyncML><SyncHdr/><SyncBody><Status><CmdID>1</CmdID><MsgRef>1</MsgRef><CmdRef>0</CmdRef><Cmd>SyncHdr</Cmd><Data>200</Data></Status><Status><CmdID>2</CmdID><MsgRef>1</MsgRef><CmdRef>2</CmdRef><Cmd>Replace</Cmd><Data>200</Data></Status><Status><CmdID>3</CmdID><MsgRef>1</MsgRef><CmdRef>4</CmdRef><Cmd>Get</Cmd><Data>200</Data></Status><Results><CmdID>4</CmdID><MsgRef>1</MsgRef><CmdRef>4</CmdRef><Item><Source><LocURI>./Vendor/MSFT/Reporting/EnterpriseDataProtection/RetrieveByTimeRange/Logs</LocURI></Source><Meta><Format xmlns="syncml:metinf">xml</Format></Meta><Data><?xml version="1.0" encoding="utf-8"?>
|
<SyncML><SyncHdr/><SyncBody><Status><CmdID>1</CmdID><MsgRef>1</MsgRef><CmdRef>0</CmdRef><Cmd>SyncHdr</Cmd><Data>200</Data></Status><Status><CmdID>2</CmdID><MsgRef>1</MsgRef><CmdRef>2</CmdRef><Cmd>Replace</Cmd><Data>200</Data></Status><Status><CmdID>3</CmdID><MsgRef>1</MsgRef><CmdRef>4</CmdRef><Cmd>Get</Cmd><Data>200</Data></Status><Results><CmdID>4</CmdID><MsgRef>1</MsgRef><CmdRef>4</CmdRef><Item><Source><LocURI>./Vendor/MSFT/Reporting/EnterpriseDataProtection/RetrieveByTimeRange/Logs</LocURI></Source><Meta><Format xmlns="syncml:metinf">xml</Format></Meta><Data><?xml version="1.0" encoding="utf-8"?>
|
||||||
<Reporting Version="com.contoso/2.0/MDM/Reporting">
|
<Reporting Version="com.contoso/2.0/MDM/Reporting">
|
||||||
<User UserID="S-1-12-1-1111111111-1111111111-1111111111-1111111111" EnterpriseID="corp.contoso.com">
|
<User UserID="S-1-12-1-1111111111-1111111111-1111111111-1111111111" EnterpriseID="corp.contoso.com">
|
||||||
@ -137,7 +142,8 @@ Here are a few examples of responses from the Reporting CSP.
|
|||||||
```
|
```
|
||||||
|
|
||||||
#### Work data is pasted into a personal application
|
#### Work data is pasted into a personal application
|
||||||
```
|
|
||||||
|
```xml
|
||||||
<SyncML><SyncHdr/><SyncBody><Status><CmdID>1</CmdID><MsgRef>1</MsgRef><CmdRef>0</CmdRef><Cmd>SyncHdr</Cmd><Data>200</Data></Status><Status><CmdID>2</CmdID><MsgRef>1</MsgRef><CmdRef>2</CmdRef><Cmd>Replace</Cmd><Data>200</Data></Status><Status><CmdID>3</CmdID><MsgRef>1</MsgRef><CmdRef>4</CmdRef><Cmd>Get</Cmd><Data>200</Data></Status><Results><CmdID>4</CmdID><MsgRef>1</MsgRef><CmdRef>4</CmdRef><Item><Source><LocURI>./Vendor/MSFT/Reporting/EnterpriseDataProtection/RetrieveByTimeRange/Logs</LocURI></Source><Meta><Format xmlns="syncml:metinf">xml</Format></Meta><Data><?xml version="1.0" encoding="utf-8"?>
|
<SyncML><SyncHdr/><SyncBody><Status><CmdID>1</CmdID><MsgRef>1</MsgRef><CmdRef>0</CmdRef><Cmd>SyncHdr</Cmd><Data>200</Data></Status><Status><CmdID>2</CmdID><MsgRef>1</MsgRef><CmdRef>2</CmdRef><Cmd>Replace</Cmd><Data>200</Data></Status><Status><CmdID>3</CmdID><MsgRef>1</MsgRef><CmdRef>4</CmdRef><Cmd>Get</Cmd><Data>200</Data></Status><Results><CmdID>4</CmdID><MsgRef>1</MsgRef><CmdRef>4</CmdRef><Item><Source><LocURI>./Vendor/MSFT/Reporting/EnterpriseDataProtection/RetrieveByTimeRange/Logs</LocURI></Source><Meta><Format xmlns="syncml:metinf">xml</Format></Meta><Data><?xml version="1.0" encoding="utf-8"?>
|
||||||
<Reporting Version="com.contoso/2.0/MDM/Reporting">
|
<Reporting Version="com.contoso/2.0/MDM/Reporting">
|
||||||
<User UserID="S-1-12-1-1111111111-1111111111-1111111111-1111111111" EnterpriseID="corp.contoso.com">
|
<User UserID="S-1-12-1-1111111111-1111111111-1111111111-1111111111" EnterpriseID="corp.contoso.com">
|
||||||
@ -154,22 +160,26 @@ Here are a few examples of responses from the Reporting CSP.
|
|||||||
```
|
```
|
||||||
|
|
||||||
## Collect WIP audit logs by using Windows Event Forwarding (for Windows desktop domain-joined devices only)
|
## Collect WIP audit logs by using Windows Event Forwarding (for Windows desktop domain-joined devices only)
|
||||||
|
|
||||||
Use Windows Event Forwarding to collect and aggregate your WIP audit events. You can view your audit events in the Event Viewer.
|
Use Windows Event Forwarding to collect and aggregate your WIP audit events. You can view your audit events in the Event Viewer.
|
||||||
|
|
||||||
**To view the WIP events in the Event Viewer**
|
**To view the WIP events in the Event Viewer**
|
||||||
|
|
||||||
1. Open Event Viewer.
|
1. Open Event Viewer.
|
||||||
|
|
||||||
2. In the console tree under **Application and Services Logs\Microsoft\Windows**, click **EDP-Audit-Regular** and **EDP-Audit-TCB**.
|
2. In the console tree under **Application and Services Logs\Microsoft\Windows**, click **EDP-Audit-Regular** and **EDP-Audit-TCB**.
|
||||||
|
|
||||||
## Collect WIP audit logs using Azure Monitor
|
## Collect WIP audit logs using Azure Monitor
|
||||||
|
|
||||||
You can collect audit logs using Azure Monitor. See [Windows event log data sources in Azure Monitor.]()
|
You can collect audit logs using Azure Monitor. See [Windows event log data sources in Azure Monitor.]()
|
||||||
|
|
||||||
**To view the WIP events in Azure Monitor**
|
**To view the WIP events in Azure Monitor**
|
||||||
|
|
||||||
1. Use an existing or create a new Log Analytics workspace.
|
1. Use an existing or create a new Log Analytics workspace.
|
||||||
|
|
||||||
2. In **Log Analytics** > **Advanced Settings**, select **Data**. In Windows Event Logs, add logs to receive:
|
2. In **Log Analytics** > **Advanced Settings**, select **Data**. In Windows Event Logs, add logs to receive:
|
||||||
|
|
||||||
```
|
```console
|
||||||
Microsoft-Windows-EDP-Application-Learning/Admin
|
Microsoft-Windows-EDP-Application-Learning/Admin
|
||||||
Microsoft-Windows-EDP-Audit-TCB/Admin
|
Microsoft-Windows-EDP-Audit-TCB/Admin
|
||||||
```
|
```
|
||||||
@ -178,22 +188,24 @@ You can collect audit logs using Azure Monitor. See [Windows event log data sour
|
|||||||
|
|
||||||
3. Download Microsoft [Monitoring Agent](/azure/azure-monitor/platform/agent-windows#install-the-agent-using-dsc-in-azure-automation).
|
3. Download Microsoft [Monitoring Agent](/azure/azure-monitor/platform/agent-windows#install-the-agent-using-dsc-in-azure-automation).
|
||||||
|
|
||||||
4. To get MSI for Intune installation as stated in the Azure Monitor article, extract: MMASetup-.exe /c /t:
|
4. To get MSI for Intune installation as stated in the Azure Monitor article, extract: `MMASetup-.exe /c /t:`
|
||||||
Install Microsoft Monitoring Agent to WIP devices using Workspace ID and Primary key. More information on Workspace ID and Primary key can be found in **Log Analytics** > **Advanced Settings**.
|
|
||||||
|
|
||||||
5. To deploy MSI via Intune, in installation parameters add: /q /norestart NOAPM=1 ADD_OPINSIGHTS_WORKSPACE=1 OPINSIGHTS_WORKSPACE_AZURE_CLOUD_TYPE=0 OPINSIGHTS_WORKSPACE_ID=<WORKSPACE_ID> OPINSIGHTS_WORKSPACE_KEY=<WORKSPACE_KEY> AcceptEndUserLicenseAgreement=1
|
Install Microsoft Monitoring Agent to WIP devices using Workspace ID and Primary key. More information on Workspace ID and Primary key can be found in **Log Analytics** > **Advanced Settings**.
|
||||||
|
|
||||||
>[!NOTE]
|
5. To deploy MSI via Intune, in installation parameters add: `/q /norestart NOAPM=1 ADD_OPINSIGHTS_WORKSPACE=1 OPINSIGHTS_WORKSPACE_AZURE_CLOUD_TYPE=0 OPINSIGHTS_WORKSPACE_ID=<WORKSPACE_ID> OPINSIGHTS_WORKSPACE_KEY=<WORKSPACE_KEY> AcceptEndUserLicenseAgreement=1`
|
||||||
>Replace <WORKSPACE_ID> & <WORKSPACE_KEY> received from step 5. In installation parameters, don't place <WORKSPACE_ID> & <WORKSPACE_KEY> in quotes ("" or '').
|
|
||||||
|
>[!NOTE]
|
||||||
|
>Replace <WORKSPACE_ID> & <WORKSPACE_KEY> received from step 5. In installation parameters, don't place <WORKSPACE_ID> & <WORKSPACE_KEY> in quotes ("" or '').
|
||||||
|
|
||||||
6. After the agent is deployed, data will be received within approximately 10 minutes.
|
6. After the agent is deployed, data will be received within approximately 10 minutes.
|
||||||
|
|
||||||
7. To search for logs, go to **Log Analytics workspace** > **Logs**, and type **Event** in search.
|
7. To search for logs, go to **Log Analytics workspace** > **Logs**, and type **Event** in search.
|
||||||
|
|
||||||
***Example***
|
***Example***
|
||||||
```
|
|
||||||
Event | where EventLog == "Microsoft-Windows-EDP-Audit-TCB/Admin"
|
```console
|
||||||
```
|
Event | where EventLog == "Microsoft-Windows-EDP-Audit-TCB/Admin"
|
||||||
|
```
|
||||||
|
|
||||||
## Additional resources
|
## Additional resources
|
||||||
- [How to deploy app via Intune](/intune/apps-add)
|
- [How to deploy app via Intune](/intune/apps-add)
|
||||||
|
@ -47,8 +47,8 @@ If you don't already have an EFS DRA certificate, you'll need to create and extr
|
|||||||
|
|
||||||
4. Add your EFS DRA certificate to your WIP policy using a deployment tool, such as [Microsoft Intune](create-wip-policy-using-intune-azure.md) or [Microsoft Endpoint Configuration Manager](create-wip-policy-using-configmgr.md).
|
4. Add your EFS DRA certificate to your WIP policy using a deployment tool, such as [Microsoft Intune](create-wip-policy-using-intune-azure.md) or [Microsoft Endpoint Configuration Manager](create-wip-policy-using-configmgr.md).
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> This certificate can be used in Intune for policies both _with_ device enrollment (MDM) and _without_ device enrollment (MAM).
|
> This certificate can be used in Intune for policies both _with_ device enrollment (MDM) and _without_ device enrollment (MAM).
|
||||||
|
|
||||||
