mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
added edits from Jerry
This commit is contained in:
parent
459eb1477b
commit
9950380872
@ -31,9 +31,6 @@
|
|||||||
|
|
||||||
## [Protect your enterprise data using Windows Information Protection (WIP)](windows-information-protection\protect-enterprise-data-using-wip.md)
|
## [Protect your enterprise data using Windows Information Protection (WIP)](windows-information-protection\protect-enterprise-data-using-wip.md)
|
||||||
### [Create a WIP policy using Microsoft Intune](windows-information-protection\overview-create-wip-policy.md)
|
### [Create a WIP policy using Microsoft Intune](windows-information-protection\overview-create-wip-policy.md)
|
||||||
#### [Create a WIP policy using the classic console for Microsoft Intune](windows-information-protection\create-wip-policy-using-intune.md)
|
|
||||||
##### [Deploy your WIP policy using the classic console for Microsoft Intune](windows-information-protection\deploy-wip-policy-using-intune.md)
|
|
||||||
##### [Associate and deploy a VPN policy for WIP using the classic console for Microsoft Intune](windows-information-protection\create-vpn-and-wip-policy-using-intune.md)
|
|
||||||
#### [Create a WIP policy with MDM using the Azure portal for Microsoft Intune](windows-information-protection\create-wip-policy-using-intune-azure.md)
|
#### [Create a WIP policy with MDM using the Azure portal for Microsoft Intune](windows-information-protection\create-wip-policy-using-intune-azure.md)
|
||||||
##### [Deploy your WIP policy using the Azure portal for Microsoft Intune](windows-information-protection\deploy-wip-policy-using-intune-azure.md)
|
##### [Deploy your WIP policy using the Azure portal for Microsoft Intune](windows-information-protection\deploy-wip-policy-using-intune-azure.md)
|
||||||
##### [Associate and deploy a VPN policy for WIP using the Azure portal for Microsoft Intune](windows-information-protection\create-vpn-and-wip-policy-using-intune-azure.md)
|
##### [Associate and deploy a VPN policy for WIP using the Azure portal for Microsoft Intune](windows-information-protection\create-vpn-and-wip-policy-using-intune-azure.md)
|
||||||
|
@ -1,126 +0,0 @@
|
|||||||
---
|
|
||||||
title: Associate and deploy a VPN policy for Windows Information Protection (WIP) using the classic console for Microsoft Intune (Windows 10)
|
|
||||||
description: After you've created and deployed your Windows Information Protection (WIP) policy, you can use Microsoft Intune to create and deploy your Virtual Private Network (VPN) policy, linking it to your WIP policy.
|
|
||||||
ms.assetid: d0eaba4f-6d7d-4ae4-8044-64680a40cf6b
|
|
||||||
keywords: WIP, Enterprise Data Protection
|
|
||||||
ms.prod: w10
|
|
||||||
ms.mktglfcycl: explore
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
author: justinha
|
|
||||||
ms.author: justinha
|
|
||||||
manager: dansimp
|
|
||||||
audience: ITPro
|
|
||||||
ms.collection: M365-security-compliance
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.date: 02/26/2019
|
|
||||||
---
|
|
||||||
|
|
||||||
# Associate and deploy a VPN policy for Windows Information Protection (WIP) using the classic console for Microsoft Intune
|
|
||||||
**Applies to:**
|
|
||||||
|
|
||||||
- Windows 10, version 1607 and later
|
|
||||||
- Windows 10 Mobile, version 1607 and later
|
|
||||||
|
|
||||||
After you've created and deployed your Windows Information Protection (WIP) policy, you can use Microsoft Intune to create and deploy your Virtual Private Network (VPN) policy, linking it to your WIP policy.
|
|
||||||
|
|
||||||
## Create your VPN policy using Microsoft Intune
|
|
||||||
Follow these steps to create the VPN policy you want to use with WIP.
|
|
||||||
|
|
||||||
**To create your VPN policy**
|
|
||||||
|
|
||||||
1. Open the Intune administration console, and go to the **Policy** node, and then click **Add Policy**.
|
|
||||||
|
|
||||||
2. Go to **Windows**, click the **VPN Profile (Windows 10 Desktop and Mobile and later)**, click **Create and Deploy a Custom Policy**, and then click **Create Policy**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
3. Type *Contoso_VPN_Win10* into the **Name** box, along with an optional description for your policy into the **Description** box.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
4. In the **VPN Settings** area, type the following info:
|
|
||||||
|
|
||||||
- **VPN connection name.** This name is also what appears to your employees, so it's important that it be clear and understandable.
|
|
||||||
|
|
||||||
- **Connection type.** Pick the connection type that matches your infrastructure. The options are **Pulse Secure**, **F5 Edge Client**, **Dell SonicWALL Mobile Connect**, or **Check Point Capsule VPN**.
|
|
||||||
|
|
||||||
- **VPN server description.** A descriptive name for this connection. Only you will see it, but it should be unique and readable.
|
|
||||||
|
|
||||||
- **Server IP address or FQDN.** The server's IP address or fully-qualified domain name (FQDN).
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
5. In the **Authentication** area, choose the authentication method that matches your VPN infrastructure, either **Username and Password** or **Certificates**.<p>
|
|
||||||
It's your choice whether you check the box to **Remember the user credentials at each logon**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
6. You can leave the rest of the default or blank settings, and then click **Save Policy**.
|
|
||||||
|
|
||||||
## Deploy your VPN policy using Microsoft Intune
|
|
||||||
After you’ve created your VPN policy, you'll need to deploy it to the same group you deployed your Windows Information Protection (WIP) policy.
|
|
||||||
|
|
||||||
**To deploy your VPN policy**
|
|
||||||
|
|
||||||
1. On the **Configuration policies** page, locate your newly-created policy, click to select it, and then click the **Manage Deployment** button.
|
|
||||||
|
|
||||||
2. In the left pane of the **Manage Deployment** box, click the employees or groups that should get the policy, and then click **Add**.<p>
|
|
||||||
The added people move to the **Selected Groups** list on the right-hand pane.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
3. After you've picked all of the employees and groups that should get the policy, click **OK**.<p>
|
|
||||||
The policy is deployed to the selected users' devices.
|
|
||||||
|
|
||||||
## Link your WIP and VPN policies and deploy the custom configuration policy
|
|
||||||
The final step to making your VPN configuration work with WIP, is to link your two policies together. To do this, you must first create a custom configuration policy, setting it to use your **EDPModeID** setting, and then deploying the policy to the same group you deployed your WIP and VPN policies
|
|
||||||
|
|
||||||
**To link your VPN policy**
|
|
||||||
|
|
||||||
1. Open the Intune administration console, and go to the **Policy** node, and then click **Add Policy**.
|
|
||||||
|
|
||||||
2. Go to **Windows**, click the **Custom Configuration (Windows 10 Desktop and Mobile and later)**, click **Create and Deploy a Custom Policy**, and then click **Create Policy**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
3. Type a name (required) and an optional description for your policy into the **Name** and **Description** boxes.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
4. In the **OMA-URI Settings** area, click **Add** to add your **EDPModeID** info.
|
|
||||||
|
|
||||||
5. In the **OMA-URI Settings** area, type the following info:
|
|
||||||
|
|
||||||
- **Setting name.** Type **EDPModeID** as the name.
