mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
add in suggested changes
This commit is contained in:
parent
036107d534
commit
ad5874f8d5
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: How to disable Windows Information Protection (WIP)
|
title: How to disable Windows Information Protection (WIP)
|
||||||
description: How to disable Windows Information Protection (WIP)
|
description: How to disable Windows Information Protection (WIP) in Microsoft Intune or Configuration Manager.
|
||||||
ms.date: 07/15/2022
|
ms.date: 07/15/2022
|
||||||
ms.prod: m365-security
|
ms.prod: m365-security
|
||||||
ms.topic: how-to
|
ms.topic: how-to
|
||||||
@ -17,130 +17,104 @@ _Applies to:_
|
|||||||
|
|
||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows 11
|
- Windows 11
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> **liz add blurb about disable**
|
|
||||||
|
|
||||||
|
|
||||||
## Use Intune to disable WIP
|
## Use Intune to disable WIP
|
||||||
|
|
||||||
To disable Windows Information Protection (WIP) using Intune, you have the following options:
|
To disable Windows Information Protection (WIP) using Intune, you have the following options:
|
||||||
|
|
||||||
#### Option 1 - Remove the WIP Policy (Unassign) - preferred
|
### Option 1 - Unassign the WIP policy (preferred)
|
||||||
|
|
||||||
Removing an existing enable policy will remove the intent to deploy WIP from those devices. When that intent is removed, a device will remove protection for files and the configuration for WIP.
|
When you unassign an existing policy, it removes the intent to deploy WIP from those devices. When that intent is removed, the device removes protection for files and the configuration for WIP. For more information, see [Assign user and device profiles in Microsoft Intune](/mem/intune/configuration/device-profile-assign).
|
||||||
|
### Option 2 - Change current WIP policy to off
|
||||||
#### Option 2 - Change current WIP policy to off
|
|
||||||
|
|
||||||
If you’re currently deploying a WIP policy for enrolled or unenrolled devices, you switch the WIP policy to Off. When devices check-in after this change, the devices will proceed to unprotect files previously protected by WIP.
|
If you’re currently deploying a WIP policy for enrolled or unenrolled devices, you switch the WIP policy to Off. When devices check-in after this change, the devices will proceed to unprotect files previously protected by WIP.
|
||||||
|
|
||||||
1. Sign in to the Microsoft Endpoint Manager.
|
1. Sign in to the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com).
|
||||||
1. Open Microsoft Intune and select Apps > App protection policies >
|
1. Open Microsoft Intune and select **Apps** > **App protection policies** >
|
||||||
In Client apps - App protection policies, select <> apps. Select the existing policy to turn off.
|
In Client apps - App protection policies, select <> apps. Select the existing policy to turn off.
|
||||||
1. From App protection policy, select the name of your policy, and then select the name of your properties.
|
1. From App protection policy, select the name of your policy, and then select the properties.
|
||||||
1. Edit required settings.
|
1. Edit **Required settings**.
|
||||||
:::image type="content" alt-text="Create Configuration Item wizard, choose your WIP-protection level" source="images/wip-configmgr-disable-wip.png":::
|
:::image type="content" alt-text="Create Configuration Item wizard, choose your WIP-protection level." source="images/wip-configmgr-disable-wip.png":::
|
||||||
1. Set Windows Information Protection mode to off.
|
1. Set **Windows Information Protection mode** to off.
|
||||||
1. After making this change, select review and save.
|
1. After making this change, select **Review and Save**.
|
||||||
1. Select save.
|
1. Select **Save**.
|
||||||
|
|
||||||
> [!Note]
|
> [!Note]
|
||||||
> **Another option is to create a disable policy.**<br>
|
> **Another option is to create a disable policy that sets WIP to Off.**
|
||||||
You can create a separate disable policy for WIP (both enrolled and unenrolled) and deploy that to your organization. You then stage the rollout by complimenting your existing enablement policy and moving entities slowly from being targeted with enable to the disable policy.
