diff --git a/windows/keep-secure/add-apps-to-protected-list-using-custom-uri.md b/windows/keep-secure/add-apps-to-protected-list-using-custom-uri.md index ad269e01f3..e6afa14428 100644 --- a/windows/keep-secure/add-apps-to-protected-list-using-custom-uri.md +++ b/windows/keep-secure/add-apps-to-protected-list-using-custom-uri.md @@ -59,28 +59,41 @@ You can add apps to your Windows Information Protection (WIP) protected app list ![Local security snap-in, showing the Export Policies option](images/wip-applocker-secpol-export-rules.png) - +5. Click **OK** to save your setting info in the **Add Row** blade, and then click **OK** in the **Custom OMA-URI Settings** blade to save the setting with your policy. + +6. Click **Create** to create the policy, including your OMA_URI info. + + After saving the policy, you’ll need to deploy it to your employee’s devices. For more info, see the [Deploy your Windows Information Protection (WIP) policy](deploy-wip-policy-using-intune.md) topic. ## Add Desktop apps 1. Open the Local Security Policy snap-in (SecPol.msc). @@ -122,28 +135,41 @@ After saving the policy, you’ll need to deploy it to your employee’s devices ![Local security snap-in, showing the Export Policies option](images/wip-applocker-secpol-export-rules-desktop.png) - + 2. Copy the text that includes the **Type** of `Exe` within the **RuleCollection** tags, pasting this info into the **Value** box. For example: + + ``` + + ``` + +5. Click **OK** to save your setting info in the **Add Row** blade, and then click **OK** in the **Custom OMA-URI Settings** blade to save the setting with your policy. + +6. Click **Create** to create the policy, including your OMA_URI info. + + After saving the policy, you’ll need to deploy it to your employee’s devices. For more info, see the [Deploy your Windows Information Protection (WIP) policy](deploy-wip-policy-using-intune.md) topic. >[!NOTE] >Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Contributing to TechNet content](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md). diff --git a/windows/keep-secure/images/wip-azure-configure-dekstop-apps-using-uri.png b/windows/keep-secure/images/wip-azure-configure-dekstop-apps-using-uri.png new file mode 100644 index 0000000000..eef6b1efd0 Binary files /dev/null and b/windows/keep-secure/images/wip-azure-configure-dekstop-apps-using-uri.png differ diff --git a/windows/keep-secure/images/wip-azure-configure-store-apps-using-uri.png b/windows/keep-secure/images/wip-azure-configure-store-apps-using-uri.png new file mode 100644 index 0000000000..5ed595983a Binary files /dev/null and b/windows/keep-secure/images/wip-azure-configure-store-apps-using-uri.png differ diff --git a/windows/keep-secure/images/wip-azure-vpn-configure-policy.png b/windows/keep-secure/images/wip-azure-vpn-configure-policy.png index fdc9d4e7c8..2ecd78f1ca 100644 Binary files a/windows/keep-secure/images/wip-azure-vpn-configure-policy.png and b/windows/keep-secure/images/wip-azure-vpn-configure-policy.png differ