|
|
||||||
|
|
||||||
- **Data type.** Pick the **String** data type.
|
|
||||||
|
|
||||||
- **OMA-URI.** Type `./Vendor/MSFT/VPNv2/<VPNProfileName>/EDPModeId`, replacing <*VPNProfileName*> with the name you gave to your VPN policy. For example, `./Vendor/MSFT/VPNv2/W10-Checkpoint-VPN1/EDPModeId`.
|
|
||||||
|
|
||||||
- **Value.** Your fully-qualified domain that should be used by the OMA-URI setting.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
6. Click **OK** to save your new OMA-URI setting, and then click **Save Policy.**
|
|
||||||
|
|
||||||
|
|
||||||
**To deploy your linked policy**
|
|
||||||
|
|
||||||
1. On the **Configuration policies** page, locate your newly-created policy, click to select it, and then click the **Manage Deployment** button.
|
|
||||||
|
|
||||||
2. In the left pane of the **Manage Deployment** box, click the employees or groups that should get the policy, and then click **Add**. The added people move to the **Selected Groups** list on the right-hand pane.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
3. After you've picked all of the employees and groups that should get the policy, click **OK**. The policy is deployed to the selected users' devices.
|
|
||||||
|
|
||||||
|
|
||||||
>[!NOTE]
|
|
||||||
>Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Editing Windows IT professional documentation](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md).
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
@ -12,7 +12,7 @@ manager: dansimp
|
|||||||
audience: ITPro
|
audience: ITPro
|
||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 02/28/2019
|
ms.date: 03/05/2019
|
||||||
---
|
---
|
||||||
|
|
||||||
# Create a Windows Information Protection (WIP) policy with MDM using the Azure portal for Microsoft Intune
|
# Create a Windows Information Protection (WIP) policy with MDM using the Azure portal for Microsoft Intune
|
||||||
@ -416,7 +416,9 @@ There are no default locations included with WIP, you must add each of your netw
|
|||||||
<tr>
|
<tr>
|
||||||
<td>Cloud Resources</td>
|
<td>Cloud Resources</td>
|
||||||
<td><strong>With proxy:</strong> contoso.sharepoint.com,contoso.internalproxy1.com|<br>contoso.visualstudio.com,contoso.internalproxy2.com<br><br><strong>Without proxy:</strong> contoso.sharepoint.com|contoso.visualstudio.com</td>
|
<td><strong>With proxy:</strong> contoso.sharepoint.com,contoso.internalproxy1.com|<br>contoso.visualstudio.com,contoso.internalproxy2.com<br><br><strong>Without proxy:</strong> contoso.sharepoint.com|contoso.visualstudio.com</td>
|
||||||
<td>Specify the cloud resources to be treated as corporate and protected by WIP.<br><br>For each cloud resource, you may also optionally specify a proxy server from your Internal proxy servers list to route traffic for this cloud resource. Be aware that all traffic routed through your Internal proxy servers is considered enterprise.<br><br>If you have multiple resources, you must separate them using the "|" delimiter. If you don’t use proxy servers, you must also include the "," delimiter just before the "|". For example: <code>URL <,proxy>|URL <,proxy></code>.<p>Personal applications will be able to access Enterprise Cloud Resources if the resource in the Enterprise Cloud Resource Policy has a blank space or an invalid character, such as a trailing dot in the URL. <br><br><strong>Important</strong><br>In some cases, such as when an app connects directly to a cloud resource through an IP address, Windows can’t tell whether it’s attempting to connect to an enterprise cloud resource or to a personal site. In this case, Windows blocks the connection by default. To stop Windows from automatically blocking these connections, you can add the <code>/*AppCompat*/</code> string to the setting. For example: <code>URL <,proxy>|URL <,proxy>|/*AppCompat*/</code>.<br><br>When using this string, we recommend that you also turn on [Azure Active Directory Conditional Access](https://docs.microsoft.com/azure/active-directory/active-directory-conditional-access), using the <strong>Domain joined or marked as compliant</strong> option, which blocks apps from accessing any enterprise cloud resources that are protected by conditional access.</td>
|
<td>Specify the cloud resources to be treated as corporate and protected by WIP.<br><br>For each cloud resource, you may also optionally specify a proxy server from your Internal proxy servers list to route traffic for this cloud resource. Be aware that all traffic routed through your Internal proxy servers is considered enterprise.<br><br>If you have multiple resources, you must separate them using the "|" delimiter. If you don’t use proxy servers, you must also include the "," delimiter just before the "|". For example: <code>URL <,proxy>|URL <,proxy></code>.<p>Personal applications will be able to access Enterprise Cloud Resources if the resource in the Enterprise Cloud Resource Policy has a blank space or an invalid character, such as a trailing dot in the URL. <br><br><strong>Important</strong><br>In some cases, such as when an app connects directly to a cloud resource through an IP address, Windows can’t tell whether it’s attempting to connect to an enterprise cloud resource or to a personal site. In this case, Windows blocks the connection by default. To stop Windows from automatically blocking these connections, you can add the <code>/*AppCompat*/</code> string to the setting. For example: <code>URL <,proxy>|URL <,proxy>|/*AppCompat*/</code>.<br><br><strong>Note</strong><br>To add subdomain for a cloud resource, use a period (.) instead of an asterisk (*). For example: To add all subdomains within Office.com, use ".office.com" (without the quotation marks).<br><br>When using this string, we recommend that you also turn on [Azure Active Directory Conditional Access](https://docs.microsoft.com/azure/active-directory/active-directory-conditional-access), using the <strong>Domain joined or marked as compliant</strong> option, which blocks apps from accessing any enterprise cloud resources that are protected by conditional access.</td>
|
||||||
|
|
||||||
|
<td>Specify the cloud resources to be treated as corporate and protected by WIP.<br><br>For each cloud resource, you may also optionally specify a proxy server from your Internal proxy servers list to route traffic for this cloud resource. Be aware that all traffic routed through your Internal proxy servers is considered enterprise.<br><br>If you have multiple resources, you must separate them using the "|" delimiter. If you don’t use proxy servers, you must also include the "," delimiter just before the "|". For example: <code>URL <,proxy>|URL <,proxy></code>.<p>Personal applications will be able to access Enterprise Cloud Resources if the resource in the Enterprise Cloud Resource Policy has a blank space or an invalid character, such as a trailing dot in the URL. <br><br><strong>Important</strong><br>In some cases, such as when an app connects directly to a cloud resource through an IP address, Windows can’t tell whether it’s attempting to connect to an enterprise cloud resource or to a personal site. In this case, Windows blocks the connection by default. To stop Windows from automatically blocking these connections, you can add the <code>/*AppCompat*/</code> string to the setting. For example: <code>URL <,proxy>|URL <,proxy>|/*AppCompat*/</code><br><br><strong>Note</strong><br>To add subdomain for a cloud resource, use a period (.) instead of an asterisk (*). For example: To add all subdomains within Office.com, use ".office.com" (without the quotation marks).<br><br>When you use this string, we recommend that you also turn on [Azure Active Directory Conditional Access](https://docs.microsoft.com/azure/active-directory/active-directory-conditional-access) by using the <strong>Domain joined or marked as compliant</strong> option, which blocks apps from accessing any enterprise cloud resources that are protected by conditional access.</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>Protected domains</td>
|
<td>Protected domains</td>
|
||||||
|
@ -1,484 +0,0 @@
|
|||||||
---
|
|
||||||
title: Create a Windows Information Protection (WIP) policy using the classic console for Microsoft Intune (Windows 10)
|
|
||||||
description: Microsoft Intune helps you create and deploy your Windows Information Protection (WIP) policy, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network.
