mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 21:37:22 +00:00
Merge remote-tracking branch 'refs/remotes/origin/master' into wsfb-7611326
This commit is contained in:
commit
98f68b57a7
@ -695,6 +695,7 @@ Also…
|
|||||||
- The UE-V Windows PowerShell feature of the UE-V Agent requires .NET Framework 4 or higher and Windows PowerShell 3.0 or higher to be enabled. Download Windows PowerShell 3.0 [here](http://go.microsoft.com/fwlink/?LinkId=309609).
|
- The UE-V Windows PowerShell feature of the UE-V Agent requires .NET Framework 4 or higher and Windows PowerShell 3.0 or higher to be enabled. Download Windows PowerShell 3.0 [here](http://go.microsoft.com/fwlink/?LinkId=309609).
|
||||||
|
|
||||||
- Install .NET Framework 4 or .NET Framework 4.5 on computers that run the Windows 7 or the Windows Server 2008 R2 operating system. The Windows 8, Windows 8.1, and Windows Server 2012 operating systems come with .NET Framework 4.5 installed. The Windows 10 operating system comes with .NET Framework 4.6 installed.
|
- Install .NET Framework 4 or .NET Framework 4.5 on computers that run the Windows 7 or the Windows Server 2008 R2 operating system. The Windows 8, Windows 8.1, and Windows Server 2012 operating systems come with .NET Framework 4.5 installed. The Windows 10 operating system comes with .NET Framework 4.6 installed.
|
||||||
|
- The “Delete Roaming Cache” policy for Mandatory profiles is not supported with UE-V and should not be used.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -16,6 +16,7 @@ This topic lists new and updated topics in the [Keep Windows 10 secure](index.md
|
|||||||
|
|
||||||
|New or changed topic | Description |
|
|New or changed topic | Description |
|
||||||
|----------------------|-------------|
|
|----------------------|-------------|
|
||||||
|
|[Create an enterprise data protection (EDP) policy using Microsoft Intune](create-edp-policy-using-intune.md) |Added an update about needing to reconfigure your enterprise data protection app rules after delivery of the June service update. |
|
||||||
| [Windows Firewall with Advanced Security](windows-firewall-with-advanced-security.md) (multiple topics) | New |
|
| [Windows Firewall with Advanced Security](windows-firewall-with-advanced-security.md) (multiple topics) | New |
|
||||||
| [Advanced security audit policy settings](advanced-security-audit-policy-settings.md) (mutiple topics) | New security monitoring reference topics |
|
| [Advanced security audit policy settings](advanced-security-audit-policy-settings.md) (mutiple topics) | New security monitoring reference topics |
|
||||||
|
|
||||||
|
@ -19,6 +19,9 @@ author: eross-msft
|
|||||||
|
|
||||||
Microsoft Intune helps you create and deploy your enterprise data protection (EDP) policy, including letting you choose your protected apps, your EDP-protection level, and how to find enterprise data on the network.
|
Microsoft Intune helps you create and deploy your enterprise data protection (EDP) policy, including letting you choose your protected apps, your EDP-protection level, and how to find enterprise data on the network.
|
||||||
|
|
||||||
|
## Important note about the June service update
|
||||||
|
We've received some great feedback from you, our Windows 10 Insider Preview customers, about our enterprise data protection experiences and processes. Because of that feedback, we're delighted to deliver an enhanced apps policy experience with the June service update. This means that when you open an existing enterprise data protection policy after we release the June service update in your test environment, your existing Windows 10 enterprise data protection app rules (formerly in the **Protected Apps** area) will be removed.<p>To prepare for this change, we recommend that you make an immediate backup of your current app rules as they are today, so you can use them to help reconfigure your app rules with the enhanced experience. When you open an existing enterprise data protection policy after we release the June service update, you'll get a dialog box telling you about this change. Click the **OK** button to close the box and to begin reconfiguring your app rules.<p><p>Note that if you exit the **Policy** page before you've saved your new policy, your existing deployments won't be affected. However, if you save the policy without reconfiguring your apps, an updated policy will be deployed to your employees with an empty app rules list.