## Verify your data recovery certificate is correctly set up on a WIP client computer
|
## Verify your data recovery certificate is correctly set up on a WIP client computer
|
||||||
|
|
||||||
|
@ -103,7 +103,7 @@ If you don't know the publisher or product name, you can find them for both desk
|
|||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
>
|
>
|
||||||
> If your app is already installed on desktop devices, you can use the AppLocker local security policy MMC snap-in to gather the info for adding the app to the protected apps list. For info about how to do this, see the steps in the [Add an AppLocker policy file](#add-an-applocker-policy-file) section.
|
> If your app is already installed on desktop devices, you can use the AppLocker local security policy MMC snap-in to gather the info for adding the app to the protected apps list. For info about how to do this, see the steps in [Add an AppLocker policy file](#add-an-applocker-policy-file) in this article.
|
||||||
|
|
||||||
2. Copy the ID value from the app URL. For example, Microsoft OneNote's ID URL is https://www.microsoft.com/store/apps/onenote/9wzdncrfhvjl, and you'd copy the ID value, `9wzdncrfhvjl`.
|
2. Copy the ID value from the app URL. For example, Microsoft OneNote's ID URL is https://www.microsoft.com/store/apps/onenote/9wzdncrfhvjl, and you'd copy the ID value, `9wzdncrfhvjl`.
|
||||||
|
|
||||||
@ -111,27 +111,32 @@ If you don't know the publisher or product name, you can find them for both desk
|
|||||||
|
|
||||||
The API runs and opens a text editor with the app details.
|
The API runs and opens a text editor with the app details.
|
||||||
|
|
||||||
``` json
|
```json
|
||||||
{
|
{
|
||||||
"packageIdentityName": "Microsoft.Office.OneNote",
|
"packageIdentityName": "Microsoft.Office.OneNote",
|
||||||
"publisherCertificateName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US"
|
"publisherCertificateName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US"
|
||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
4. Copy the `publisherCertificateName` value and paste them into the **Publisher Name** box, copy the `packageIdentityName` value into the **Product Name** box of Intune.
|
4. Copy the `publisherCertificateName` value and paste them into the **Publisher Name** box, copy the `packageIdentityName` value into the **Product Name** box of Intune.
|
||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> The JSON file might also return a `windowsPhoneLegacyId` value for both the **Publisher Name** and **Product Name** boxes. This means that you have an app that's using a XAP package and that you must set the **Product Name** as `windowsPhoneLegacyId`, and set the **Publisher Name** as "CN=" followed by the `windowsPhoneLegacyId`.<p>For example:<p>
|
> The JSON file might also return a `windowsPhoneLegacyId` value for both the **Publisher Name** and **Product Name** boxes. This means that you have an app that's using a XAP package and that you must set the **Product Name** as `windowsPhoneLegacyId`, and set the **Publisher Name** as "CN=" followed by the `windowsPhoneLegacyId`.
|
||||||
|
>
|
||||||
|
> For example:
|
||||||
|
>
|
||||||
> ```json
|
> ```json
|
||||||
> {
|
> {
|
||||||
> "windowsPhoneLegacyId": "ca05b3ab-f157-450c-8c49-a1f127f5e71d",
|
> "windowsPhoneLegacyId": "ca05b3ab-f157-450c-8c49-a1f127f5e71d",
|
||||||
> }
|
> }
|
||||||
> ```
|
> ```
|
||||||
|
|
||||||
### Add a desktop app rule to your policy
|
### Add a desktop app rule to your policy
|
||||||
|
|
||||||
For this example, we're going to add Internet Explorer, a desktop app, to the **App Rules** list.
|
For this example, we're going to add Internet Explorer, a desktop app, to the **App Rules** list.
|
||||||
|
|
||||||
**To add a desktop app to your policy**
|
**To add a desktop app to your policy**
|
||||||
|
|
||||||
1. From the **App rules** area, click **Add**.
|
1. From the **App rules** area, click **Add**.
|
||||||
|
|
||||||
The **Add app rule** box appears.
|
The **Add app rule** box appears.
|
||||||
@ -187,24 +192,28 @@ For this example, we're going to add Internet Explorer, a desktop app, to the **
|
|||||||
|
|
||||||
If you're unsure about what to include for the publisher, you can run this PowerShell command:
|
If you're unsure about what to include for the publisher, you can run this PowerShell command:
|
||||||
|
|
||||||
```ps1
|
```powershell
|
||||||
Get-AppLockerFileInformation -Path "<path of the exe>"
|
Get-AppLockerFileInformation -Path "<path of the exe>"
|
||||||
```
|
```
|
||||||
|
|
||||||
Where `"<path of the exe>"` goes to the location of the app on the device. For example, `Get-AppLockerFileInformation -Path "C:\Program Files\Internet Explorer\iexplore.exe"`.
|
Where `"<path of the exe>"` goes to the location of the app on the device. For example, `Get-AppLockerFileInformation -Path "C:\Program Files\Internet Explorer\iexplore.exe"`.
|
||||||
|
|
||||||
In this example, you'd get the following info:
|
In this example, you'd get the following info:
|
||||||
|
|
||||||
``` json
|
```console
|
||||||
Path Publisher
|
Path Publisher
|
||||||
---- ---------
|
---- ---------
|
||||||
%PROGRAMFILES%\INTERNET EXPLORER\IEXPLORE.EXE O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US\INTERNET EXPLOR...
|
%PROGRAMFILES%\INTERNET EXPLORER\IEXPLORE.EXE O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US\INTERNET EXPLOR...
|
||||||
```
|
```
|
||||||
|
|
||||||
Where the text, `O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US` is the publisher name to enter in the **Publisher Name** box.
|
Where the text, `O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US` is the publisher name to enter in the **Publisher Name** box.
|
||||||
|
|
||||||
### Add an AppLocker policy file
|
### Add an AppLocker policy file
|
||||||
|
|
||||||
For this example, we're going to add an AppLocker XML file to the **App Rules** list. You'll use this option if you want to add multiple apps at the same time. For more info about AppLocker, see the [AppLocker](../../threat-protection/windows-defender-application-control/applocker/applocker-overview.md) content.
|
For this example, we're going to add an AppLocker XML file to the **App Rules** list. You'll use this option if you want to add multiple apps at the same time. For more info about AppLocker, see the [AppLocker](../../threat-protection/windows-defender-application-control/applocker/applocker-overview.md) content.
|
||||||
|
|
||||||
**To create an app rule and xml file using the AppLocker tool**
|
**To create an app rule and xml file using the AppLocker tool**
|
||||||
|
|
||||||
1. Open the Local Security Policy snap-in (SecPol.msc).
|
1. Open the Local Security Policy snap-in (SecPol.msc).
|
||||||
|
|
||||||
2. In the left pane, expand **Application Control Policies**, expand **AppLocker**, and then click **Packaged App Rules**.
|
2. In the left pane, expand **Application Control Policies**, expand **AppLocker**, and then click **Packaged App Rules**.
|
||||||
@ -306,7 +315,7 @@ If you're running into compatibility issues where your app is incompatible with
|
|||||||
|
|
||||||
3. Click **Exempt** from the **Windows Information Protection mode** drop-down list.
|
3. Click **Exempt** from the **Windows Information Protection mode** drop-down list.
|
||||||
|
|
||||||
Be aware that when you exempt apps, they're allowed to bypass the WIP restrictions and access your corporate data. To allow apps, see the [Add app rules to your policy](#add-app-rules-to-your-policy) section of this topic.
|
Be aware that when you exempt apps, they're allowed to bypass the WIP restrictions and access your corporate data. To allow apps, see [Add app rules to your policy](#add-app-rules-to-your-policy) in this article.
|
||||||
|
|
||||||
4. Fill out the rest of the app rule info, based on the type of rule you're adding:
|
4. Fill out the rest of the app rule info, based on the type of rule you're adding:
|
||||||
|
|
||||||
@ -333,7 +342,7 @@ We recommend that you start with **Silent** or **Override** while verifying with
|
|||||||
|Silent |WIP runs silently, logging inappropriate data sharing, without blocking anything that would've been prompted for employee interaction while in Override mode. Unallowed actions, like apps inappropriately trying to access a network resource or WIP-protected data, are still blocked.|
|
|Silent |WIP runs silently, logging inappropriate data sharing, without blocking anything that would've been prompted for employee interaction while in Override mode. Unallowed actions, like apps inappropriately trying to access a network resource or WIP-protected data, are still blocked.|
|
||||||
|Off (not recommended) |WIP is turned off and doesn't help to protect or audit your data.<p>After you turn off WIP, an attempt is made to decrypt any WIP-tagged files on the locally attached drives. Be aware that your previous decryption and policy info isn't automatically reapplied if you turn WIP protection back on.|
|
|Off (not recommended) |WIP is turned off and doesn't help to protect or audit your data.<p>After you turn off WIP, an attempt is made to decrypt any WIP-tagged files on the locally attached drives. Be aware that your previous decryption and policy info isn't automatically reapplied if you turn WIP protection back on.|
|
||||||
|
|
||||||