|
|
||||||
ms.assetid: 4b307c99-3016-4d6a-9ae7-3bbebd26e721
|
|
||||||
ms.prod: w10
|
|
||||||
ms.mktglfcycl: explore
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
author: justinha
|
|
||||||
ms.author: justinha
|
|
||||||
manager: dansimp
|
|
||||||
audience: ITPro
|
|
||||||
ms.collection: M365-security-compliance
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.date: 02/27/2019
|
|
||||||
---
|
|
||||||
|
|
||||||
# Create a Windows Information Protection (WIP) policy using the classic console for Microsoft Intune
|
|
||||||
|
|
||||||
**Applies to:**
|
|
||||||
|
|
||||||
- Windows 10, version 1607 and later
|
|
||||||
- Windows 10 Mobile, version 1607 and later
|
|
||||||
|
|
||||||
Microsoft Intune helps you create and deploy your Windows Information Protection (WIP) policy, including letting you choose your allowed apps, your WIP-protection level, and how to find enterprise data on the network.
|
|
||||||
|
|
||||||
## Add a WIP policy
|
|
||||||
After you’ve set up Intune for your organization, you must create a WIP-specific policy.
|
|
||||||
|
|
||||||
**To add a WIP policy**
|
|
||||||
1. Open the Intune administration console, and go to the **Policy** node, and then click **Add Policy** from the **Tasks** area.
|
|
||||||
|
|
||||||
2. Go to **Windows**, click the **Windows Information Protection (Windows 10 Desktop and Mobile and later) policy**, click **Create and Deploy a Custom Policy**, and then click **Create Policy**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
3. Type a name (required) and an optional description for your policy into the **Name** and **Description** boxes.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
## Add app rules to your policy
|
|
||||||
During the policy-creation process in Intune, you can choose the apps you want to give access to your enterprise data through WIP. Apps included in this list can protect data on behalf of the enterprise and are restricted from copying or moving enterprise data to unprotected apps.
|
|
||||||
|
|
||||||
The steps to add your app rules are based on the type of rule template being applied. You can add a store app (also known as a Universal Windows Platform (UWP) app), a signed Windows desktop app, or an AppLocker policy file.
|
|
||||||
|
|
||||||
>[!Important]
|
|
||||||
>Enlightened apps are expected to prevent enterprise data from going to unprotected network locations and to avoid encrypting personal data. On the other hand, WIP-unaware apps might not respect the corporate network boundary, and WIP-unaware apps will encrypt all files they create or modify. This means that they could encrypt personal data and cause data loss during the revocation process.<p>Care must be taken to get a support statement from the software provider that their app is safe with WIP before adding it to your **App Rules** list. If you don’t get this statement, it’s possible that you could experience app compat issues due to an app losing the ability to access a necessary file after revocation.
|
|
||||||
|
|
||||||
### Add a store app rule to your policy
|
|
||||||
For this example, we’re going to add Microsoft OneNote, a store app, to the **App Rules** list.
|
|
||||||
|
|
||||||
**To add a store app**
|
|
||||||
1. From the **App Rules** area, click **Add**.
|
|
||||||
|
|
||||||
The **Add App Rule** box appears.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
2. Add a friendly name for your app into the **Title** box. In this example, it’s *Microsoft OneNote*.
|
|
||||||
|
|
||||||
3. Click **Allow** from the **Windows Information Protection mode** drop-down list.
|
|
||||||
|
|
||||||
Allow turns on WIP, helping to protect that app’s corporate data through the enforcement of WIP restrictions. Instructions for exempting an app are included in the [Exempt apps from WIP restrictions](#exempt-apps-from-wip-restrictions) section of this topic.
|
|
||||||
|
|
||||||
4. Pick **Store App** from the **Rule template** drop-down list.
|
|
||||||
|
|
||||||
The box changes to show the store app rule options.
|
|
||||||
|
|
||||||
5. Type the name of the app and the name of its publisher, and then click **OK**. For this UWP app example, the **Publisher** is `CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US` and the **Product name** is `Microsoft.Office.OneNote`.
|
|
||||||
|
|
||||||
If you don't know the publisher or product name, you can find them for both desktop devices and Windows 10 Mobile phones by following these steps.
|
|
||||||
|
|
||||||
**To find the Publisher and Product Name values for Store apps without installing them**
|
|
||||||
1. Go to the [Microsoft Store for Business](https://go.microsoft.com/fwlink/p/?LinkID=722910) website, and find your app. For example, *Microsoft OneNote*.
|
|
||||||
|
|
||||||
2. Copy the ID value from the app URL. For example, Microsoft OneNote's ID URL is https://www.microsoft.com/store/apps/onenote/9wzdncrfhvjl, and you'd copy the ID value, `9wzdncrfhvjl`.
|
|
||||||
|
|
||||||
3. In a browser, run the Store for Business portal web API, to return a JavaScript Object Notation (JSON) file that includes the publisher and product name values. For example, run https://bspmts.mp.microsoft.com/v1/public/catalog/Retail/Products/9wzdncrfhvjl/applockerdata, where `9wzdncrfhvjl` is replaced with your ID value.
|
|
||||||
|
|
||||||
The API runs and opens a text editor with the app details.
|
|
||||||
|
|
||||||
```json
|
|
||||||
{
|
|
||||||
"packageIdentityName": "Microsoft.Office.OneNote",
|
|
||||||
"publisherCertificateName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US"
|
|
||||||
}
|
|
||||||
```
|
|
||||||
|
|
||||||
4. Copy the `publisherCertificateName` value into the **Publisher Name** box and copy the `packageIdentityName` value into the **Product Name** box of Intune.
|
|
||||||
|
|
||||||
>[!Important]
|
|
||||||
>The JSON file might also return a `windowsPhoneLegacyId` value for both the **Publisher Name** and **Product Name** boxes. This means that you have an app that’s using a XAP package and that you must set the **Product Name** as `windowsPhoneLegacyId`, and set the **Publisher Name** as `CN=` followed by the `windowsPhoneLegacyId`.<p>For example:<br>
|
|
||||||
```json
|
|
||||||
{
|
|
||||||
"windowsPhoneLegacyId": "ca05b3ab-f157-450c-8c49-a1f127f5e71d",
|
|
||||||
}
|
|
||||||
```
|
|
||||||
|
|
||||||
**To find the Publisher and Product Name values for apps installed on Windows 10 mobile phones**
|
|
||||||
1. If you need to add mobile apps that aren't distributed through the Store for Business, you must use the **Windows Device Portal** feature.