|
||||||
|
|
||||||
## Add an EDP policy
|
## Add an EDP policy
|
||||||
After you’ve installed and set up Intune for your organization, you must create an EDP-specific policy.
|
After you’ve installed and set up Intune for your organization, you must create an EDP-specific policy.
|
||||||
|
|
||||||
@ -38,9 +41,9 @@ During the policy-creation process in Intune, you can choose the apps you want t
|
|||||||
|
|
||||||
The steps to add your apps are based on the type of app it is; either a Universal Windows Platform (UWP) app, or a signed Desktop app, also known as a Classic Windows application.
|
The steps to add your apps are based on the type of app it is; either a Universal Windows Platform (UWP) app, or a signed Desktop app, also known as a Classic Windows application.
|
||||||
|
|
||||||
**Important**<br>EDP-aware apps are expected to prevent enterprise data from going to unprotected network locations and to avoid encrypting personal data. On the other hand, EDP-unaware apps might not respect the corporate network boundary and will encrypt all files they create or modify, meaning that they could encrypt personal data and cause data loss during the revocation process. Care must be taken to get a support statement from the software provider that their app is safe with EDP before adding it to your **Protected App** list.
|
>**Important**<br>EDP-aware apps are expected to prevent enterprise data from going to unprotected network locations and to avoid encrypting personal data. On the other hand, EDP-unaware apps might not respect the corporate network boundary and will encrypt all files they create or modify, meaning that they could encrypt personal data and cause data loss during the revocation process. Care must be taken to get a support statement from the software provider that their app is safe with EDP before adding it to your **Protected App** list.<p>
|
||||||
<p>
|
|
||||||
**Note**<br>If you want to use **File hash** or **Path** rules, instead of Publisher rules, you must follow the steps in the [Add multiple apps to your enterprise data protection (EDP) Protected Apps list](add-apps-to-protected-list-using-custom-uri.md) topic.
|
>**Note**<br>If you want to use **File hash** or **Path** rules, instead of Publisher rules, you must follow the steps in the [Add multiple apps to your enterprise data protection (EDP) Protected Apps list](add-apps-to-protected-list-using-custom-uri.md) topic.
|
||||||
|
|
||||||
**To add a UWP app**
|
**To add a UWP app**
|
||||||
|
|
||||||
@ -50,8 +53,9 @@ The steps to add your apps are based on the type of app it is; either a Universa
|
|||||||
|
|
||||||
**To find the Publisher and Product name values for Microsoft Store apps without installing them**
|
**To find the Publisher and Product name values for Microsoft Store apps without installing them**
|
||||||
|
|
||||||
1. Go to the [Windows Store for Business](http://go.microsoft.com/fwlink/p/?LinkID=722910) website, and find your app. For example, Microsoft OneNote.<p>
|
1. Go to the [Windows Store for Business](http://go.microsoft.com/fwlink/p/?LinkID=722910) website, and find your app. For example, Microsoft OneNote.
|
||||||
**Note**<br>If your app is already installed on desktop devices, you can use the AppLocker local security policy MMC snap-in to gather the info for adding the app to the **Protected App** list. For info about how to do this, see the [Add multiple apps to your enterprise data protection (EDP) Protected Apps list](add-apps-to-protected-list-using-custom-uri.md) topic.
|
|
||||||
|
>**Note**<br>If your app is already installed on desktop devices, you can use the AppLocker local security policy MMC snap-in to gather the info for adding the app to the **Protected App** list. For info about how to do this, see the [Add multiple apps to your enterprise data protection (EDP) Protected Apps list](add-apps-to-protected-list-using-custom-uri.md) topic.
|
||||||
|
|
||||||
2. Copy the ID value from the app URL. For example, Microsoft OneNote's ID URL is https://www.microsoft.com/store/apps/onenote/9wzdncrfhvjl, and you'd copy the ID value, `9wzdncrfhvjl`.
|
2. Copy the ID value from the app URL. For example, Microsoft OneNote's ID URL is https://www.microsoft.com/store/apps/onenote/9wzdncrfhvjl, and you'd copy the ID value, `9wzdncrfhvjl`.