|
:::image type="content" alt-text="Create Configuration Item wizard, choose your WIP-protection level" source="images/wip-configmgr-appmgmt.png":::
|
||||||
|
|
||||||
## Define your enterprise-managed identity domains
|
## Define your enterprise-managed identity domains
|
||||||
Corporate identity, usually expressed as your primary internet domain (for example, contoso.com), helps to identify and tag your corporate data from apps you've marked as protected by WIP. For example, emails using contoso.com are identified as being corporate and are restricted by your Windows Information Protection policies.
|
Corporate identity, usually expressed as your primary internet domain (for example, contoso.com), helps to identify and tag your corporate data from apps you've marked as protected by WIP. For example, emails using contoso.com are identified as being corporate and are restricted by your Windows Information Protection policies.
|
||||||
@ -412,7 +421,7 @@ There are no default locations included with WIP, you must add each of your netw
|
|||||||
|
|
||||||
4. Decide if you want to Windows to look for additional network settings and if you want to show the WIP icon on your corporate files while in File Explorer.
|
4. Decide if you want to Windows to look for additional network settings and if you want to show the WIP icon on your corporate files while in File Explorer.
|
||||||
|
|
||||||

|
:::image type="content" alt-text="Create Configuration Item wizard, Add whether to search for additional network settings" source="images/wip-configmgr-optsettings.png":::
|
||||||
|
|
||||||
- **Enterprise Proxy Servers list is authoritative (do not auto-detect).** Click this box if you want Windows to treat the proxy servers you specified in the network boundary definition as the complete list of proxy servers available on your network. If you clear this box, Windows will search for additional proxy servers in your immediate network. Not configured is the default option.
|
- **Enterprise Proxy Servers list is authoritative (do not auto-detect).** Click this box if you want Windows to treat the proxy servers you specified in the network boundary definition as the complete list of proxy servers available on your network. If you clear this box, Windows will search for additional proxy servers in your immediate network. Not configured is the default option.
|
||||||
|
|
||||||
@ -426,7 +435,7 @@ There are no default locations included with WIP, you must add each of your netw
|
|||||||
|
|
||||||
After you create and deploy your WIP policy to your employees, Windows will begin to encrypt your corporate data on the employees' local device drive. If somehow the employees' local encryption keys get lost or revoked, the encrypted data can become unrecoverable. To help avoid this possibility, the DRA certificate lets Windows use an included public key to encrypt the local data, while you maintain the private key that can unencrypt the data.
|
After you create and deploy your WIP policy to your employees, Windows will begin to encrypt your corporate data on the employees' local device drive. If somehow the employees' local encryption keys get lost or revoked, the encrypted data can become unrecoverable. To help avoid this possibility, the DRA certificate lets Windows use an included public key to encrypt the local data, while you maintain the private key that can unencrypt the data.
|
||||||
|
|
||||||
For more info about how to find and export your data recovery certificate, see the [Data Recovery and Encrypting File System (EFS)](/previous-versions/tn-archive/cc512680(v=technet.10)) topic. For more info about creating and verifying your EFS DRA certificate, see the [Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate](create-and-verify-an-efs-dra-certificate.md).
|
For more info about how to find and export your data recovery certificate, see [Data Recovery and Encrypting File System (EFS)](/previous-versions/tn-archive/cc512680(v=technet.10)). For more info about creating and verifying your EFS DRA certificate, see [Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate](create-and-verify-an-efs-dra-certificate.md).
|
||||||
|
|
||||||
## Choose your optional WIP-related settings
|
## Choose your optional WIP-related settings
|
||||||
After you've decided where your protected apps can access enterprise data on your network, you'll be asked to decide if you want to add any optional WIP settings.
|
After you've decided where your protected apps can access enterprise data on your network, you'll be asked to decide if you want to add any optional WIP settings.
|
||||||
|
@ -45,7 +45,9 @@ Before you can create a WIP policy using Intune, you need to configure an MDM or
|
|||||||
## Configure the MDM or MAM provider
|
## Configure the MDM or MAM provider
|
||||||
|
|
||||||
1. Sign in to the Azure portal.
|
1. Sign in to the Azure portal.
|
||||||
|
|
||||||
2. Click **Azure Active Directory** > **Mobility (MDM and MAM)** > **Microsoft Intune**.
|
2. Click **Azure Active Directory** > **Mobility (MDM and MAM)** > **Microsoft Intune**.
|
||||||
|
|
||||||
3. Click **Restore Default URLs** or enter the settings for MDM or MAM user scope and click **Save**:
|
3. Click **Restore Default URLs** or enter the settings for MDM or MAM user scope and click **Save**:
|
||||||
|
|
||||||