|
> You can create a separate disable policy for WIP (both enrolled and unenrolled) and deploy that to a new group. You then can stage the transition to this disabled state. Move devices from the existing group to the new group. This process slowly migrates devices instead of all at once.
|
||||||
|
|
||||||
|
### Revoke local encryption keys during the unenrollment process
|
||||||
|
|
||||||
|
Determine whether to revoke a user's local encryption keys from a device when it's unenrolled from Windows Information Protection. If the encryption keys are revoked, a user no longer has access to encrypted corporate data. The options are:
|
||||||
|
|
||||||
|
- Yes, or not configured. Revokes local encryption keys from a device during unenrollment.
|
||||||
|
- No (recommended). Stop local encryption keys from being revoked from a device during unenrollment. For example, if you're migrating between Mobile Device Management (MDM) solutions.
|
||||||
|
|
||||||
## Use Configuration Manager to disable WIP
|
## Use Configuration Manager to disable WIP
|
||||||
|
|
||||||
To remove Windows Information Protection (WIP) using Configuration Manager
|
To remove Windows Information Protection (WIP) using Configuration Manager
|
||||||
## Add a WIP policy
|
|
||||||
After you've installed and set up Configuration Manager for your organization, you must create a configuration item for WIP, which in turn becomes your WIP policy.
|
|
||||||
|
|
||||||
>[!WARNING]
|
>[!WARNING]
|
||||||
>Don't just delete your existing WIP policy.
|
>Don't just delete your existing WIP policy. For Configuration Manager there's only one option to create a new policy that turns WIP mode off. Otherwise the devices will remove the Configuration Manager policy but not change the WIP mode.
|
||||||
|
|
||||||
**To create a configuration item for WIP**
|
### Add a WIP policy
|
||||||
|
To disable WIP for your organization, first create a configuration item.
|
||||||
|
|
||||||
1. Open the Configuration Manager console, click the **Assets and Compliance** node, expand the **Overview** node, expand the **Compliance Settings** node, and then expand the **Configuration Items** node.
|
1. Open the Configuration Manager console, select the **Assets and Compliance** node, expand the **Overview** node, expand the **Compliance Settings** node, and then expand the **Configuration Items** node.
|
||||||
|
|
||||||

|
2. Select the **Create Configuration Item** button.
|
||||||
|
The **Create Configuration Item Wizard** starts.
|
||||||
|
|
||||||
2. Click the **Create Configuration Item** button.<p>
|

|
||||||
The **Create Configuration Item Wizard** starts.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
3. On the **General Information screen**, type a name (required) and an optional description for your policy into the **Name** and **Description** boxes.
|
3. On the **General Information screen**, type a name (required) and an optional description for your policy into the **Name** and **Description** boxes.
|
||||||
|
|
||||||
4. In the **Specify the type of configuration item you want to create** area, pick the option that represents whether you use Configuration Manager for device management, and then click **Next**.
|
4. In the **Specify the type of configuration item you want to create** area, select **Windows 10 or later** for devices managed with the Configuration Manager client, and then select **Next**.
|
||||||
|
|
||||||
- **Settings for devices managed with the Configuration Manager client:** Windows 10
|
5. On the **Supported Platforms** screen, select the **Windows 10** box, and then select **Next**.
|
||||||
|
|
||||||
-OR-
|
6. On the **Device Settings** screen, select **Windows Information Protection**, and then select **Next**.
|
||||||
|
|
||||||
- **Settings for devices managed without the Configuration Manager client:** Windows 8.1 and Windows 10
|
|
||||||
|
|
||||||
5. On the **Supported Platforms** screen, click the **Windows 10** box, and then click **Next**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
6. On the **Device Settings** screen, click **Windows Information Protection**, and then click **Next**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
The **Configure Windows Information Protection settings** page appears, where you'll configure your policy for your organization.
|
The **Configure Windows Information Protection settings** page appears, where you'll configure your policy for your organization.