|
|
||||||
|
|
||||||
>**Note**<br>Your PC and phone must be on the same wireless network.
|
|
||||||
|
|
||||||
2. On the Windows Phone, go to **Settings**, choose **Update & security**, and then choose **For developers**.
|
|
||||||
|
|
||||||
3. In the **For developers** screen, turn on **Developer mode**, turn on **Device Discovery**, and then turn on **Device Portal**.
|
|
||||||
|
|
||||||
4. Copy the URL in the **Device Portal** area into your device's browser, and then accept the SSL certificate.
|
|
||||||
|
|
||||||
5. In the **Device discovery** area, press **Pair**, and then enter the PIN into the website from the previous step.
|
|
||||||
|
|
||||||
6. On the **Apps** tab of the website, you can see details for the running apps, including the publisher and product names.
|
|
||||||
|
|
||||||
7. Start the app for which you're looking for the publisher and product name values.
|
|
||||||
|
|
||||||
8. Copy the `publisherCertificateName` value and paste it into the **Publisher Name** box and the `packageIdentityName` value into the **Product Name** box of Intune.
|
|
||||||
|
|
||||||
>[!Important]
|
|
||||||
>The JSON file might also return a `windowsPhoneLegacyId` value for both the **Publisher Name** and **Product Name** boxes. This means that you have an app that’s using a XAP package and that you must set the **Product Name** as `windowsPhoneLegacyId`, and set the **Publisher Name** as `CN=` followed by the `windowsPhoneLegacyId`.<p>For example:<br>
|
|
||||||
```json
|
|
||||||
{
|
|
||||||
"windowsPhoneLegacyId": "ca05b3ab-f157-450c-8c49-a1f127f5e71d",
|
|
||||||
}
|
|
||||||
```
|
|
||||||
|
|
||||||
### Add a desktop app rule to your policy
|
|
||||||
For this example, we’re going to add Internet Explorer, a desktop app, to the **App Rules** list.
|
|
||||||
|
|
||||||
**To add a desktop app**
|
|
||||||
1. From the **App Rules** area, click **Add**.
|
|
||||||
|
|
||||||
The **Add App Rule** box appears.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
2. Add a friendly name for your app into the **Title** box. In this example, it’s *Internet Explorer*.
|
|
||||||
|
|
||||||
3. Click **Allow** from the **Windows Information Protection mode** drop-down list.
|
|
||||||
|
|
||||||
Allow turns on WIP, helping to protect that app’s corporate data through the enforcement of WIP restrictions. Instructions for exempting an app are included in the [Exempt apps from WIP restrictions](#exempt-apps-from-wip-restrictions) section of this topic.
|
|
||||||
|
|
||||||
4. Pick **Desktop App** from the **Rule template** drop-down list.
|
|
||||||
|
|
||||||
The box changes to show the store app rule options.
|
|
||||||
|
|
||||||
5. Pick the options you want to include for the app rule (see table), and then click **OK**.
|
|
||||||
|
|
||||||
<table>
|
|
||||||
<tr>
|
|
||||||
<th>Option</th>
|
|
||||||
<th>Manages</th>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td>All fields left as “*”</td>
|
|
||||||
<td>All files signed by any publisher. (Not recommended)</td>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td><strong>Publisher</strong> selected</td>
|
|
||||||
<td>All files signed by the named publisher.<p>This might be useful if your company is the publisher and signer of internal line-of-business apps.</td>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td><strong>Publisher</strong> and <strong>Product Name</strong> selected</td>
|
|
||||||
<td>All files for the specified product, signed by the named publisher.</td>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td><strong>Publisher</strong>, <strong>Product Name</strong>, and <strong>Binary name</strong> selected</td>
|
|
||||||
<td>Any version of the named file or package for the specified product, signed by the named publisher.</td>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td><strong>Publisher</strong>, <strong>Product Name</strong>, <strong>Binary name</strong>, and <strong>File Version, and above</strong>, selected</td>
|
|
||||||
<td>Specified version or newer releases of the named file or package for the specified product, signed by the named publisher.<p>This option is recommended for enlightened apps that weren't previously enlightened.</td>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td><strong>Publisher</strong>, <strong>Product Name</strong>, <strong>Binary name</strong>, and <strong>File Version, And below</strong> selected</td>
|
|
||||||
<td>Specified version or older releases of the named file or package for the specified product, signed by the named publisher.</td>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td><strong>Publisher</strong>, <strong>Product Name</strong>, <strong>Binary name</strong>, and <strong>File Version, Exactly</strong> selected</td>
|
|
||||||
<td>Specified version of the named file or package for the specified product, signed by the named publisher.</td>
|
|
||||||
</tr>
|
|
||||||
</table>
|
|
||||||
|
|
||||||
If you’re unsure about what to include for the publisher, you can run this PowerShell command:
|
|
||||||
|
|
||||||
```ps1
|
|
||||||
Get-AppLockerFileInformation -Path "<path of the exe>"
|
|
||||||
```
|
|
||||||
Where `"<path of the exe>"` goes to the location of the app on the device. For example, `Get-AppLockerFileInformation -Path "C:\Program Files\Internet Explorer\iexplore.exe"`.
|
|
||||||
|
|
||||||
In this example, you'd get the following info:
|
|
||||||
|
|
||||||
``` json
|
|
||||||
Path Publisher
|
|
||||||
---- ---------
|
|
||||||
%PROGRAMFILES%\INTERNET EXPLORER\IEXPLORE.EXE O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US\INTERNET EXPLOR...
|
|
||||||
```
|
|
||||||
Where the text, `O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US` is the publisher name to enter in the **Publisher Name** box.
|
|
||||||
|
|
||||||
### Add an AppLocker policy file
|
|
||||||
Now we’re going to add an AppLocker XML file to the **App Rules** list. You’ll use this option if you want to add multiple apps at the same time. For more info, see [AppLocker](https://technet.microsoft.com/itpro/windows/keep-secure/applocker-overview).
|
|
||||||
|
|
||||||
**To create a Packaged App rule and xml file**
|
|
||||||
1. Open the Local Security Policy snap-in (SecPol.msc).
|
|
||||||
|
|
||||||
2. In the left pane, click **Application Control Policies** > **AppLocker** > **Packaged App Rules**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
3. Right-click **Packaged App Rules** > **Create New Rule**.
|
|
||||||
|
|
||||||
4. On the **Before You Begin** page, click **Next**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
5. On the **Permissions** page, make sure the **Action** is set to **Allow** and the **User or group** is set to **Everyone**, and then click **Next**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
6. On the **Publisher** page, click **Select** from the **Use an installed packaged app as a reference** area.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
7. In the **Select applications** box, pick the app that you want to use as the reference for your rule, and then click **OK**. For this example, we’re using Microsoft Photos.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
8. On the updated **Publisher** page, click **Create**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
9. Review the Local Security Policy snap-in to make sure your rule is correct.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
10. In the left pane, right-click on **AppLocker**, and then click **Export policy**.
|
|
||||||
|
|
||||||
The **Export policy** box opens, letting you export and save your new policy as XML.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
11. In the **Export policy** box, browse to where the policy should be stored, give the policy a name, and then click **Save**.
