mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-21 17:57:22 +00:00
changed to azure terminology
This commit is contained in:
parent
39429ac311
commit
4bbe03bf0a
@ -28,13 +28,13 @@ Follow these steps to create the VPN policy you want to use with WIP.
|
||||
|
||||

|
||||
|
||||
2. In the **Create Profile** pane, type *Contoso_VPN_Win10* into the **Name** box, add an optional description for your policy into the **Description** box, select **Windows 10 and later** from the **Platform** dropdown box, select **Custom** from the **Profile type** dropdown box, and then click **Configure**.
|
||||
2. In the **Create Profile** blade, type *Contoso_VPN_Win10* into the **Name** box, add an optional description for your policy into the **Description** box, select **Windows 10 and later** from the **Platform** dropdown box, select **Custom** from the **Profile type** dropdown box, and then click **Configure**.
|
||||
|
||||

|
||||

|
||||
|
||||
3. In the **Custom OMA-URI Settings** pane, click **Add**.
|
||||
3. In the **Custom OMA-URI Settings** blade, click **Add**.
|
||||
|
||||
4. In the **Add Row** pane, type:
|
||||
4. In the **Add Row** blade, type:
|
||||
|
||||
- **Name.** Type _EDPModeID_ as the name.
|
||||
|
||||
@ -48,7 +48,7 @@ Follow these steps to create the VPN policy you want to use with WIP.
|
||||
|
||||

|
||||
|
||||
5. Click **OK** to save your setting info in the **Add Row** pane, and then click **OK** in the **Custom OMA-URI Settings** pane to save the setting with your policy.
|
||||
5. Click **OK** to save your setting info in the **Add Row** blade, and then click **OK** in the **Custom OMA-URI Settings** blade to save the setting with your policy.
|
||||
|
||||
6. Click **Create** to create the policy, including your OMA_URI info.
|
||||
|
||||
@ -57,9 +57,9 @@ After you’ve created your VPN policy, you'll need to deploy it to the same gro
|
||||
|
||||
**To deploy your Custom VPN policy**
|
||||
|
||||
1. On the **App policy** pane, click your newly-created policy, click **User groups** from the menu that appears, and then click **Add user group**.
|
||||
1. On the **App policy** blade, click your newly-created policy, click **User groups** from the menu that appears, and then click **Add user group**.
|
||||
|
||||
A list of user groups, made up of all of the security groups in your Azure Active Directory, appear in the **Add user group** pane.
|
||||
A list of user groups, made up of all of the security groups in your Azure Active Directory, appear in the **Add user group** blade.
|
||||
|
||||
2. Choose the group you want your policy to apply to, and then click **Select** to deploy the policy.
|
||||
|
||||
|
@ -36,14 +36,14 @@ After you’ve set up Intune for your organization, you must create a WIP-specif
|
||||
|
||||
- **Enrollment state.** Choose **With enrollment** as the enrollment state for your policy.
|
||||
|
||||

|
||||

|
||||
|
||||
3. Click **Create**.
|
||||
|
||||
The policy is created and appears in the table on the **App Policy** screen.
|
||||
|
||||
>[!NOTE]
|
||||
>Optionally, you can also add your apps and set your settings from the **Add a policy** pane, but for the purposes of this documentation, we recommend instead that you create the policy first, and then use the subsequent menus that become available.
|
||||
>Optionally, you can also add your apps and set your settings from the **Add a policy** blade, but for the purposes of this documentation, we recommend instead that you create the policy first, and then use the subsequent menus that become available.
|
||||
|
||||
### Add apps to your Allowed apps list
|
||||
During the policy-creation process in Intune, you can choose the apps you want to give access to your enterprise data through WIP. Apps included in this list can protect data on behalf of the enterprise and are restricted from copying or moving enterprise data to unprotected apps.
|
||||
@ -60,37 +60,37 @@ The steps to add your apps are based on the type of template being applied. You
|
||||
For this example, we’re going to add Microsoft Edge, a recommended app, to the **Allowed apps** list.
|
||||
|
||||
**To add a recommended app**
|
||||
1. From the **App policy** pane, click the name of your policy, and then click **Allowed apps** from the menu that appears.
|
||||
1. From the **App policy** blade, click the name of your policy, and then click **Allowed apps** from the menu that appears.
|
||||
|
||||
The **Allowed apps** pane appears, showing you any apps that are already included in the list for this policy.
|
||||
The **Allowed apps** blade appears, showing you any apps that are already included in the list for this policy.
|
||||
|
||||