|

|
||||||
@ -112,17 +114,23 @@ If you don't know the Store app publisher or product name, you can find them by
|
|||||||
The API runs and opens a text editor with the app details.
|
The API runs and opens a text editor with the app details.
|
||||||
|
|
||||||
```json
|
```json
|
||||||
{
|
{
|
||||||
"packageIdentityName": "Microsoft.MicrosoftPowerBIForWindows",
|
"packageIdentityName": "Microsoft.MicrosoftPowerBIForWindows",
|
||||||
"publisherCertificateName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US"
|
"publisherCertificateName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US"
|
||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
4. Copy the `publisherCertificateName` value into the **Publisher** box and copy the `packageIdentityName` value into the **Name** box of Intune.
|
4. Copy the `publisherCertificateName` value into the **Publisher** box and copy the `packageIdentityName` value into the **Name** box of Intune.
|
||||||
|
|
||||||
>[!Important]
|
>[!Important]
|
||||||
>The JSON file might also return a `windowsPhoneLegacyId` value for both the **Publisher Name** and **Product Name** boxes. This means that you have an app that’s using a XAP package and that you must set the **Product Name** as `windowsPhoneLegacyId`, and set the **Publisher Name** as `CN=` followed by the `windowsPhoneLegacyId`.<br><br>For example:<br>
|
>The JSON file might also return a `windowsPhoneLegacyId` value for both the **Publisher Name** and **Product Name** boxes. This means that you have an app that’s using a XAP package and that you must set the **Product Name** as `windowsPhoneLegacyId`, and set the **Publisher Name** as `CN=` followed by the `windowsPhoneLegacyId`.
|
||||||
<code>{<br>"windowsPhoneLegacyId": "ca05b3ab-f157-450c-8c49-a1f127f5e71d",<br>}</code>
|
>
|
||||||
|
> For example:
|
||||||
|
>
|
||||||
|
> ```json
|
||||||
|
> {
|
||||||
|
> "windowsPhoneLegacyId": "ca05b3ab-f157-450c-8c49-a1f127f5e71d",
|
||||||
|
> }
|
||||||
|
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
@ -143,8 +151,14 @@ If you don't know the Store app publisher or product name, you can find them by
|
|||||||
8. Copy the `publisherCertificateName` value and paste it into the **Publisher Name** box and the `packageIdentityName` value into the **Product Name** box of Intune.
|
8. Copy the `publisherCertificateName` value and paste it into the **Publisher Name** box and the `packageIdentityName` value into the **Product Name** box of Intune.
|
||||||
|
|
||||||
>[!Important]
|
>[!Important]
|
||||||
>The JSON file might also return a `windowsPhoneLegacyId` value for both the **Publisher Name** and **Product Name** boxes. This means that you have an app that’s using a XAP package and that you must set the **Product Name** as `windowsPhoneLegacyId`, and set the **Publisher Name** as `CN=` followed by the `windowsPhoneLegacyId`.<br><br>For example:<br>
|
>The JSON file might also return a `windowsPhoneLegacyId` value for both the **Publisher Name** and **Product Name** boxes. This means that you have an app that’s using a XAP package and that you must set the **Product Name** as `windowsPhoneLegacyId`, and set the **Publisher Name** as `CN=` followed by the `windowsPhoneLegacyId`.
|
||||||
<code>{<br>"windowsPhoneLegacyId": "ca05b3ab-f157-450c-8c49-a1f127f5e71d",<br>}</code>
|
>
|
||||||
|
> For example:
|
||||||
|
>
|
||||||
|
> ```json
|
||||||
|
> {
|
||||||
|
> "windowsPhoneLegacyId": "ca05b3ab-f157-450c-8c49-a1f127f5e71d",
|
||||||
|
> }
|
||||||
|
|
||||||
### Add Desktop apps
|
### Add Desktop apps
|
||||||
|
|
||||||
@ -509,10 +523,10 @@ Classless Inter-Domain Routing (CIDR) notation isn’t supported.
|
|||||||
|
|
||||||
Separate multiple ranges with the "," delimiter.
|
Separate multiple ranges with the "," delimiter.
|
||||||
|
|
||||||
**Starting IPv4 Address:** 3.4.0.1
|
**Starting IPv4 Address:** 3.4.0.1<br/>
|
||||||
**Ending IPv4 Address:** 3.4.255.254
|
**Ending IPv4 Address:** 3.4.255.254<br/>
|
||||||
**Custom URI:** 3.4.0.1-3.4.255.254,
|
**Custom URI:** 3.4.0.1-3.4.255.254,<br/>
|
||||||
<br>10.0.0.1-10.255.255.254
|
10.0.0.1-10.255.255.254
|
||||||
|
|
||||||
### IPv6 ranges
|
### IPv6 ranges
|
||||||
|
|
||||||
@ -524,8 +538,8 @@ Classless Inter-Domain Routing (CIDR) notation isn’t supported.
|
|||||||
|
|
||||||
Separate multiple ranges with the "," delimiter.
|
Separate multiple ranges with the "," delimiter.
|
||||||
|
|
||||||
**Starting IPv6 Address:** 2a01:110::
|
**Starting IPv6 Address:** 2a01:110::<br/>
|
||||||
**Ending IPv6 Address:** 2a01:110:7fff:ffff:ffff:ffff:ffff:ffff
|
**Ending IPv6 Address:** 2a01:110:7fff:ffff:ffff:ffff:ffff:ffff<br/>
|
||||||
**Custom URI:** 2a01:110:7fff:ffff:ffff:ffff:ffff:ffff,<br>fd00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
|
**Custom URI:** 2a01:110:7fff:ffff:ffff:ffff:ffff:ffff,<br>fd00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
|
||||||
|
|
||||||
### Neutral resources
|
### Neutral resources
|
||||||
@ -550,7 +564,7 @@ Decide if you want Windows to look for additional network settings:
|
|||||||
After you create and deploy your WIP policy to your employees, Windows begins to encrypt your corporate data on the employees’ local device drive. If somehow the employees’ local encryption keys get lost or revoked, the encrypted data can become unrecoverable. To help avoid this possibility, the Data Recovery Agent (DRA) certificate lets Windows use an included public key to encrypt the local data while you maintain the private key that can unencrypt the data.
|
After you create and deploy your WIP policy to your employees, Windows begins to encrypt your corporate data on the employees’ local device drive. If somehow the employees’ local encryption keys get lost or revoked, the encrypted data can become unrecoverable. To help avoid this possibility, the Data Recovery Agent (DRA) certificate lets Windows use an included public key to encrypt the local data while you maintain the private key that can unencrypt the data.
|
||||||
|
|
||||||
>[!Important]
|
>[!Important]
|
||||||
>Using a DRA certificate isn’t mandatory. However, we strongly recommend it. For more info about how to find and export your data recovery certificate, see the [Data Recovery and Encrypting File System (EFS)](/previous-versions/tn-archive/cc512680(v=technet.10)) topic. For more info about creating and verifying your EFS DRA certificate, see the [Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate](/windows/threat-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate) topic.
|
>Using a DRA certificate isn’t mandatory. However, we strongly recommend it. For more info about how to find and export your data recovery certificate, see [Data Recovery and Encrypting File System (EFS)](/previous-versions/tn-archive/cc512680(v=technet.10)). For more info about creating and verifying your EFS DRA certificate, see [Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate](/windows/threat-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate).
|
||||||
|
|
||||||
**To upload your DRA certificate**
|
**To upload your DRA certificate**
|
||||||
1. From the **App policy** blade, click the name of your policy, and then click **Advanced settings** from the menu that appears.
|
1. From the **App policy** blade, click the name of your policy, and then click **Advanced settings** from the menu that appears.
|
||||||
|
@ -71,7 +71,7 @@ This table provides info about the most common problems you might encounter whil
|
|||||||
<td>Turn off WIP for all devices before changing the primary Corporate Identity (first entry in the list), restarting, and finally redeploying.</td>
|
<td>Turn off WIP for all devices before changing the primary Corporate Identity (first entry in the list), restarting, and finally redeploying.</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>Redirected folders with Client Side Caching are not compatible with WIP.</td>
|
<td>Redirected folders with Client-Side Caching are not compatible with WIP.</td>
|
||||||
<td>Apps might encounter access errors while attempting to read a cached, offline file.</td>
|
<td>Apps might encounter access errors while attempting to read a cached, offline file.</td>
|
||||||
<td>Migrate to use another file synchronization method, such as Work Folders or OneDrive for Business.<br><br><b>Note</b><br>For more info about Work Folders and Offline Files, see the blog, <a href="https://blogs.technet.microsoft.com/filecab/2016/08/29/work-folders-and-offline-files-support-for-windows-information-protection/" data-raw-source="[Work Folders and Offline Files support for Windows Information Protection](https://blogs.technet.microsoft.com/filecab/2016/08/29/work-folders-and-offline-files-support-for-windows-information-protection/)">Work Folders and Offline Files support for Windows Information Protection</a>. If you're having trouble opening files offline while using Offline Files and WIP, see the support article, <a href="https://support.microsoft.com/kb/3187045" data-raw-source="[Can't open files offline when you use Offline Files and Windows Information Protection](https://support.microsoft.com/kb/3187045)">Can't open files offline when you use Offline Files and Windows Information Protection</a>.</td>
|
<td>Migrate to use another file synchronization method, such as Work Folders or OneDrive for Business.<br><br><b>Note</b><br>For more info about Work Folders and Offline Files, see the blog, <a href="https://blogs.technet.microsoft.com/filecab/2016/08/29/work-folders-and-offline-files-support-for-windows-information-protection/" data-raw-source="[Work Folders and Offline Files support for Windows Information Protection](https://blogs.technet.microsoft.com/filecab/2016/08/29/work-folders-and-offline-files-support-for-windows-information-protection/)">Work Folders and Offline Files support for Windows Information Protection</a>. If you're having trouble opening files offline while using Offline Files and WIP, see the support article, <a href="https://support.microsoft.com/kb/3187045" data-raw-source="[Can't open files offline when you use Offline Files and Windows Information Protection](https://support.microsoft.com/kb/3187045)">Can't open files offline when you use Offline Files and Windows Information Protection</a>.</td>
|
||||||
</tr>
|
</tr>
|
||||||
|
@ -75,7 +75,7 @@ Microsoft Defender SmartScreen events appear in the Microsoft-Windows-SmartScree
|
|||||||
|
|
||||||
Windows event log for SmartScreen is disabled by default, users can use Event Viewer UI to enable the log or use the command line to enable it:
|
Windows event log for SmartScreen is disabled by default, users can use Event Viewer UI to enable the log or use the command line to enable it:
|
||||||
|
|
||||||
```
|
```console
|
||||||
wevtutil sl Microsoft-Windows-SmartScreen/Debug /e:true
|
wevtutil sl Microsoft-Windows-SmartScreen/Debug /e:true
|
||||||
```
|
```
|
||||||
|
|
||||||
@ -83,11 +83,11 @@ wevtutil sl Microsoft-Windows-SmartScreen/Debug /e:true
|
|||||||
> For information on how to use the Event Viewer, see [Windows Event Viewer](/host-integration-server/core/windows-event-viewer1).
|
> For information on how to use the Event Viewer, see [Windows Event Viewer](/host-integration-server/core/windows-event-viewer1).
|
||||||
|
|
||||||
|
|
||||||
EventID | Description
|
| EventID | Description |
|
||||||
-|-
|
|---|---|
|
||||||
1000 | Application Windows Defender SmartScreen Event
|
| 1000 | Application Windows Defender SmartScreen Event |
|
||||||
1001 | Uri Windows Defender SmartScreen Event
|
| 1001 | Uri Windows Defender SmartScreen Event |
|
||||||
1002 | User Decision Windows Defender SmartScreen Event
|
| 1002 | User Decision Windows Defender SmartScreen Event |
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [SmartScreen Frequently Asked Questions](https://fb.smartscreen.microsoft.com/smartscreenfaq.aspx)
|
- [SmartScreen Frequently Asked Questions](https://fb.smartscreen.microsoft.com/smartscreenfaq.aspx)
|
||||||
|
@ -56,13 +56,13 @@ Because mobile devices are increasingly being used to access corporate informati
|
|||||||
|
|
||||||
Devices that are used to access corporate resources must be trusted. An efficient end-to-end security approach is able to evaluate device health and use the current security state when granting access to a high-value asset.
|
Devices that are used to access corporate resources must be trusted. An efficient end-to-end security approach is able to evaluate device health and use the current security state when granting access to a high-value asset.
|
||||||
|
|
||||||

|
:::image type="content" alt-text="figure 1" source="images/hva-fig1-endtoend1.png":::
|
||||||
|
|
||||||
A robust design needs to establish the user’s identity, strengthen the authentication method if needed, and learn behavior like the network location the user regularly connects from. Also, a modern approach must be able to release sensitive content only if user devices are determined to be healthy and secure.
|
A robust design needs to establish the user’s identity, strengthen the authentication method if needed, and learn behavior like the network location the user regularly connects from. Also, a modern approach must be able to release sensitive content only if user devices are determined to be healthy and secure.
|
||||||
|
|
||||||
The following figure shows a solution built to assess device health from the cloud. The device authenticates the user through a connection to an identity provider in the cloud. If the managed asset contains highly confidential information, the conditional access engine of the identity provider may elect to verify the security compliance of the mobile device before access is granted. The user’s device is able to prove its health status that can be sent at any time or when mobile device management (MDM) requests it.
|
The following figure shows a solution built to assess device health from the cloud. The device authenticates the user through a connection to an identity provider in the cloud. If the managed asset contains highly confidential information, the conditional access engine of the identity provider may elect to verify the security compliance of the mobile device before access is granted. The user’s device is able to prove its health status that can be sent at any time or when mobile device management (MDM) requests it.
|
||||||
|
|
||||||

|
:::image type="content" alt-text="figure 2" source="images/hva-fig2-assessfromcloud2.png":::
|
||||||
|
|
||||||
Windows devices can be protected from low-level rootkits and bootkits by using low-level hardware technologies such as Unified Extensible Firmware Interface (UEFI) Secure Boot.
|
Windows devices can be protected from low-level rootkits and bootkits by using low-level hardware technologies such as Unified Extensible Firmware Interface (UEFI) Secure Boot.
|
||||||
|
|
||||||
@ -94,7 +94,7 @@ In Windows 10, there are three pillars of investments:
|
|||||||
|
|
||||||
This section is an overview that describes different parts of the end-to-end security solution that helps protect high-value assets and information from attackers and malware.
|
This section is an overview that describes different parts of the end-to-end security solution that helps protect high-value assets and information from attackers and malware.
|
||||||
|
|
||||||