|
|
||||||
|
|
||||||
The policy is saved and you’ll see a message that says 1 rule was exported from the policy.
|
|
||||||
|
|
||||||
**Example XML file**<br>
|
|
||||||
This is the XML file that AppLocker creates for Microsoft Photos.
|
|
||||||
|
|
||||||
```xml
|
|
||||||
<AppLockerPolicy Version="1">
|
|
||||||
<RuleCollection Type="Exe" EnforcementMode="NotConfigured" />
|
|
||||||
<RuleCollection Type ="Msi" EnforcementMode="NotConfigured" />
|
|
||||||
<RuleCollection Type ="Script" EnforcementMode="NotConfigured" />
|
|
||||||
<RuleCollection Type ="Dll" EnforcementMode="NotConfigured" />
|
|
||||||
<RuleCollection Type ="Appx" EnforcementMode="NotConfigured">
|
|
||||||
<FilePublisherRule Id="5e0c752b-5921-4f72-8146-80ad5f582110" Name="Microsoft.Windows.Photos, version 16.526.0.0 and above, from Microsoft Corporation" Description="" UserOrGroupSid="S-1-1-0" Action="Allow">
|
|
||||||
<Conditions>
|
|
||||||
<FilePublisherCondition PublisherName="CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US" ProductName="Microsoft.Windows.Photos" BinaryName="*">
|
|
||||||
<BinaryVersionRange LowSection="16.526.0.0" HighSection="*" />
|
|
||||||
</FilePublisherCondition>
|
|
||||||
</Conditions>
|
|
||||||
</FilePublisherRule>
|
|
||||||
</RuleCollection>
|
|
||||||
</AppLockerPolicy>
|
|
||||||
```
|
|
||||||
12. After you’ve created your XML file, you need to import it by using Microsoft Intune.
|
|
||||||
|
|
||||||
**To import your Applocker policy file app rule using Microsoft Intune**
|
|
||||||
1. From the **App Rules** area, click **Add**.
|
|
||||||
|
|
||||||
The **Add App Rule** box appears.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
2. Add a friendly name for your app into the **Title** box. In this example, it’s *Allowed app list*.
|
|
||||||
|
|
||||||
3. Click **Allow** from the **Windows Information Protection mode** drop-down list.
|
|
||||||
|
|
||||||
Allow turns on WIP, helping to protect that app’s corporate data through the enforcement of WIP restrictions. Instructions for exempting an app are included in the [Exempt apps from WIP restrictions](#exempt-apps-from-wip-restrictions) section of this topic.
|
|
||||||
|
|
||||||
4. Pick **AppLocker policy file** from the **Rule template** drop-down list.
|
|
||||||
|
|
||||||
The box changes to let you import your AppLocker XML policy file.
|
|
||||||
|
|
||||||
5. Click **Import**, browse to your AppLocker XML file, click **Open**, and then click **OK** to close the **Add App Rule** box.
|
|
||||||
|
|
||||||
The file is imported and the apps are added to your **App Rules** list.
|
|
||||||
|
|
||||||
### Exempt apps from WIP restrictions
|
|
||||||
If you're running into compatibility issues where your app is incompatible with WIP, but still needs to be used with enterprise data, you can exempt the app from the WIP restrictions. This means that your apps won't include auto-encryption or tagging and won't honor your network restrictions. It also means that your exempted apps might leak.
|
|
||||||
|
|
||||||
**To exempt a store app, a desktop app, or an AppLocker policy file app rule**
|
|
||||||
1. From the **App Rules** area, click **Add**.
|
|
||||||
|
|
||||||
The **Add App Rule** box appears.
|
|
||||||
|
|
||||||
2. Add a friendly name for your app into the **Title** box. In this example, it’s *Exempt apps list*.
|
|
||||||
|
|
||||||
3. Click **Exempt** from the **Windows Information Protection mode** drop-down list.
|
|
||||||
|
|
||||||
Be aware that when you exempt apps, they’re allowed to bypass the WIP restrictions and access your corporate data. To allow apps, see the [Add app rules to your policy](#add-app-rules-to-your-policy) section of this topic.
|
|
||||||
|
|
||||||
4. Fill out the rest of the app rule info, based on the type of rule you’re adding:
|
|
||||||
|
|
||||||
- **Store app.** Follow the **Publisher** and **Product name** instructions in the [Add a store app rule to your policy](#add-a-store-app-rule-to-your-policy) section of this topic.
|
|
||||||
|
|
||||||
- **Desktop app.** Follow the **Publisher**, **Product name**, **Binary name**, and **Version** instructions in the [Add a desktop app rule to your policy](#add-a-desktop-app-rule-to-your-policy) section of this topic.
|
|
||||||
|
|
||||||
- **AppLocker policy file.** Follow the **Import** instructions in the [Add an AppLocker policy file](#add-an-applocker-policy-file) section of this topic, using a list of exempted apps.
|
|
||||||
|
|
||||||
5. Click **OK**.
|
|
||||||
|
|
||||||
## Manage the WIP protection mode for your enterprise data
|
|
||||||
After you've added the apps you want to protect with WIP, you'll need to apply a management and protection mode.
|
|
||||||
|
|
||||||
We recommend that you start with **Silent** or **Allow Overrides** while verifying with a small group that you have the right apps on your protected apps list. After you're done, you can change to your final enforcement policy, either **Allow Overrides** or **Block**.
|
|
||||||
|
|
||||||
|Mode |Description |
|
|
||||||
|-----|------------|
|
|
||||||
|Block|WIP looks for inappropriate data sharing practices and stops the employee from completing the action. This can include sharing info across non-enterprise-protected apps in addition to sharing enterprise data between other people and devices outside of your enterprise.|
|
|
||||||
|Allow Overrides|WIP looks for inappropriate data sharing, warning employees if they do something deemed potentially unsafe. However, this management mode lets the employee override the policy and share the data, logging the action to your audit log, accessible through the [Reporting CSP](https://go.microsoft.com/fwlink/p/?LinkID=746459). |
|
|
||||||
|Silent |WIP runs silently, logging inappropriate data sharing, without blocking anything that would’ve been prompted for employee interaction while in Allow Overrides mode. Unallowed actions, like apps inappropriately trying to access a network resource or WIP-protected data, are still blocked.|
|
|
||||||
|Off (not recommended) |WIP is turned off and doesn't help to protect or audit your data.<p>After you turn off WIP, an attempt is made to decrypt any WIP-tagged files on the locally attached drives. Be aware that your previous decryption and policy info isn’t automatically reapplied if you turn WIP protection back on.|
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
## Define your enterprise-managed corporate identity
|
|
||||||
Corporate identity, usually expressed as your primary Internet domain (for example, contoso.com), helps to identify and tag your corporate data from apps you’ve marked as protected by WIP. For example, emails using contoso.com are identified as being corporate and are restricted by your Windows Information Protection policies.