|
||||

|
||||
|
||||
2. From the **Allowed apps** pane, click **Add apps**.
|
||||
2. From the **Allowed apps** blade, click **Add apps**.
|
||||
|
||||
The **Add apps** pane appears, showing you all **Recommended apps**.
|
||||
The **Add apps** blade appears, showing you all **Recommended apps**.
|
||||
|
||||

|
||||
|
||||
3. Select each app you want to access your enterprise data, and then click **OK**.
|
||||
|
||||
The **Allowed apps** pane updates to show you your selected apps.
|
||||
The **Allowed apps** blade updates to show you your selected apps.
|
||||
|
||||

|
||||

|
||||
|
||||
#### Add a Store app to your Allowed apps list
|
||||
For this example, we’re going to add Microsoft Power BI, a store app, to the **Allowed apps** list.
|
||||
|
||||
**To add a Store app**
|
||||
1. From the **App policy** pane, click the name of your policy, and then click **Allowed apps** from the menu that appears.
|
||||
1. From the **App policy** blade, click the name of your policy, and then click **Allowed apps** from the menu that appears.
|
||||
|
||||
The **Allowed apps** pane appears, showing you any apps that are already included in the list for this policy.
|
||||
The **Allowed apps** blade appears, showing you any apps that are already included in the list for this policy.
|
||||
|
||||
2. From the **Allowed apps** pane, click **Add apps**.
|
||||
2. From the **Allowed apps** blade, click **Add apps**.
|
||||
|
||||
3. On the **Add apps** pane, click **Store apps** from the dropdown list.
|
||||
3. On the **Add apps** blade, click **Store apps** from the dropdown list.
|
||||
|
||||
The pane changes to show boxes for you to add a publisher and app name.
|
||||
The blade changes to show boxes for you to add a publisher and app name.
|
||||
|
||||
4. Type the name of the app and the name of its publisher, and then click **OK**. For this UWP app example, the **Publisher** is `CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US` and the Product **name** is `Microsoft.MicrosoftPowerBIForWindows`.
|
||||
|
||||
@ -155,15 +155,15 @@ If you don't know the publisher or product name, you can find them for both desk
|
||||
For this example, we’re going to add WordPad, a desktop app, to the **Allowed apps** list.
|
||||
|
||||
**To add a Desktop app**
|
||||
1. From the **App policy** pane, click the name of your policy, and then click **Allowed apps** from the menu that appears.
|
||||
1. From the **App policy** blade, click the name of your policy, and then click **Allowed apps** from the menu that appears.
|
||||
|
||||
The **Allowed apps** pane appears, showing you any apps that are already included in the list for this policy.
|
||||
The **Allowed apps** blade appears, showing you any apps that are already included in the list for this policy.
|
||||
|
||||
2. From the **Allowed apps** pane, click **Add apps**.
|
||||
2. From the **Allowed apps** blade, click **Add apps**.
|
||||
|
||||
3. On the **Add apps** pane, click **Desktop apps** from the dropdown list.
|
||||
3. On the **Add apps** blade, click **Desktop apps** from the dropdown list.
|
||||
|
||||
The pane changes to show boxes for you to add the following, based on what results you want returned:
|
||||
The blade changes to show boxes for you to add the following, based on what results you want returned:
|
||||
|
||||
<table>
|
||||
<tr>
|
||||
@ -230,11 +230,11 @@ For this example, we’re going to add an AppLocker XML file to the **Allowed ap
|
||||
**To create a list of Allowed apps using the AppLocker tool**
|
||||
1. Open the Local Security Policy snap-in (SecPol.msc).
|
||||
|
||||
2. In the left pane, expand **Application Control Policies**, expand **AppLocker**, and then click **Packaged App Rules**.
|
||||
2. In the left blade, expand **Application Control Policies**, expand **AppLocker**, and then click **Packaged App Rules**.
|
||||
|
||||

|
||||
|
||||
3. Right-click in the right-hand pane, and then click **Create New Rule**.
|
||||
3. Right-click in the right-hand blade, and then click **Create New Rule**.
|
||||
|
||||
The **Create Packaged app Rules** wizard appears.
|
||||
|
||||
@ -266,7 +266,7 @@ For this example, we’re going to add an AppLocker XML file to the **Allowed ap
|
||||
|
||||

|
||||
|
||||
10. In the left pane, right-click on **AppLocker**, and then click **Export policy**.
|
||||
10. In the left blade, right-click on **AppLocker**, and then click **Export policy**.
|
||||
|
||||
The **Export policy** box opens, letting you export and save your new policy as XML.
|
||||
|
||||
@ -304,7 +304,7 @@ For this example, we’re going to add an AppLocker XML file to the **Allowed ap
|
||||
|
||||
1. From the **Allowed apps** area, click **Import apps**.
|
||||
|
||||
The pane changes to let you add your import file.
|
||||
The blade changes to let you add your import file.
|
||||
|
||||