|
:::image type="content" alt-text="figure 3" source="images/hva-fig3-endtoendoverview3.png":::
|
||||||
|
|
||||||
| Number | Part of the solution | Description |
|
| Number | Part of the solution | Description |
|
||||||
| - | - | - |
|
| - | - | - |
|
||||||
@ -115,7 +115,7 @@ This section describes what Windows 10 offers in terms of security defenses and
|
|||||||
The most aggressive forms of malware try to insert themselves into the boot process as early as possible so that they can take control of the operating system early and prevent protection mechanisms and antimalware software from working. This type of malicious code is often called a rootkit or bootkit. The best way to avoid having to deal with low-level malware is to secure the boot process so that the device is protected from the very start.
|
The most aggressive forms of malware try to insert themselves into the boot process as early as possible so that they can take control of the operating system early and prevent protection mechanisms and antimalware software from working. This type of malicious code is often called a rootkit or bootkit. The best way to avoid having to deal with low-level malware is to secure the boot process so that the device is protected from the very start.
|
||||||
Windows 10 supports multiple layers of boot protection. Some of these features are available only if specific types of hardware are installed. For more information, see the [Hardware requirements](#hardware-req) section.
|
Windows 10 supports multiple layers of boot protection. Some of these features are available only if specific types of hardware are installed. For more information, see the [Hardware requirements](#hardware-req) section.
|
||||||
|
|
||||||

|
:::image type="content" alt-text="figure 4" source="images/hva-fig4-hardware.png":::
|
||||||
|
|
||||||
Windows 10 supports features to help prevent sophisticated low-level malware like rootkits and bootkits from loading during the startup process:
|
Windows 10 supports features to help prevent sophisticated low-level malware like rootkits and bootkits from loading during the startup process:
|
||||||
|
|
||||||
@ -156,7 +156,8 @@ Windows 10 supports features to help prevent sophisticated low-level malware lik
|
|||||||
Secure Boot is a UEFI firmware-based feature, which allows for the signing and verification of critical boot files and drivers at boot time. Secure Boot checks signature values of the Windows Boot Manager, BCD store, Windows OS loader file, and other boot critical DLLs at boot time before the system is allowed to fully boot into a usable operating system by using policies that are defined by the OEM at build time. Secure Boot prevents many types of boot-based rootkit, malware, and other security-related attacks against the Windows platform. Secure Boot protects the operating system boot process whether booting from local hard disk, USB, PXE, or DVD, or into full Windows or Windows Recovery Environment (RE).
|
Secure Boot is a UEFI firmware-based feature, which allows for the signing and verification of critical boot files and drivers at boot time. Secure Boot checks signature values of the Windows Boot Manager, BCD store, Windows OS loader file, and other boot critical DLLs at boot time before the system is allowed to fully boot into a usable operating system by using policies that are defined by the OEM at build time. Secure Boot prevents many types of boot-based rootkit, malware, and other security-related attacks against the Windows platform. Secure Boot protects the operating system boot process whether booting from local hard disk, USB, PXE, or DVD, or into full Windows or Windows Recovery Environment (RE).
|
||||||
Secure Boot protects the boot environment of a Windows 10 installation by verifying the signatures of the critical boot components to confirm malicious activity did not compromise them. Secure Boot protection ends after the Windows kernel file (ntoskrnl.exe) has been loaded.
|
Secure Boot protects the boot environment of a Windows 10 installation by verifying the signatures of the critical boot components to confirm malicious activity did not compromise them. Secure Boot protection ends after the Windows kernel file (ntoskrnl.exe) has been loaded.
|
||||||
|
|
||||||
>**Note:** Secure Boot protects the platform until the Windows kernel is loaded. Then protections like ELAM take over.
|
> [!NOTE]
|
||||||
|
> Secure Boot protects the platform until the Windows kernel is loaded. Then protections like ELAM take over.
|
||||||
|
|
||||||
- **Secure Boot configuration policy.** Extends Secure Boot functionality to critical Windows 10 configuration.
|
- **Secure Boot configuration policy.** Extends Secure Boot functionality to critical Windows 10 configuration.
|
||||||
|
|
||||||
@ -173,7 +174,8 @@ Windows 10 supports features to help prevent sophisticated low-level malware lik
|
|||||||
|
|
||||||
ELAM can load a Microsoft or non-Microsoft antimalware driver before all non-Microsoft boot drivers and applications, thus continuing the chain of trust established by Secure Boot and Trusted Boot. Because the operating system hasn’t started yet, and because Windows needs to boot as quickly as possible, ELAM has a simple task: Examine every boot driver and determine whether it is on the list of trusted drivers. If it’s not trusted, Windows won’t load it.
|
ELAM can load a Microsoft or non-Microsoft antimalware driver before all non-Microsoft boot drivers and applications, thus continuing the chain of trust established by Secure Boot and Trusted Boot. Because the operating system hasn’t started yet, and because Windows needs to boot as quickly as possible, ELAM has a simple task: Examine every boot driver and determine whether it is on the list of trusted drivers. If it’s not trusted, Windows won’t load it.
|
||||||
|
|
||||||
>**Note:** Windows Defender, Microsoft's antimalware included by default in Windows 10, supports ELAM; it can be replaced with a third-party antimalware compatible solution. The name of the Windows Defender ELAM driver is WdBoot.sys. Windows Defender in Windows 10 uses its ELAM driver to roll back any malicious changes made to the Windows Defender driver at the next reboot. This prevents kernel mode malware making lasting changes to Windows Defender’s mini-filter driver before shutdown or reboot.
|
> [!NOTE]
|
||||||
|
> Windows Defender, Microsoft's antimalware included by default in Windows 10, supports ELAM; it can be replaced with a third-party antimalware compatible solution. The name of the Windows Defender ELAM driver is WdBoot.sys. Windows Defender in Windows 10 uses its ELAM driver to roll back any malicious changes made to the Windows Defender driver at the next reboot. This prevents kernel mode malware making lasting changes to Windows Defender’s mini-filter driver before shutdown or reboot.
|
||||||
|
|
||||||
The ELAM signed driver is loaded before any other third-party drivers or applications, which allows the antimalware software to detect and block any attempts to tamper with the boot process by trying to load unsigned or untrusted code.
|
The ELAM signed driver is loaded before any other third-party drivers or applications, which allows the antimalware software to detect and block any attempts to tamper with the boot process by trying to load unsigned or untrusted code.
|
||||||
|
|
||||||
@ -188,7 +190,8 @@ Windows 10 supports features to help prevent sophisticated low-level malware lik
|
|||||||
|
|
||||||
HVCI uses virtualization-based security to isolate Code Integrity, the only way kernel memory can become executable is through a Code Integrity verification. This means that kernel memory pages can never be Writable and Executable (W+X) and executable code cannot be directly modified.
|
HVCI uses virtualization-based security to isolate Code Integrity, the only way kernel memory can become executable is through a Code Integrity verification. This means that kernel memory pages can never be Writable and Executable (W+X) and executable code cannot be directly modified.
|
||||||
|
|
||||||
>**Note:** Device Guard devices that run Kernel Mode Code Integrity with virtualization-based security must have compatible drivers. For additional information, please read the [Driver compatibility with Device Guard in Windows 10](https://go.microsoft.com/fwlink/p/?LinkId=691612) blog post.
|
> [!NOTE]
|
||||||
|
> Device Guard devices that run Kernel Mode Code Integrity with virtualization-based security must have compatible drivers. For additional information, please read the [Driver compatibility with Device Guard in Windows 10](https://go.microsoft.com/fwlink/p/?LinkId=691612) blog post.
|
||||||
|
|
||||||
The Device Guard Code Integrity feature lets organizations control what code is trusted to run into the Windows kernel and what applications are approved to run in user mode. It’s configurable by using a policy.
|
The Device Guard Code Integrity feature lets organizations control what code is trusted to run into the Windows kernel and what applications are approved to run in user mode. It’s configurable by using a policy.
|
||||||
Device Guard Code Integrity policy is a binary file that Microsoft recommends you sign. The signing of the Code Integrity policy aids in the protection against a malicious user with Administrator privileges trying to modify or remove the current Code Integrity policy.
|
Device Guard Code Integrity policy is a binary file that Microsoft recommends you sign. The signing of the Code Integrity policy aids in the protection against a malicious user with Administrator privileges trying to modify or remove the current Code Integrity policy.
|
||||||
@ -221,12 +224,13 @@ The following Windows 10 services are protected with virtualization-based securi
|
|||||||
- **Device Guard** (Hyper-V Code Integrity): Device Guard uses the new virtualization-based security in Windows 10 to isolate the Code Integrity service from the Windows kernel itself, which lets the service use signatures defined by your enterprise-controlled policy to help determine what is trustworthy. In effect, the Code Integrity service runs alongside the kernel in a Windows hypervisor-protected container.
|
- **Device Guard** (Hyper-V Code Integrity): Device Guard uses the new virtualization-based security in Windows 10 to isolate the Code Integrity service from the Windows kernel itself, which lets the service use signatures defined by your enterprise-controlled policy to help determine what is trustworthy. In effect, the Code Integrity service runs alongside the kernel in a Windows hypervisor-protected container.
|
||||||
- **Other isolated services**: for example, on Windows Server 2016, there is the vTPM feature that allows you to have encrypted virtual machines (VMs) on servers.
|
- **Other isolated services**: for example, on Windows Server 2016, there is the vTPM feature that allows you to have encrypted virtual machines (VMs) on servers.
|
||||||
|
|
||||||
>**Note:** Virtualization-based security is only available with Windows 10 Enterprise. Virtualization-based security requires devices with UEFI (2.3.1 or higher) with Secure Boot enabled, x64 processor with Virtualization Extensions and SLAT enabled. IOMMU, TPM 2.0. and support for Secure Memory overwritten are optional, but recommended.
|
> [!NOTE]
|
||||||
|
> Virtualization-based security is only available with Windows 10 Enterprise. Virtualization-based security requires devices with UEFI (2.3.1 or higher) with Secure Boot enabled, x64 processor with Virtualization Extensions and SLAT enabled. IOMMU, TPM 2.0. and support for Secure Memory overwritten are optional, but recommended.
|
||||||
|
|
||||||
|
|
||||||
The schema below is a high-level view of Windows 10 with virtualization-based security.
|
The schema below is a high-level view of Windows 10 with virtualization-based security.
|
||||||
|
|
||||||