|
|
||||||
|
|
||||||
You can specify multiple domains owned by your enterprise by separating them with the "|" character. For example, (`contoso.com|newcontoso.com`). With multiple domains, the first one is designated as your corporate identity and all of the additional ones as being owned by the first one. We strongly recommend that you include all of your email address domains in this list.
|
|
||||||
|
|
||||||
**To add your corporate identity**
|
|
||||||
- Type the name of your corporate identity into the **Corporate identity** field. For example, `contoso.com` or `contoso.com|newcontoso.com`.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
## Choose where apps can access enterprise data
|
|
||||||
After you've added a protection mode to your apps, you'll need to decide where those apps can access enterprise data on your network.
|
|
||||||
|
|
||||||
There are no default locations included with WIP, you must add each of your network locations. This area applies to any network endpoint device that gets an IP address in your enterprise’s range and is also bound to one of your enterprise domains, including SMB shares. Local file system locations should just maintain encryption (for example, on local NTFS, FAT, ExFAT).
|
|
||||||
|
|
||||||
>[!IMPORTANT]
|
|
||||||
>Every WIP policy should include policy that defines your enterprise network locations.<br>
|
|
||||||
>Classless Inter-Domain Routing (CIDR) notation isn’t supported for WIP configurations.
|
|
||||||
|
|
||||||
**To define where your protected apps can find and send enterprise data on you network**
|
|
||||||
|
|
||||||
1. Add additional network locations your apps can access by clicking **Add**.
|
|
||||||
|
|
||||||
The **Add or edit corporate network definition** box appears.
|
|
||||||
|
|
||||||
2. Type a name for your corporate network element into the **Name** box, and then pick what type of network element it is, from the **Network element** drop-down box. This can include any of the options in the following table.
|
|
||||||
|
|
||||||

|
|
||||||
<p>
|
|
||||||
<table>
|
|
||||||
<tr>
|
|
||||||
<th>Network location type</th>
|
|
||||||
<th>Format</th>
|
|
||||||
<th>Description</th>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td>Enterprise Cloud Resources</td>
|
|
||||||
<td><strong>With proxy:</strong> contoso.sharepoint.com,contoso.internalproxy1.com|<br>contoso.visualstudio.com,contoso.internalproxy2.com<p><strong>Without proxy:</strong> contoso.sharepoint.com|contoso.visualstudio.com</td>
|
|
||||||
<td>Specify the cloud resources to be treated as corporate and protected by WIP.<p>For each cloud resource, you may also optionally specify a proxy server from your Enterprise Internal Proxy Servers list to route traffic for this cloud resource. Be aware that all traffic routed through your Enterprise Internal Proxy Servers is considered enterprise.<p>If you have multiple resources, you must separate them using the "|" delimiter. If you don’t use proxy servers, you must also include the "," delimiter just before the "|". For example: <code>URL <,proxy>|URL <,proxy></code>.<p>Personal applications will be able to access Enterprise Cloud Resources if the resource in the Enterprise Cloud Resource Policy has a blank space or an invalid character, such as a trailing dot in the URL. <p><strong>Important</strong><br>In some cases, such as when an app connects directly to a cloud resource through an IP address, Windows can’t tell whether it’s attempting to connect to an enterprise cloud resource or to a personal site. In this case, Windows blocks the connection by default. To stop Windows from automatically blocking these connections, you can add the <code>/*AppCompat*/</code> string to the setting. For example: <code>URL <,proxy>|URL <,proxy>|/*AppCompat*/</code>.<p>When using this string, we recommend that you also turn on [Azure Active Directory Conditional Access](https://docs.microsoft.com/azure/active-directory/active-directory-conditional-access), using the <strong>Domain joined or marked as compliant</strong> option, which blocks apps from accessing any enterprise cloud resources that are protected by conditional access.</td>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td>Enterprise Network Domain Names (Required)</td>
|
|
||||||
<td>corp.contoso.com,region.contoso.com</td>
|
|
||||||
<td>Specify the DNS suffixes used in your environment. All traffic to the fully-qualified domains appearing in this list will be protected.<p>This setting works with the IP ranges settings to detect whether a network endpoint is enterprise or personal on private networks.<p>If you have multiple resources, you must separate them using the "," delimiter.</td>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td>Enterprise Proxy Servers</td>
|
|
||||||
<td>proxy.contoso.com:80;proxy2.contoso.com:443</td>
|
|
||||||
<td>Specify your externally-facing proxy server addresses, along with the port through which traffic accesses the Internet.<p>This list must not include any servers listed in the Enterprise Internal Proxy Servers list, because they’re used for WIP-protected traffic.<p>This setting is also required if there’s a chance you could end up behind a proxy server on another network. In this situation, if you don't have a proxy server pre-defined, you might find that enterprise resources are unavailable to your client device, such as when you’re visiting another company and not on the guest network. To make sure this doesn’t happen, the client device also needs to be able to reach the pre-defined proxy server through the VPN network.<p>If you have multiple resources, you must separate them using the ";" delimiter.</td>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td>Enterprise Internal Proxy Servers</td>
|
|
||||||
<td>contoso.internalproxy1.com;contoso.internalproxy2.com</td>
|
|
||||||
<td>Specify the proxy servers your devices will go through to reach your cloud resources.<p>Using this server type indicates that the cloud resources you’re connecting to are enterprise resources.<p>This list shouldn’t include any servers listed in the Enterprise Proxy Servers list, which are used for non-WIP-protected traffic.<p>If you have multiple resources, you must separate them using the ";" delimiter.</td>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td>Enterprise IPv4 Range (Required, if not using IPv6)</td>
|
|
||||||
<td>**Starting IPv4 Address:** 3.4.0.1<br>**Ending IPv4 Address:** 3.4.255.254<br>**Custom URI:** 3.4.0.1-3.4.255.254,<br>10.0.0.1-10.255.255.254</td>
|
|
||||||
<td>Specify the addresses for a valid IPv4 value range within your intranet. These addresses, used with your Enterprise Network Domain Names, define your corporate network boundaries.<p>If you have multiple ranges, you must separate them using the "," delimiter.</td>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td>Enterprise IPv6 Range (Required, if not using IPv4)</td>
|
|
||||||
<td>**Starting IPv6 Address:** 2a01:110::<br>**Ending IPv6 Address:** 2a01:110:7fff:ffff:ffff:ffff:ffff:ffff<br>**Custom URI:** 2a01:110:7fff:ffff:ffff:ffff:ffff:ffff,<br>fd00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff</td>
|
|
||||||
<td>Specify the addresses for a valid IPv6 value range within your intranet. These addresses, used with your Enterprise Network Domain Names, define your corporate network boundaries.<p>If you have multiple ranges, you must separate them using the "," delimiter.</td>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td>Neutral Resources</td>
|
|
||||||
<td>sts.contoso.com,sts.contoso2.com</td>
|
|
||||||
<td>Specify your authentication redirection endpoints for your company.<p>These locations are considered enterprise or personal, based on the context of the connection before the redirection.<p>If you have multiple resources, you must separate them using the "," delimiter.</td>
|
|
||||||
</tr>
|
|
||||||
</table>
|
|
||||||
|
|
||||||
3. Add as many locations as you need, and then click **OK**.
|
|
||||||
|
|
||||||
The **Add corporate network definition** box closes.
