mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 22:37:22 +00:00
Merge remote-tracking branch 'refs/remotes/origin/master' into sh-1607
This commit is contained in:
commit
3e3048bf33
@ -19,6 +19,10 @@ ms.sitesec: library
|
||||
|
||||
Use Internet Explorer to collect data on computers running Windows Internet Explorer 8 through Internet Explorer 11 on Windows 10, Windows 8.1, or Windows 7. This inventory information helps you build a list of websites used by your company so you can make more informed decisions about your IE deployments, including figuring out which sites might be at risk or require overhauls during future upgrades.
|
||||
|
||||
>**Upgrade Analytics and Windows upgrades**<br>
|
||||
>You can use Upgrade Analytics to help manage your Windows 10 upgrades on devices running Windows 8.1 and Windows 7 (SP1). You can also use Upgrade Analytics to review several site discovery reports. Check out Upgrade Analytics from [here](https://technet.microsoft.com/en-us/itpro/windows/deploy/upgrade-analytics-get-started).
|
||||
|
||||
|
||||
## Before you begin
|
||||
Before you start, you need to make sure you have the following:
|
||||
|
||||
|
@ -34,6 +34,7 @@
|
||||
### [General guidance and best practices for Windows Information Protection (WIP)](guidance-and-best-practices-wip.md)
|
||||
#### [Mandatory tasks and settings required to turn on Windows Information Protection (WIP)](mandatory-settings-for-wip.md)
|
||||
#### [Enlightened apps for use with Windows Information Protection (WIP)](enlightened-microsoft-apps-and-wip.md)
|
||||
#### [Unenlightened and enlightened app behavior while using Windows Information Protection (WIP)](app-behavior-with-wip.md)
|
||||
#### [Testing scenarios for Windows Information Protection (WIP)](testing-scenarios-for-wip.md)
|
||||
#### [Limitations while using Windows Information Protection (WIP)](limitations-with-wip.md)
|
||||
## [Use Windows Event Forwarding to help with intrusion detection](use-windows-event-forwarding-to-assist-in-instrusion-detection.md)
|
||||
|
131
windows/keep-secure/app-behavior-with-wip.md
Normal file
131
windows/keep-secure/app-behavior-with-wip.md
Normal file
@ -0,0 +1,131 @@
|
||||
---
|
||||
title: Unenlightened and enlightened app behavior while using Windows Information Protection (WIP) (Windows 10)
|
||||
description: How unenlightened and enlightened apps might behave, based on Windows Information Protection (WIP) networking policies, app configuration, and potentially whether the app connects to network resources directly by using IP addresses or by using hostnames.
|
||||
keywords: WIP, Enterprise Data Protection, EDP, Windows Information Protection, unenlightened apps, enlightened apps
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: explore
|
||||
ms.pagetype: security
|
||||
ms.sitesec: library
|
||||
localizationpriority: high
|
||||
---
|
||||
|
||||
# Unenlightened and enlightened app behavior while using Windows Information Protection (WIP)
|
||||
**Applies to:**
|
||||
|
||||
- Windows 10, version 1607
|
||||
- Windows 10 Mobile
|
||||
|
||||
Windows Information Protection (WIP) classifies apps into two categories: enlightened and unenlightened. Enlighted apps can differentiate between corporate and personal data, correctly determining which to protect based on internal policies. Corporate data is encrypted on the managed device and attempts to copy/paste or share this information with non-corporate apps or people will fail. Unenlightened apps, when marked as corporate-managed, consider all data corporate and encrypt everything by default.
|
||||
|
||||
To avoid the automatic encryption of data, developers can enlighten apps by adding and compiling code using the Windows Information Protection application programming interfaces. The most likely candidates for enlightenment are apps that:
|
||||
|
||||
- Don’t use common controls for saving files.
|
||||
- Don’t use common controls for text boxes.
|
||||
- Simultaneously work on personal and corporate data (for example, contact apps that display personal and corporate data in a single view or a browser that displays personal and corporate web pages on tabs within a single instance).
|
||||
|
||||
We strongly suggest that the only unenlightened apps you add to your allowed apps list are Line-of-Business (LOB) apps.
|
||||
|
||||
>[!Note]
|
||||
>For more info about creating enlightened apps, see the [Windows Information Protection (WIP)](https://msdn.microsoft.com/en-us/windows/uwp/enterprise/wip-hub) topic in the Windows Dev Center.
|
||||
|
||||
## Unenlightened app behavior
|
||||
This table includes info about how unenlightened apps might behave, based on your Windows Information Protection (WIP) networking policies, your app configuration, and potentially whether the app connects to network resources directly by using IP addresses or by using hostnames.