|
:::image type="content" alt-text="figure 5" source="images/hva-fig5-virtualbasedsecurity.png":::
|
||||||
|
|
||||||
### Credential Guard
|
### Credential Guard
|
||||||
|
|
||||||
@ -248,7 +252,8 @@ The trust decision to execute code is performed by using Hyper-V Code Integrity,
|
|||||||
|
|
||||||
Hyper-V Code Integrity is a feature that validates the integrity of a driver or system file each time it is loaded into memory. Code integrity detects whether an unsigned driver or system file is being loaded into the kernel, or whether a system file has been modified by malicious software that is being run by a user account with Administrator privileges. On x64-based versions of Windows 10 kernel-mode drivers must be digitally signed.
|
Hyper-V Code Integrity is a feature that validates the integrity of a driver or system file each time it is loaded into memory. Code integrity detects whether an unsigned driver or system file is being loaded into the kernel, or whether a system file has been modified by malicious software that is being run by a user account with Administrator privileges. On x64-based versions of Windows 10 kernel-mode drivers must be digitally signed.
|
||||||
|
|
||||||
>**Note:** Independently of activation of Device Guard Policy, [Windows 10 by default raises the bar for what runs in the kernel](https://go.microsoft.com/fwlink/p/?LinkId=691613). Windows 10 drivers must be signed by Microsoft, and more specifically, by the WHQL (Windows Hardware Quality Labs) portal. Additionally, starting in October 2015, the WHQL portal will only accept driver submissions, including both kernel and user mode driver submissions, that have a valid Extended Validation (“EV”) Code Signing Certificate.
|
> [!NOTE]
|
||||||
|
> Independently of activation of Device Guard Policy, [Windows 10 by default raises the bar for what runs in the kernel](https://go.microsoft.com/fwlink/p/?LinkId=691613). Windows 10 drivers must be signed by Microsoft, and more specifically, by the WHQL (Windows Hardware Quality Labs) portal. Additionally, starting in October 2015, the WHQL portal will only accept driver submissions, including both kernel and user mode driver submissions, that have a valid Extended Validation (“EV”) Code Signing Certificate.
|
||||||
|
|
||||||
With Device Guard in Windows 10, organizations are now able to define their own Code Integrity policy for use on x64 systems running Windows 10 Enterprise. Organizations have the ability to configure the policy that determines what is trusted to run. These include drivers and system files, as well as traditional desktop applications and scripts. The system is then locked down to only run applications that the organization trusts.
|
With Device Guard in Windows 10, organizations are now able to define their own Code Integrity policy for use on x64 systems running Windows 10 Enterprise. Organizations have the ability to configure the policy that determines what is trusted to run. These include drivers and system files, as well as traditional desktop applications and scripts. The system is then locked down to only run applications that the organization trusts.
|
||||||
|
|
||||||
@ -286,7 +291,8 @@ It could be challenging to use Device Guard on corporate, lightly-managed workst
|
|||||||
|
|
||||||
Before you can benefit from the protection included in Device Guard, Code Integrity policy must be created by using tools provided by Microsoft, but the policy can be deployed with common management tools, like Group Policy. The Code Integrity policy is a binary-encoded XML document that includes configuration settings for both the User and Kernel-modes of Windows 10, along with restrictions on Windows 10 script hosts. Device Guard Code Integrity policy restricts what code can run on a device.
|
Before you can benefit from the protection included in Device Guard, Code Integrity policy must be created by using tools provided by Microsoft, but the policy can be deployed with common management tools, like Group Policy. The Code Integrity policy is a binary-encoded XML document that includes configuration settings for both the User and Kernel-modes of Windows 10, along with restrictions on Windows 10 script hosts. Device Guard Code Integrity policy restricts what code can run on a device.
|
||||||
|
|
||||||
>**Note:** Device Guard policy can be signed in Windows 10, which adds additional protection against administrative users changing or removing this policy.
|
> [!NOTE]
|
||||||
|
> Device Guard policy can be signed in Windows 10, which adds additional protection against administrative users changing or removing this policy.
|
||||||
|
|
||||||
Signed Device Guard policy offers stronger protection against a malicious local administrator trying to defeat Device Guard.
|
Signed Device Guard policy offers stronger protection against a malicious local administrator trying to defeat Device Guard.
|
||||||
|
|
||||||
@ -406,7 +412,8 @@ This is the most secure approach available for Windows 10-based devices to detec
|
|||||||
|
|
||||||
A relying party like an MDM can inspect the report generated by the remote health attestation service.
|
A relying party like an MDM can inspect the report generated by the remote health attestation service.
|
||||||
|
|
||||||
>**Note:** To use the health attestation feature of Windows 10, the device must be equipped with a discrete or firmware TPM. There is no restriction on any particular edition of Windows 10.
|
> [!NOTE]
|
||||||
|
> To use the health attestation feature of Windows 10, the device must be equipped with a discrete or firmware TPM. There is no restriction on any particular edition of Windows 10.
|
||||||
|
|
||||||
Windows 10 supports health attestation scenarios by allowing applications access to the underlying health attestation configuration service provider (CSP) so that applications can request a health attestation token. The measurement of the boot sequence can be checked at any time locally by an antimalware or an MDM agent.
|
Windows 10 supports health attestation scenarios by allowing applications access to the underlying health attestation configuration service provider (CSP) so that applications can request a health attestation token. The measurement of the boot sequence can be checked at any time locally by an antimalware or an MDM agent.
|
||||||
|
|
||||||
@ -418,11 +425,11 @@ The antimalware software can search to determine whether the boot sequence conta
|
|||||||
|
|
||||||
Health attestation logs the measurements in various TPM Platform Configuration Registers (PCRs) and TCG logs during the boot process.
|
Health attestation logs the measurements in various TPM Platform Configuration Registers (PCRs) and TCG logs during the boot process.
|
||||||
|
|
||||||

|
:::image type="content" alt-text="figure 6" source="images/hva-fig6-logs.png":::
|
||||||
|
|
||||||
When starting a device equipped with TPM, a measurement of different components is performed. This includes firmware, UEFI drivers, CPU microcode, and also all the Windows 10 drivers whose type is Boot Start. The raw measurements are stored in the TPM PCR registers while the details of all events (executable path, authority certification, and so on) are available in the TCG log.
|
When starting a device equipped with TPM, a measurement of different components is performed. This includes firmware, UEFI drivers, CPU microcode, and also all the Windows 10 drivers whose type is Boot Start. The raw measurements are stored in the TPM PCR registers while the details of all events (executable path, authority certification, and so on) are available in the TCG log.
|
||||||
|
|
||||||

|
:::image type="content" alt-text="figure 7" source="images/hva-fig7-measurement.png":::
|
||||||
|
|
||||||
The health attestation process works as follows:
|
The health attestation process works as follows:
|
||||||
|
|
||||||
@ -435,7 +442,8 @@ The health attestation process works as follows:
|
|||||||
7. MDM server through the MDM agent issues a health check command by leveraging the Health Attestation CSP.
|
7. MDM server through the MDM agent issues a health check command by leveraging the Health Attestation CSP.
|
||||||
8. Boot measurements are validated by the Health Attestation Service
|
8. Boot measurements are validated by the Health Attestation Service
|
||||||
|
|
||||||
>**Note:** By default, the last 100 system boot logs and all associated resume logs are archived in the %SystemRoot%\\logs\\measuredboot folder.
|
> [!NOTE]
|
||||||
|
> By default, the last 100 system boot logs and all associated resume logs are archived in the %SystemRoot%\\logs\\measuredboot folder.
|
||||||
The number of retained logs may be set with the registry **REG\_DWORD** value **PlatformLogRetention** under the **HKLM\\SYSTEM\\CurrentControlSet\\Services\\TPM** key. A value of **0** will turn off log archival and a value of **0xffffffff** will keep all logs.
|
The number of retained logs may be set with the registry **REG\_DWORD** value **PlatformLogRetention** under the **HKLM\\SYSTEM\\CurrentControlSet\\Services\\TPM** key. A value of **0** will turn off log archival and a value of **0xffffffff** will keep all logs.
|
||||||
|
|
||||||
The following process describes how health boot measurements are sent to the health attestation service:
|
The following process describes how health boot measurements are sent to the health attestation service:
|
||||||
@ -451,7 +459,7 @@ The following process describes how health boot measurements are sent to the hea
|
|||||||
|
|
||||||
4. The client stores the health encrypted blob in its local store. The device health token contains device health status, a device ID (the Windows AIK), and the boot counter.
|
4. The client stores the health encrypted blob in its local store. The device health token contains device health status, a device ID (the Windows AIK), and the boot counter.
|
||||||
|
|
||||||

