From a373d504eb8a37c597a58a6c8958e70ce45fc96a Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Thu, 25 Apr 2019 08:51:00 -0700 Subject: [PATCH] added RMS and link --- .../create-wip-policy-using-sccm.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-sccm.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-sccm.md index bc6a097de4..5df397e284 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-sccm.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-sccm.md @@ -14,7 +14,7 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual -ms.date: 04/22/2019 +ms.date: 04/26/2019 --- # Create and deploy a Windows Information Protection (WIP) policy using System Center Configuration Manager @@ -480,6 +480,8 @@ After you've decided where your protected apps can access enterprise data on you - **No.** Stop local encryption keys from being revoked from a device during unenrollment. For example, if you’re migrating between Mobile Device Management (MDM) solutions. + - **Allow Azure RMS.** Enables secure sharing of files by using removable media such as USB drives. For more information, see [Choose to set up Azure Rights Management with WIP](create-wip-policy-using-intune-azure.md#choose-to-set-up-azure-rights-management-with-wip). + 2. After you pick all of the settings you want to include, click **Summary**. ## Review your configuration choices in the Summary screen