|
||||
|
||||
<table>
|
||||
<tr>
|
||||
<th>App rule setting</th>
|
||||
<th align="center" colspan="2">Networking policy configuration</th>
|
||||
</tr>
|
||||
<tr>
|
||||
<th> </th>
|
||||
<th align="center">Name-based policies, without the <code>/*AppCompat*/</code> string</th>
|
||||
<th align="center">Name-based policies, using the <code>/*AppCompat*/</code> string or proxy-based policies</th>
|
||||
</tr>
|
||||
<tr align="left">
|
||||
<td><strong>Not required.</strong> App connects to enterprise cloud resources directly, using an IP address.</td>
|
||||
<td>
|
||||
<ul>
|
||||
<li>App is entirely blocked from both personal and enterprise cloud resources.</li>
|
||||
<li>No encryption is applied.</li>
|
||||
<li>App can’t access local Work files.</li>
|
||||
</ul>
|
||||
</td>
|
||||
<td>
|
||||
<ul>
|
||||
<li>App can access both personal and enterprise cloud resources. However, you might encounter apps using policies that restrict access to enterprise cloud resources.</li>
|
||||
<li>No encryption is applied.</li>
|
||||
<li>App can’t access local Work files.</li>
|
||||
</ul>
|
||||
</td>
|
||||
</tr>
|
||||
<tr align="left">
|
||||
<td><strong>Not required.</strong> App connects to enterprise cloud resources, using a hostname.</td>
|
||||
<td colspan="2">
|
||||
<ul>
|
||||
<li>App is blocked from accessing enterprise cloud resources, but can access other network resources.</li>
|
||||
<li>No encryption is applied.</li>
|
||||
<li>App can’t access local Work files.</li>
|
||||
</ul>
|
||||
</td>
|
||||
</tr>
|
||||
<tr align="left">
|
||||
<td><strong>Allow.</strong> App connects to enterprise cloud resources, using an IP address or a hostname.</td>
|
||||
<td colspan="2">
|
||||
<ul>
|
||||
<li>App can access both personal and enterprise cloud resources.</li>
|
||||
<li>Auto-encryption is applied.</li>
|
||||
<li>App can access local Work files.</li>
|
||||
</ul>
|
||||
</td>
|
||||
</tr>
|
||||
<tr align="left" colspan="2">
|
||||
<td><strong>Exempt.</strong> App connects to enterprise cloud resources, using an IP address or a hostname.</td>
|
||||
<td colspan="2">
|
||||
<ul>
|
||||
<li>App can access both personal and enterprise cloud resources.</li>
|
||||
<li>No encryption is applied.</li>
|
||||
<li>App can access local Work files.</li>
|
||||
</ul>
|
||||
</td>
|
||||
</tr>
|
||||
</table>
|
||||
|
||||
## Enlightened app behavior
|
||||
This table includes info about how enlightened apps might behave, based on your Windows Information Protection (WIP) networking policies, your app configuration, and potentially whether the app connects to network resources directly by using IP addresses or by using hostnames.
|
||||
|
||||
<table>
|
||||
<tr>
|
||||
<th>App rule setting</th>
|
||||
<th>Networking policy configuration for name-based policies, possibly using the <code>/*AppCompat*/</code> string, or proxy-based policies</th>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><strong>Not required.</strong> App connects to enterprise cloud resources, using an IP address or a hostname.</td>
|
||||
<td>
|
||||
<ul>
|
||||
<li>App is blocked from accessing enterprise cloud resources, but can access other network resources.</li>
|
||||
<li>No encryption is applied.</li>
|
||||
<li>App can't access local Work files.</li>
|
||||
</ul>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><strong>Allow.</strong> App connects to enterprise cloud resources, using an IP address or a hostname.</td>
|
||||
<td>
|
||||
<ul>
|
||||
<li>App can access both personal and enterprise cloud resources.</li>
|
||||
<li>App protects work data and leaves personal data unprotected.</li>
|
||||
<li>App can access local Work files.</li>
|
||||
</ul>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><strong>Exempt.</strong> App connects to enterprise cloud resources, using an IP address or a hostname.</td>
|
||||
<td>
|
||||
<ul>
|
||||
<li>App can access both personal and enterprise cloud resources.</li>
|
||||
<li>App protects work data and leaves personal data unprotected.</li>
|
||||
<li>App can access local Work files.</li>
|
||||
</ul>
|
||||
</td>
|
||||
</tr>
|
||||
</table>
|
@ -16,6 +16,7 @@ This topic lists new and updated topics in the [Keep Windows 10 secure](index.md
|
||||
|
||||
| New or changed topic | Description |
|
||||
| --- | --- |
|
||||
|[Unenlightened and enlightened app behavior while using Windows Information Protection (WIP)](app-behavior-with-wip.md) |New |
|
||||
|[VPN technical guide](vpn-guide.md) | Multiple new topics, replacing previous **VPN profile options** topic |
|
||||
|
||||
## September 2016
|
||||
|
Loading…
x
Reference in New Issue
Block a user