|
:::image type="content" alt-text="figure 8" source="images/hva-fig8a-healthattest8a.png":::
|
||||||
|
|
||||||
### Device health attestation components
|
### Device health attestation components
|
||||||
|
|
||||||
@ -485,7 +493,8 @@ The endorsement key is often accompanied by one or two digital certificates:
|
|||||||
- The other certificate is produced by the platform builder and is called the **platform certificate** to indicate that a specific TPM is integrated with a certain device.
|
- The other certificate is produced by the platform builder and is called the **platform certificate** to indicate that a specific TPM is integrated with a certain device.
|
||||||
For certain devices that use firmware-based TPM produced by Intel or Qualcomm, the endorsement certificate is created when the TPM is initialized during the OOBE of Windows 10.
|
For certain devices that use firmware-based TPM produced by Intel or Qualcomm, the endorsement certificate is created when the TPM is initialized during the OOBE of Windows 10.
|
||||||
|
|
||||||
>**Note:** Secure Boot protects the platform until the Windows kernel is loaded. Then protections like Trusted Boot, Hyper-V Code Integrity and ELAM take over. A device that uses Intel TPM or Qualcomm TPM gets a signed certificate online from the manufacturer that has created the chip and then stores the signed certificate in TPM storage. For the operation to succeed, if you are filtering Internet access from your client devices, you must authorize the following URLs:
|
> [!NOTE]
|
||||||
|
> Secure Boot protects the platform until the Windows kernel is loaded. Then protections like Trusted Boot, Hyper-V Code Integrity and ELAM take over. A device that uses Intel TPM or Qualcomm TPM gets a signed certificate online from the manufacturer that has created the chip and then stores the signed certificate in TPM storage. For the operation to succeed, if you are filtering Internet access from your client devices, you must authorize the following URLs:
|
||||||
|
|
||||||
- For Intel firmware TPM: **https://ekop.intel.com/ekcertservice**
|
- For Intel firmware TPM: **https://ekop.intel.com/ekcertservice**
|
||||||
- For Qualcomm firmware TPM: **https://ekcert.spserv.microsoft.com/**
|
- For Qualcomm firmware TPM: **https://ekcert.spserv.microsoft.com/**
|
||||||
@ -494,7 +503,8 @@ For certain devices that use firmware-based TPM produced by Intel or Qualcomm, t
|
|||||||
|
|
||||||
Because the endorsement certificate is unique for each device and does not change, the usage of it may present privacy concerns because it's theoretically possible to track a specific device. To avoid this privacy problem, Windows 10 issues a derived attestation anchor based on the endorsement certificate. This intermediate key, which can be attested to an endorsement key, is the Attestation Identity Key (AIK) and the corresponding certificate is called the AIK certificate. This AIK certificate is issued by a Microsoft cloud service.
|
Because the endorsement certificate is unique for each device and does not change, the usage of it may present privacy concerns because it's theoretically possible to track a specific device. To avoid this privacy problem, Windows 10 issues a derived attestation anchor based on the endorsement certificate. This intermediate key, which can be attested to an endorsement key, is the Attestation Identity Key (AIK) and the corresponding certificate is called the AIK certificate. This AIK certificate is issued by a Microsoft cloud service.
|
||||||
|
|
||||||
>**Note:** Before the device can report its health using the TPM attestation functions, an AIK certificate must be provisioned in conjunction with a third-party service like the Microsoft Cloud CA service. After it is provisioned, the AIK private key can be used to report platform configuration. Windows 10 creates a signature over the platform log state (and a monotonic counter value) at each boot by using the AIK.
|
> [!NOTE]
|
||||||
|
> Before the device can report its health using the TPM attestation functions, an AIK certificate must be provisioned in conjunction with a third-party service like the Microsoft Cloud CA service. After it is provisioned, the AIK private key can be used to report platform configuration. Windows 10 creates a signature over the platform log state (and a monotonic counter value) at each boot by using the AIK.
|
||||||
|
|
||||||
The AIK is an asymmetric (public/private) key pair that is used as a substitute for the EK as an identity for the TPM for privacy purposes. The private portion of an AIK is never revealed or used outside the TPM and can only be used inside the TPM for a limited set of operations. Furthermore, it can only be used for signing, and only for limited, TPM-defined operations.
|
The AIK is an asymmetric (public/private) key pair that is used as a substitute for the EK as an identity for the TPM for privacy purposes. The private portion of an AIK is never revealed or used outside the TPM and can only be used inside the TPM for a limited set of operations. Furthermore, it can only be used for signing, and only for limited, TPM-defined operations.
|
||||||
|
|
||||||
@ -534,7 +544,8 @@ If the TPM ownership is not known but the EK exists, the client library will pro
|
|||||||
|
|
||||||
As part of the provisioning process, Windows 10 will create an AIK with the TPM. When this operation is performed, the resulting AIK public portion is stored in the registry at the following location: **HKLM\\SYSTEM\\CurrentControlSet\\Services\\TPM\\WMI\\WindowsAIKPub**
|
As part of the provisioning process, Windows 10 will create an AIK with the TPM. When this operation is performed, the resulting AIK public portion is stored in the registry at the following location: **HKLM\\SYSTEM\\CurrentControlSet\\Services\\TPM\\WMI\\WindowsAIKPub**
|
||||||
|
|
||||||
> **Note:** For provisioning AIK certificates and filtering Internet access, you must authorize the following wildcard URL: <b>https://\*.microsoftaik.azure.net</b>
|
> [!NOTE]
|
||||||
|
> For provisioning AIK certificates and filtering Internet access, you must authorize the following wildcard URL: <b>https://\*.microsoftaik.azure.net</b>
|
||||||
|
|
||||||
### Windows 10 Health Attestation CSP
|
### Windows 10 Health Attestation CSP
|
||||||
|
|
||||||
@ -555,7 +566,8 @@ When an MDM server validates that a device has attested to the Health Attestatio
|
|||||||
|
|
||||||
The role of Windows Health Attestation Service is essentially to evaluate a set of health data (TCG log and PCR values), make a series of detections (based on available health data) and generate encrypted health blob or produce report to MDM servers.
|
The role of Windows Health Attestation Service is essentially to evaluate a set of health data (TCG log and PCR values), make a series of detections (based on available health data) and generate encrypted health blob or produce report to MDM servers.
|
||||||
|
|
||||||
>**Note:** Both device and MDM servers must have access to **has.spserv.microsoft.com** using the TCP protocol on port 443 (HTTPS).
|
> [!NOTE]
|
||||||
|
> Both device and MDM servers must have access to **has.spserv.microsoft.com** using the TCP protocol on port 443 (HTTPS).
|
||||||
|
|
||||||
Checking that a TPM attestation and the associated log are valid takes several steps:
|
Checking that a TPM attestation and the associated log are valid takes several steps:
|
||||||
|
|
||||||
@ -620,7 +632,7 @@ A solution that leverages MDM and the Health Attestation Service consists of thr
|
|||||||
2. After this is enabled, and every boot thereafter, the device will send health measurements to the Health Attestation Service hosted by Microsoft, and it will receive a health attestation blob in return.
|
2. After this is enabled, and every boot thereafter, the device will send health measurements to the Health Attestation Service hosted by Microsoft, and it will receive a health attestation blob in return.
|
||||||
3. At any point after this, an MDM server can request the health attestation blob from the device and ask Health Attestation Service to decrypt the content and validate that it’s been attested.
|
3. At any point after this, an MDM server can request the health attestation blob from the device and ask Health Attestation Service to decrypt the content and validate that it’s been attested.
|
||||||
|
|
||||||

|
:::image type="content" alt-text="figure 9" source="images/hva-fig8-evaldevicehealth8.png":::
|
||||||
|
|
||||||
Interaction between a Windows 10-based device, the Health Attestation Service, and MDM can be performed as follows:
|
Interaction between a Windows 10-based device, the Health Attestation Service, and MDM can be performed as follows:
|
||||||
|
|
||||||
@ -640,7 +652,8 @@ Interaction between a Windows 10-based device, the Health Attestation Service, a
|
|||||||
4. Because the boot counter and the nonce are quoted with the AIK from the health blob, it also proves that the device is the same one as the one for which the health blob has been generated.
|
4. Because the boot counter and the nonce are quoted with the AIK from the health blob, it also proves that the device is the same one as the one for which the health blob has been generated.
|
||||||
5. Sends data back to the MDM server including health parameters, freshness, and so on.
|
5. Sends data back to the MDM server including health parameters, freshness, and so on.
|
||||||
|
|
||||||
>**Note:** The MDM server (relying party) never performs the quote or boot counter validation itself. It gets the quoted data and the health blob (which is encrypted) and sends the data to the Health Attestation Service for validation. This way, the AIK is never visible to the MDM, which thereby addresses privacy concerns.
|
> [!NOTE]
|
||||||
|
> The MDM server (relying party) never performs the quote or boot counter validation itself. It gets the quoted data and the health blob (which is encrypted) and sends the data to the Health Attestation Service for validation. This way, the AIK is never visible to the MDM, which thereby addresses privacy concerns.
|
||||||
|
|
||||||
Setting the requirements for device compliance is the first step to ensure that registered devices that do not meet health and compliance requirements are detected, tracked, and have actions enforced by the MDM solution.
|
Setting the requirements for device compliance is the first step to ensure that registered devices that do not meet health and compliance requirements are detected, tracked, and have actions enforced by the MDM solution.
|
||||||
|
|
||||||
@ -653,11 +666,12 @@ Today’s access control technology, in most cases, focuses on ensuring that the
|
|||||||
|
|
||||||
The remote device health attestation process uses measured boot data to verify the health status of the device. The health of the device is then available for an MDM solution like Intune.
|
The remote device health attestation process uses measured boot data to verify the health status of the device. The health of the device is then available for an MDM solution like Intune.
|
||||||
|
|
||||||
>**Note:** For the latest information on Intune and Windows 10 features support, see the [Microsoft Intune blog](https://go.microsoft.com/fwlink/p/?LinkId=691614) and [What's new in Microsoft Intune](https://go.microsoft.com/fwlink/p/?LinkId=733956).
|
> [!NOTE]
|
||||||
|
> For the latest information on Intune and Windows 10 features support, see the [Microsoft Intune blog](https://go.microsoft.com/fwlink/p/?LinkId=691614) and [What's new in Microsoft Intune](https://go.microsoft.com/fwlink/p/?LinkId=733956).
|
||||||
|
|
||||||
The figure below shows how the Health Attestation Service is expected to work with Microsoft’s cloud-based Intune MDM service.
|
The figure below shows how the Health Attestation Service is expected to work with Microsoft’s cloud-based Intune MDM service.
|
||||||
|
|
||||||