|
||||
|
||||
@ -317,11 +317,11 @@ If you're running into compatibility issues where your app is incompatible with
|
||||
|
||||
**To exempt a Store app, a Desktop app, or an AppLocker policy file from the Allowed apps list**
|
||||
|
||||
1. From the **App policy** pane, click the name of your policy, and then click **Exempt apps** from the menu that appears.
|
||||
1. From the **App policy** blade, click the name of your policy, and then click **Exempt apps** from the menu that appears.
|
||||
|
||||
The **Exempt apps** pane appears, showing you any apps that are already included in the list for this policy.
|
||||
The **Exempt apps** blade appears, showing you any apps that are already included in the list for this policy.
|
||||
|
||||
2. From the **Exempt apps** pane, click **Add apps**.
|
||||
2. From the **Exempt apps** blade, click **Add apps**.
|
||||
|
||||
Be aware that when you exempt apps, they’re allowed to bypass the WIP restrictions and access your corporate data. To allow apps, see the [Add app rules to your policy](#add-apps-to_your-allowed-apps-list) section of this topic.
|
||||
|
||||
@ -344,11 +344,11 @@ We recommend that you start with **Silent** or **Allow Overrides** while verifyi
|
||||
|
||||
**To add your protection mode**
|
||||
|
||||
1. From the **App policy** pane, click the name of your policy, and then click **Required settings** from the menu that appears.
|
||||
1. From the **App policy** blade, click the name of your policy, and then click **Required settings** from the menu that appears.
|
||||
|
||||
The **Required settings** pane appears.
|
||||
The **Required settings** blade appears.
|
||||
|
||||

|
||||

|
||||
|
||||
|Mode |Description |
|
||||
|-----|------------|
|
||||
@ -366,9 +366,9 @@ Starting with Windows 10, version 1703, Intune automatically determines your cor
|
||||
|
||||
**To change your corporate identity**
|
||||
|
||||
1. From the **App policy** pane, click the name of your policy, and then click **Required settings** from the menu that appears.
|
||||
1. From the **App policy** blade, click the name of your policy, and then click **Required settings** from the menu that appears.
|
||||
|
||||
The **Required settings** pane appears.
|
||||
The **Required settings** blade appears.
|
||||
|
||||
2. If the identity isn’t correct, or if you need to add additional domains, type info into the **Corporate identity** field. For example, `contoso.com|newcontoso.com`.
|
||||
|
||||
@ -384,13 +384,13 @@ There are no default locations included with WIP, you must add each of your netw
|
||||
|
||||
**To define where your allowed apps can find and send enterprise data on you network**
|
||||
|
||||
1. From the **App policy** pane, click the name of your policy, and then click **Advanced settings** from the menu that appears.
|
||||
1. From the **App policy** blade, click the name of your policy, and then click **Advanced settings** from the menu that appears.
|
||||
|
||||
The **Advanced settings** pane appears.
|
||||
The **Advanced settings** blade appears.
|
||||
|
||||
2. Click **Add network boundary** from the Network perimeter area.
|
||||
|
||||
The **Add network boundary** pane appears.
|
||||
The **Add network boundary** blade appears.
|
||||
|
||||

|
||||
|
||||
@ -458,9 +458,9 @@ After you create and deploy your WIP policy to your employees, Windows begins to
|
||||
>Using a DRA certificate isn’t mandatory. However, we strongly recommend it. For more info about how to find and export your data recovery certificate, see the [Data Recovery and Encrypting File System (EFS)](https://go.microsoft.com/fwlink/p/?LinkId=761462) topic. For more info about creating and verifying your EFS DRA certificate, see the [Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate](https://tnstage.redmond.corp.microsoft.com/en-us/itpro/windows/keep-secure/create-and-verify-an-efs-dra-certificate) topic.
|
||||
|
||||
**To upload your DRA certificate**
|
||||
1. From the **App policy** pane, click the name of your policy, and then click **Advanced settings** from the menu that appears.
|
||||
1. From the **App policy** blade, click the name of your policy, and then click **Advanced settings** from the menu that appears.
|
||||
|
||||
The **Advanced settings** pane appears.
|
||||
The **Advanced settings** blade appears.
|
||||
|
||||
2. In the **Upload a Data Recovery Agent (DRA) certificate to allow recovery of encrypted data** box, click **Browse** to add a data recovery certificate for your policy.
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user