|
|
||||||
|
|
||||||
4. Decide if you want to Windows to look for additional network settings:
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
- **Enterprise Proxy Servers list is authoritative (do not auto-detect).** Click this box if you want Windows to treat the proxy servers you specified in the network boundary definition as the complete list of proxy servers available on your network. If you clear this box, Windows will search for additional proxy servers in your immediate network.
|
|
||||||
|
|
||||||
- **Enterprise IP Ranges list is authoritative (do not auto-detect).** Click this box if you want Windows to treat the IP ranges you specified in the network boundary definition as the complete list of IP ranges available on your network. If you clear this box, Windows will search for additional IP ranges on any domain-joined devices connected to your network.
|
|
||||||
|
|
||||||
5. In the required **Upload a Data Recovery Agent (DRA) certificate to allow recovery of encrypted data** box, click **Browse** to add a data recovery certificate for your policy.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
After you create and deploy your WIP policy to your employees, Windows will begin to encrypt your corporate data on the employees’ local device drive. If somehow the employees’ local encryption keys get lost or revoked, the encrypted data can become unrecoverable. To help avoid this possibility, the DRA certificate lets Windows use an included public key to encrypt the local data, while you maintain the private key that can unencrypt the data.
|
|
||||||
|
|
||||||
For more info about how to find and export your data recovery certificate, see the [Data Recovery and Encrypting File System (EFS)](https://go.microsoft.com/fwlink/p/?LinkId=761462) topic. For more info about creating and verifying your EFS DRA certificate, see the [Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate](create-and-verify-an-efs-dra-certificate.md).
|
|
||||||
|
|
||||||
## Choose to set up Azure Rights Management with WIP
|
|
||||||
WIP can integrate with Microsoft Azure Rights Management to enable secure sharing of files via removable drives such as USB drives. For more info about Azure Rights Management, see [Microsoft Azure Rights Management](https://products.office.com/business/microsoft-azure-rights-management). To integrate Azure Rights Management with WIP, you must already have Azure Rights Management set up.
|
|
||||||
|
|
||||||
To configure WIP to use Azure Rights Management, you must set the **AllowAzureRMSForEDP** MDM setting to **1** in Microsoft Intune. This setting tells WIP to encrypt files copied to removable drives with Azure Rights Management, so they can be shared amongst your employees on computers running at least Windows 10, version 1703.
|
|
||||||
|
|
||||||
Optionally, if you don’t want everyone in your organization to be able to share your enterprise data, you can set the **RMSTemplateIDForEDP** MDM setting to the **TemplateID** of the Azure Rights Management template used to encrypt the data. You must make sure to mark the template with the **EditRightsData** option.
|
|
||||||
|
|
||||||
>[!IMPORTANT]
|
|
||||||
>Curly braces -- {} -- are required around the RMS Template ID.
|
|
||||||
|
|
||||||
>[!NOTE]
|
|
||||||
>For more info about setting the **AllowAzureRMSForEDP** and the **RMSTemplateIDForEDP** MDM settings, see the [EnterpriseDataProtection CSP](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/enterprisedataprotection-csp) topic. For more info about setting up and using a custom template, see [Configuring custom templates for the Azure Rights Management service](https://docs.microsoft.com/information-protection/deploy-use/configure-custom-templates) topic.
|
|
||||||
|
|
||||||
## Choose your optional WIP-related settings
|
|
||||||
After you've decided where your protected apps can access enterprise data on your network, you’ll be asked to decide if you want to add any optional WIP settings.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
**To set your optional settings**
|
|
||||||
1. Choose to set any or all of the optional settings:
|
|
||||||
|
|
||||||
- **Show the Personal option in the File ownership menus of File Explorer and the Save As dialog box.** Determines whether users can see the Personal option for files within File Explorer and the **Save As** dialog box. The options are:
|
|
||||||
|
|
||||||
- **Yes, or not configured (recommended).** Employees can choose whether a file is **Work** or **Personal** in File Explorer and the **Save As** dialog box.
|
|
||||||
|
|
||||||
- **No.** Hides the **Personal** option from employees. Be aware that if you pick this option, apps that use the **Save As** dialog box might encrypt new files as corporate data unless a different file path is given during the original file creation. After this happens, decryption of work files becomes more difficult.
|
|
||||||
|
|
||||||
- **Prevent corporate data from being accessed by apps when the device is locked. Applies only to Windows 10 Mobile**. Determines whether to encrypt enterprise data using a key that's protected by an employee's PIN code on a locked device. Apps won't be able to read corporate data when the device is locked. The options are:
|
|
||||||
|
|
||||||
- **Yes (recommended).** Turns on the feature and provides the additional protection.
|
|
||||||
|
|
||||||
- **No, or not configured.** Doesn't enable this feature.
|
|
||||||
|
|
||||||
- **Revoke encryption keys on unenroll.** Determines whether to revoke a user’s local encryption keys from a device when it’s unenrolled from Windows Information Protection. If the encryption keys are revoked, a user no longer has access to encrypted corporate data. The options are:
|
|
||||||
|
|
||||||
- **Yes, or not configured (recommended).** Revokes local encryption keys from a device during unenrollment.
|
|
||||||
|
|
||||||
- **No.** Stop local encryption keys from being revoked from a device during unenrollment. For example, if you’re migrating between Mobile Device Management (MDM) solutions.
|
|
||||||
|
|
||||||
- **Allow Windows Search to search encrypted corporate data and Store apps.** Determines whether Windows Search can search and index encrypted corporate data and Store apps. The options are:
|
|
||||||
|
|
||||||
- **Yes.** Allows Windows Search to search and index encrypted corporate data and Store apps.
|
|
||||||
|
|
||||||
- **No, or not configured (recommended).** Stops Windows Search from searching and indexing encrypted corporate data and Store apps.
|
|
||||||
|
|
||||||
- **Show the Windows Information Protection icon overlay.** Determines whether the Windows Information Protection icon overlay appears on corporate files in the Save As and File Explorer views. The options are:
|
|
||||||
|
|
||||||
- **Yes.** Allows the Windows Information Protection icon overlay to appear on corporate files in the Save As and File Explorer views. Additionally, for unenlightened but allowed apps, the icon overlay also appears on the app tile and with *Managed* text on the app name in the **Start** menu.
|
|
||||||
|
|
||||||
- **No, or not configured (recommended).** Stops the Windows Information Protection icon overlay from appearing on corporate files or unenlightened, but allowed apps. Not configured is the default option.
|
|
||||||
|
|
||||||
2. Click **Save Policy**.
|
|
||||||
|
|
||||||
## Related topics
|
|
||||||
- [Deploy your Windows Information Protection (WIP) policy](deploy-wip-policy-using-intune.md)
|
|
||||||
|
|
||||||
- [Create and deploy a VPN policy for Windows Information Protection (WIP) using Microsoft Intune](create-vpn-and-wip-policy-using-intune.md)
|
|
||||||
|
|
||||||
- [General guidance and best practices for Windows Information Protection (WIP)](guidance-and-best-practices-wip.md)
|
|
||||||
|
|
||||||
- [Azure RMS Documentation Update for May 2016](https://blogs.technet.microsoft.com/enterprisemobility/2016/05/31/azure-rms-documentation-update-for-may-2016/)
|
|
||||||
|
|
||||||
- [What is Azure Rights Management?]( https://docs.microsoft.com/information-protection/understand-explore/what-is-azure-rms)
|
|
||||||
|
|
||||||
>[!NOTE]
|
|
||||||
>Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Editing Windows IT professional documentation](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md).