|
||||||
|
|
||||||
@ -78,7 +82,8 @@ The steps to add your apps are based on the type of app it is; either a Universa
|
|||||||
**To find the Publisher and Product name values for apps installed on Windows 10 Mobile phones**
|
**To find the Publisher and Product name values for apps installed on Windows 10 Mobile phones**
|
||||||
|
|
||||||
1. If you need to add mobile apps that aren't distributed through the Store for Business, you must use the **Windows Device Portal** feature.
|
1. If you need to add mobile apps that aren't distributed through the Store for Business, you must use the **Windows Device Portal** feature.
|
||||||
<p>**Note**<br>Your PC and phone must be on the same wireless network.
|
|
||||||
|
>**Note**<br>Your PC and phone must be on the same wireless network.
|
||||||
|
|
||||||
2. On the Windows Phone, go to **Settings**, choose **Update & security**, and then choose **For developers**.
|
2. On the Windows Phone, go to **Settings**, choose **Update & security**, and then choose **For developers**.
|
||||||
|
|
||||||
@ -93,7 +98,8 @@ The steps to add your apps are based on the type of app it is; either a Universa
|
|||||||
7. Start the app for which you're looking for the publisher and product name values
|
7. Start the app for which you're looking for the publisher and product name values
|
||||||
|
|
||||||
8. Copy the `publisherCertificateName` value and paste it into the **Publisher Name** box and the `packageIdentityName` value into the **Product Name** box of Intune.
|
8. Copy the `publisherCertificateName` value and paste it into the **Publisher Name** box and the `packageIdentityName` value into the **Product Name** box of Intune.
|
||||||
<p>**Important**<br>The JSON file might also return a `windowsPhoneLegacyId` value for both the **Publisher Name** and **Product Name** boxes. This means that you have an app that’s using a XAP package and that you must set the **Product Name** as `windowsPhoneLegacyId`, and set the **Publisher Name** as “CN=” followed by the `windowsPhoneLegacyId`.
|
|
||||||
|
>**Important**<br>The JSON file might also return a `windowsPhoneLegacyId` value for both the **Publisher Name** and **Product Name** boxes. This means that you have an app that’s using a XAP package and that you must set the **Product Name** as `windowsPhoneLegacyId`, and set the **Publisher Name** as “CN=” followed by the `windowsPhoneLegacyId`.
|
||||||
<p>For example:<br>
|
<p>For example:<br>
|
||||||
``` json
|
``` json
|
||||||
{
|
{
|
||||||
@ -239,11 +245,11 @@ If you have multiple domains, you must separate them with the "|" character. For
|
|||||||

|

|
||||||
|
|
||||||
## Choose where apps can access enterprise data
|
## Choose where apps can access enterprise data
|
||||||
After you've added a protection level to your apps, you'll need to decide where those apps can access enterprise data on your network. There are 6 options, including your network domain, cloud domain, proxy server, internal proxy server, IPv4 range, and IPv6 range.<p>
|
After you've added a protection level to your apps, you'll need to decide where those apps can access enterprise data on your network. There are 6 options, including your network domain, cloud domain, proxy server, internal proxy server, IPv4 range, and IPv6 range.
|
||||||
**Important**<br>
|
|
||||||
- Every EDP policy should include policy that defines your enterprise network locations.
|
|
||||||
|
|
||||||
- Classless Inter-Domain Routing (CIDR) notation isn’t supported for EDP configurations.
|
>**Important**<br>
|
||||||
|
- Every EDP policy should include policy that defines your enterprise network locations.<p>
|
||||||
|
- Classless Inter-Domain Routing (CIDR) notation isn’t supported for EDP configurations.
|
||||||
|
|
||||||
**To specify where your protected apps can find and send enterprise data on the network**
|
**To specify where your protected apps can find and send enterprise data on the network**
|
||||||
|
|
||||||
|
BIN
windows/keep-secure/images/edp-intune-app-reconfig-warning.png
Normal file
BIN
windows/keep-secure/images/edp-intune-app-reconfig-warning.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 11 KiB |
Loading…
x
Reference in New Issue
Block a user