|
:::image type="content" alt-text="figure 10" source="images/hva-fig9-intune.png":::
|
||||||
|
|
||||||
An MDM solution can then leverage health state statements and take them to the next level by coupling with client policies that will enable conditional access to be granted based on the device’s ability to prove that it’s malware free, its antimalware system is functional and up to date, the
|
An MDM solution can then leverage health state statements and take them to the next level by coupling with client policies that will enable conditional access to be granted based on the device’s ability to prove that it’s malware free, its antimalware system is functional and up to date, the
|
||||||
firewall is running, and the devices patch state is compliant.
|
firewall is running, and the devices patch state is compliant.
|
||||||
@ -672,7 +686,8 @@ Windows 10 has an MDM client that ships as part of the operating system. This en
|
|||||||
|
|
||||||
Third-party MDM servers can manage Windows 10 by using the MDM protocol. The built-in management client is able to communicate with a compatible server that supports the OMA-DM protocol to perform enterprise management tasks. For additional information, see [Azure Active Directory integration with MDM](/windows/client-management/mdm/azure-active-directory-integration-with-mdm).
|
Third-party MDM servers can manage Windows 10 by using the MDM protocol. The built-in management client is able to communicate with a compatible server that supports the OMA-DM protocol to perform enterprise management tasks. For additional information, see [Azure Active Directory integration with MDM](/windows/client-management/mdm/azure-active-directory-integration-with-mdm).
|
||||||
|
|
||||||
>**Note:** MDM servers do not need to create or download a client to manage Windows 10. For more information, see [Mobile device management](/windows/client-management/mdm/).
|
> [!NOTE]
|
||||||
|
> MDM servers do not need to create or download a client to manage Windows 10. For more information, see [Mobile device management](/windows/client-management/mdm/).
|
||||||
|
|
||||||
The third-party MDM server will have the same consistent first-party user experience for enrollment, which also provides simplicity for Windows 10 users.
|
The third-party MDM server will have the same consistent first-party user experience for enrollment, which also provides simplicity for Windows 10 users.
|
||||||
|
|
||||||
@ -690,7 +705,7 @@ If the device is not registered, the user will get a message with instructions o
|
|||||||
|
|
||||||
**Azure AD** authenticates the user and the device, **MDM** manages the compliance and conditional access policies, and the **Health Attestation Service** reports about the health of the device in an attested way.
|
**Azure AD** authenticates the user and the device, **MDM** manages the compliance and conditional access policies, and the **Health Attestation Service** reports about the health of the device in an attested way.
|
||||||
|
|
||||||

|
:::image type="content" alt-text="figure 11" source="images/hva-fig10-conditionalaccesscontrol.png":::
|
||||||
|
|
||||||
### <a href="" id="office-365-conditional-access-control-"></a>Office 365 conditional access control
|
### <a href="" id="office-365-conditional-access-control-"></a>Office 365 conditional access control
|
||||||
|
|
||||||
@ -701,7 +716,8 @@ When a user requests access to an Office 365 service from a supported device pla
|
|||||||
|
|
||||||
When a user enrolls, the device is registered with Azure AD, and enrolled with a compatible MDM solution like Intune.
|
When a user enrolls, the device is registered with Azure AD, and enrolled with a compatible MDM solution like Intune.
|
||||||
|
|
||||||
>**Note** Microsoft is working with third-party MDM ISVs to support automated MDM enrollment and policy based access checks. Steps to turn on auto-MDM enrollment with Azure AD and Intune are explained in the [Windows 10, Azure AD And Microsoft Intune: Automatic MDM Enrollment Powered By The Cloud!](https://go.microsoft.com/fwlink/p/?LinkId=691615) blog post.
|
> [!NOTE]
|
||||||
|
> Microsoft is working with third-party MDM ISVs to support automated MDM enrollment and policy based access checks. Steps to turn on auto-MDM enrollment with Azure AD and Intune are explained in the [Windows 10, Azure AD And Microsoft Intune: Automatic MDM Enrollment Powered By The Cloud!](https://go.microsoft.com/fwlink/p/?LinkId=691615) blog post.
|
||||||
|
|
||||||
When a user enrolls a device successfully, the device becomes trusted. Azure AD provides single-sign-on to access company applications and enforces conditional access policy to grant access to a service not only the first time the user requests access, but every time the user requests to renew access.
|
When a user enrolls a device successfully, the device becomes trusted. Azure AD provides single-sign-on to access company applications and enforces conditional access policy to grant access to a service not only the first time the user requests access, but every time the user requests to renew access.
|
||||||
|
|
||||||
@ -709,7 +725,7 @@ The user will be denied access to services when sign-in credentials are changed,
|
|||||||
|
|
||||||
Depending on the type of email application that employees use to access Exchange online, the path to establish secured access to email can be slightly different. However, the key components: Azure AD, Office 365/Exchange Online, and Intune, are the same. The IT experience and end-user experience also are similar.
|
Depending on the type of email application that employees use to access Exchange online, the path to establish secured access to email can be slightly different. However, the key components: Azure AD, Office 365/Exchange Online, and Intune, are the same. The IT experience and end-user experience also are similar.
|
||||||
|
|
||||||

|
:::image type="content" alt-text="figure 12" source="images/hva-fig11-office365.png":::
|
||||||
|
|
||||||
Clients that attempt to access Office 365 will be evaluated for the following properties:
|
Clients that attempt to access Office 365 will be evaluated for the following properties:
|
||||||
|
|
||||||
@ -723,7 +739,8 @@ To get to a compliant state, the Windows 10-based device needs to:
|
|||||||
- Register with Azure AD.
|
- Register with Azure AD.
|
||||||
- Be compliant with the device policies set by the MDM solution.
|
- Be compliant with the device policies set by the MDM solution.
|
||||||
|
|
||||||
>**Note:** At the present time, conditional access policies are selectively enforced on users on iOS and Android devices. For more information, see the [Azure AD, Microsoft Intune and Windows 10 – Using the cloud to modernize enterprise mobility!](https://go.microsoft.com/fwlink/p/?LinkId=691616) blog post.
|
> [!NOTE]
|
||||||
|
> At the present time, conditional access policies are selectively enforced on users on iOS and Android devices. For more information, see the [Azure AD, Microsoft Intune and Windows 10 – Using the cloud to modernize enterprise mobility!](https://go.microsoft.com/fwlink/p/?LinkId=691616) blog post.
|
||||||
|
|
||||||
### <a href="" id="cloud-and-on-premises-apps-conditional-access-control-"></a>Cloud and on-premises apps conditional access control
|
### <a href="" id="cloud-and-on-premises-apps-conditional-access-control-"></a>Cloud and on-premises apps conditional access control
|
||||||
|
|
||||||
@ -733,14 +750,15 @@ IT pros can configure conditional access control policies for cloud SaaS applica
|
|||||||
|
|
||||||
For more information about conditional access, see [Azure Conditional Access Preview for SaaS Apps.](/azure/active-directory/authentication/tutorial-enable-azure-mfa)
|
For more information about conditional access, see [Azure Conditional Access Preview for SaaS Apps.](/azure/active-directory/authentication/tutorial-enable-azure-mfa)
|
||||||
|
|
||||||
>**Note:** Conditional access control is an Azure AD Premium feature that's also available with EMS. If you don't have an Azure AD Premium subscription, you can get a trial from the [Microsoft Azure](https://go.microsoft.com/fwlink/p/?LinkId=691617) site.
|
> [!NOTE]
|
||||||
|
> Conditional access control is an Azure AD Premium feature that's also available with EMS. If you don't have an Azure AD Premium subscription, you can get a trial from the [Microsoft Azure](https://go.microsoft.com/fwlink/p/?LinkId=691617) site.
|
||||||
|
|
||||||
For on-premises applications there are two options to enable conditional access control based on a device's compliance state:
|
For on-premises applications there are two options to enable conditional access control based on a device's compliance state:
|
||||||
|
|
||||||
- For on-premises applications that are published through the Azure AD Application Proxy, you can configure conditional access control policies as you would for cloud applications. For more details, see the [Azure AD Conditional Access preview updated: Now supports On-Premises and Custom LOB apps](https://go.microsoft.com/fwlink/p/?LinkId=691618) blog post.
|
- For on-premises applications that are published through the Azure AD Application Proxy, you can configure conditional access control policies as you would for cloud applications. For more details, see the [Azure AD Conditional Access preview updated: Now supports On-Premises and Custom LOB apps](https://go.microsoft.com/fwlink/p/?LinkId=691618) blog post.
|
||||||
- Additionally, Azure AD Connect will sync device compliance information from Azure AD to on-premises AD. ADFS on Windows Server 2016 will support conditional access control based on a device's compliance state. IT pros will configure conditional access control policies in ADFS that use the device's compliance state reported by a compatible MDM solution to secure on-premises applications.
|
- Additionally, Azure AD Connect will sync device compliance information from Azure AD to on-premises AD. ADFS on Windows Server 2016 will support conditional access control based on a device's compliance state. IT pros will configure conditional access control policies in ADFS that use the device's compliance state reported by a compatible MDM solution to secure on-premises applications.
|
||||||
|
|
||||||

|
:::image type="content" alt-text="figure 13" source="images/hva-fig12-conditionalaccess12.png":::
|
||||||
|
|
||||||
The following process describes how Azure AD conditional access works:
|
The following process describes how Azure AD conditional access works:
|
||||||
|
|
||||||
@ -759,7 +777,7 @@ The following process describes how Azure AD conditional access works:
|
|||||||
13. If the device is compliant and the user is authorized, an access token is generated.
|
13. If the device is compliant and the user is authorized, an access token is generated.
|
||||||
14. User can access the corporate managed asset.
|
14. User can access the corporate managed asset.
|
||||||
|
|
||||||
For more information about Azure AD join, see the [Azure AD & Windows 10: Better Together for Work or School](https://go.microsoft.com/fwlink/p/?LinkId=691619) white paper.
|
For more information about Azure AD join, see [Azure AD & Windows 10: Better Together for Work or School](https://go.microsoft.com/fwlink/p/?LinkId=691619), a white paper.
|
||||||
|
|
||||||
Conditional access control is a topic that many organizations and IT pros may not know as well as they should. The different attributes that describe a user, a device, compliance, and context of access are very powerful when used with a conditional access engine. Conditional access control is an essential step that helps organizations secure their environment.
|
Conditional access control is a topic that many organizations and IT pros may not know as well as they should. The different attributes that describe a user, a device, compliance, and context of access are very powerful when used with a conditional access engine. Conditional access control is an essential step that helps organizations secure their environment.
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user