diff --git a/windows/security/information-protection/windows-information-protection/app-behavior-with-wip.md b/windows/security/information-protection/windows-information-protection/app-behavior-with-wip.md index 966c02209f..e69017b1e0 100644 --- a/windows/security/information-protection/windows-information-protection/app-behavior-with-wip.md +++ b/windows/security/information-protection/windows-information-protection/app-behavior-with-wip.md @@ -33,18 +33,15 @@ To avoid the automatic encryption of data, developers can enlighten apps by addi We strongly suggest that the only unenlightened apps you add to your allowed apps list are Line-of-Business (LOB) apps. ->[!IMPORTANT] ->After revoking WIP, unenlightened apps will have to be uninstalled and re-installed since their settings files will remain encrypted. - ->[!Note] ->For more info about creating enlightened apps, see the [Windows Information Protection (WIP)](/windows/uwp/enterprise/wip-hub) topic in the Windows Dev Center. +> [!IMPORTANT] +> After revoking WIP, unenlightened apps will have to be uninstalled and re-installed since their settings files will remain encrypted. For more info about creating enlightened apps, see the [Windows Information Protection (WIP)](/windows/uwp/enterprise/wip-hub) topic in the Windows Dev Center. ## Unenlightened app behavior This table includes info about how unenlightened apps might behave, based on your Windows Information Protection (WIP) networking policies, your app configuration, and potentially whether the app connects to network resources directly by using IP addresses or by using hostnames. |App rule setting|Networking policy configuration| |--- |--- | -|**Not required.** App connects to enterprise cloud resources directly, using an IP address.|

**Name-based policies, without the /*AppCompat*/ string:**

  • App is entirely blocked from both personal and enterprise cloud resources.
  • No encryption is applied.
  • App can’t access local Work files.

    **Name-based policies, using the /*AppCompat*/ string or proxy-based policies:**

  • App can access both personal and enterprise cloud resources. However, you might encounter apps using policies that restrict access to enterprise cloud resources.
  • No encryption is applied.
  • App can’t access local Work files.| +|**Not required.** App connects to enterprise cloud resources directly, using an IP address.| **Name-based policies, without the `/*AppCompat*/` string:**
  • App is entirely blocked from both personal and enterprise cloud resources.
  • No encryption is applied.
  • App can’t access local Work files.

    **Name-based policies, using the `/*AppCompat*/` string or proxy-based policies:**
  • App can access both personal and enterprise cloud resources. However, you might encounter apps using policies that restrict access to enterprise cloud resources.
  • No encryption is applied.
  • App can’t access local Work files.| |**Not required.** App connects to enterprise cloud resources, using a hostname.|
  • App is blocked from accessing enterprise cloud resources, but can access other network resources.
  • No encryption is applied.
  • App can’t access local Work files.| |**Allow.** App connects to enterprise cloud resources, using an IP address or a hostname.|
  • App can access both personal and enterprise cloud resources.
  • Auto-encryption is applied.
  • App can access local Work files.| |**Exempt.** App connects to enterprise cloud resources, using an IP address or a hostname.|
  • App can access both personal and enterprise cloud resources.
  • No encryption is applied.
  • App can access local Work files.| @@ -59,4 +56,4 @@ This table includes info about how enlightened apps might behave, based on your |**Exempt.** App connects to enterprise cloud resources, using an IP address or a hostname.|
  • App can access both personal and enterprise cloud resources.
  • App protects work data and leaves personal data unprotected.
  • App can access local Work files.| >[!NOTE] ->Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Editing Windows IT professional documentation](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md). \ No newline at end of file +>Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Editing Windows IT professional documentation](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md).