|
|
@ -1,50 +0,0 @@
|
|||||||
---
|
|
||||||
title: Deploy your Windows Information Protection (WIP) policy using the classic console for Microsoft Intune (Windows 10)
|
|
||||||
description: After you’ve created your Windows Information Protection (WIP) policy, you'll need to deploy it to your organization's enrolled devices.
|
|
||||||
ms.assetid: 9c4a01e7-0b1c-4f15-95d0-0389f0686211
|
|
||||||
keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection, Intune
|
|
||||||
ms.prod: w10
|
|
||||||
ms.mktglfcycl: explore
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
author: justinha
|
|
||||||
ms.author: justinha
|
|
||||||
manager: dansimp
|
|
||||||
audience: ITPro
|
|
||||||
ms.collection: M365-security-compliance
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.date: 02/26/2019
|
|
||||||
---
|
|
||||||
|
|
||||||
# Deploy your Windows Information Protection (WIP) policy using the classic console for Microsoft Intune
|
|
||||||
**Applies to:**
|
|
||||||
|
|
||||||
- Windows 10, version 1607 and later
|
|
||||||
- Windows 10 Mobile, version 1607 and later
|
|
||||||
|
|
||||||
After you’ve created your Windows Information Protection (WIP) policy, you'll need to deploy it to your organization's enrolled devices. Enrollment can be done for business or personal devices, allowing the devices to use your managed apps and to sync with your managed content and information.
|
|
||||||
|
|
||||||
**To deploy your WIP policy**
|
|
||||||
|
|
||||||
1. On the **Configuration policies** page, locate your newly-created policy, click to select it, and then click the **Manage Deployment** button.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
2. In the left pane of the **Manage Deployment** box, click the employees or groups that should get the policy, and then click **Add**.<p>
|
|
||||||
The added people move to the **Selected Groups** list on the right-hand pane.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
3. After you've picked all of the employees and groups that should get the policy, click **OK**.<p>
|
|
||||||
The policy is deployed to the selected users' devices.
|
|
||||||
|
|
||||||
>[!NOTE]
|
|
||||||
>Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Editing Windows IT professional documentation](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md).
|
|
||||||
|
|
||||||
## Related topics
|
|
||||||
- [Create a Windows Information Protection (WIP) policy using Microsoft Intune](create-wip-policy-using-intune.md)
|
|
||||||
|
|
||||||
- [Create and deploy a VPN policy for Windows Information Protection (WIP) using Microsoft Intune](create-vpn-and-wip-policy-using-intune.md)
|
|
||||||
|
|
||||||
- [General guidance and best practices for Windows Information Protection (WIP)](guidance-and-best-practices-wip.md)
|
|
@ -13,7 +13,7 @@ manager: dansimp
|
|||||||
audience: ITPro
|
audience: ITPro
|
||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 02/26/2019
|
ms.date: 03/05/2019
|
||||||
---
|
---
|
||||||
|
|
||||||
# Mandatory tasks and settings required to turn on Windows Information Protection (WIP)
|
# Mandatory tasks and settings required to turn on Windows Information Protection (WIP)
|
||||||
@ -30,7 +30,7 @@ This list provides all of the tasks and settings that are required for the opera
|
|||||||
|Task|Description|
|
|Task|Description|
|
||||||
|----|-----------|
|
|----|-----------|
|
||||||
|Add at least one app to the **Protected apps** list in your WIP policy.|You must have at least one app added to your **Protected apps** list. For more info about where this area is and how to add apps, see the **Add apps to your Protected apps list** section of the policy creation topics.|
|
|Add at least one app to the **Protected apps** list in your WIP policy.|You must have at least one app added to your **Protected apps** list. For more info about where this area is and how to add apps, see the **Add apps to your Protected apps list** section of the policy creation topics.|
|
||||||
|Choose your WIP protection level.|You must choose the level of protection you want to apply to your WIP-protected content, including **Allow Overrides**, **Silent**, or **Hide Overrides**. For more info about where this area is and how to decide on your protection level, see the **Manage the WIP protection mode for your enterprise data** section of the policy creation topics. For info about how to collect your audit log files, see [How to collect Windows Information Protection (WIP) audit event logs](collect-wip-audit-event-logs.md).|
|
|Choose your WIP protection level.|You must choose the level of protection you want to apply to your WIP-protected content, including **Allow Overrides**, **Silent**, or **Block**. For more info about where this area is and how to decide on your protection level, see the **Manage the WIP protection mode for your enterprise data** section of the policy creation topics. For info about how to collect your audit log files, see [How to collect Windows Information Protection (WIP) audit event logs](collect-wip-audit-event-logs.md).|
|
||||||
|Specify your corporate identity.|This field is automatically filled out for you by Microsoft Intune. However, you must manually correct it if it’s incorrect or if you need to add additional domains. For more info about where this area is and what it means, see the **Define your enterprise-managed corporate identity** section of the policy creation topics.
|
|Specify your corporate identity.|This field is automatically filled out for you by Microsoft Intune. However, you must manually correct it if it’s incorrect or if you need to add additional domains. For more info about where this area is and what it means, see the **Define your enterprise-managed corporate identity** section of the policy creation topics.
|
||||||
|Specify your network domain names.|Starting with Windows 10, version 1703, this field is optional.<br><br>Specify the DNS suffixes used in your environment. All traffic to the fully-qualified domains appearing in this list will be protected. For more info about where this area is and how to add your suffixes, see the table that appears in the **Choose where apps can access enterprise data** section of the policy creation topics.|
|
|Specify your network domain names.|Starting with Windows 10, version 1703, this field is optional.<br><br>Specify the DNS suffixes used in your environment. All traffic to the fully-qualified domains appearing in this list will be protected. For more info about where this area is and how to add your suffixes, see the table that appears in the **Choose where apps can access enterprise data** section of the policy creation topics.|
|
||||||
|Specify your enterprise IPv4 or IPv6 ranges.|Starting with Windows 10, version 1703, this field is optional.<br><br>Specify the addresses for a valid IPv4 or IPv6 value range within your intranet. These addresses, used with your Network domain names, define your corporate network boundaries. For more info about where this area is and what it means, see the table that appears in the **Define your enterprise-managed corporate identity** section of the policy creation topics.|
|
|Specify your enterprise IPv4 or IPv6 ranges.|Starting with Windows 10, version 1703, this field is optional.<br><br>Specify the addresses for a valid IPv4 or IPv6 value range within your intranet. These addresses, used with your Network domain names, define your corporate network boundaries. For more info about where this area is and what it means, see the table that appears in the **Define your enterprise-managed corporate identity** section of the policy creation topics.|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user