|
||||||
|
|
||||||
## Manage the WIP-protection level for your enterprise data
|
### Manage the WIP-protection level for your enterprise data
|
||||||
|
|
||||||
**liz I need a different figure below - this is Intune - need config mgr**
|
|
||||||
|
|
||||||
Set the Windows Information Protection mode to Off.
|
Set the Windows Information Protection mode to Off.
|
||||||
|
|
||||||
:::image type="content" alt-text="Create Configuration Item wizard, choose your WIP-protection level" source="images/wip-configmgr-disable-wip.png":::
|
:::image type="content" alt-text="Create Configuration Item wizard, choose your WIP-protection level." source="images/wip-configmgr-disable-wip.png":::
|
||||||
|
|
||||||
|
|
||||||
## Define your enterprise-managed identity domains
|
### Define your enterprise-managed identity domains
|
||||||
|
|
||||||
> [!TIP]
|
> [!TIP]
|
||||||
> For additional help filling out the required fields, please reference <br>[Create and deploy a Windows Information Protection (WIP) policy using Microsoft Endpoint Configuration Manager](/windows/security/information-protection/windows-information-protection/create-wip-policy-using-configmgr)
|
> For more information on filling out the required fields, see [Create and deploy a Windows Information Protection (WIP) policy using Microsoft Endpoint Configuration Manager](/windows/security/information-protection/windows-information-protection/create-wip-policy-using-configmgr).
|
||||||
|
|
||||||
**Add your corporate identity**
|
#### Add your corporate identity
|
||||||
|
|
||||||
- Type the name of your corporate identity into the **Corporate identity** field. For example, `contoso.com` or `contoso.com|newcontoso.com`.
|
- Type the name of your corporate identity into the **Corporate identity** field. For example, `contoso.com` or `contoso.com|newcontoso.com`.
|
||||||
|
|
||||||
|
Corporate identity must match the string in the original policy.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
## Choose where apps can access enterprise data
|
### Choose where apps can access enterprise data
|
||||||
After you've added a protection mode to your apps, you'll need to decide where those apps can access enterprise data on your network.
|
After you've added a protection mode to your apps, you'll need to decide where those apps can access enterprise data on your network.
|
||||||
|
|
||||||
**To define where your protected apps can find and send enterprise data on you network**
|
**To define where your protected apps can find and send enterprise data on you network**
|
||||||
|
|
||||||
Add additional network locations your apps can access by clicking **Add**.
|
Add additional network locations your apps can access by selecting **Add**.
|
||||||
The **Add or edit corporate network definition** box appears. Add the required fields.
|
The **Add or edit corporate network definition** box appears. Add the required fields.
|
||||||
|
|
||||||
In the required **Upload a Data Recovery Agent (DRA) certificate to allow recovery of encrypted data** box, click **Browse** to add a data recovery certificate for your policy.
|
In the required **Upload a Data Recovery Agent (DRA) certificate to allow recovery of encrypted data** box, select **Browse** to add a data recovery certificate for your policy.
|
||||||
|
|
||||||

|

|
||||||
## Deploy the WIP policy
|
|
||||||
After you've created your WIP policy, you'll need to deploy it to your organization's devices. For info about your deployment options, see these topics:
|
|
||||||
- [Operations and Maintenance for Compliance Settings in Configuration Manager](/previous-versions/system-center/system-center-2012-R2/gg699357(v=technet.10))
|
|
||||||
|
|
||||||
- [How to Create Configuration Baselines for Compliance Settings in Configuration Manager](/previous-versions/system-center/system-center-2012-R2/gg712268(v=technet.10))
|
### Deploy the WIP policy
|
||||||
|
After you've created your WIP policy, you'll need to deploy it to your organization's devices. For info about deployment options, see:
|
||||||
|
|
||||||
- [How to Deploy Configuration Baselines in Configuration Manager](/previous-versions/system-center/system-center-2012-R2/hh219289(v=technet.10))
|
- [Create a configuration baseline that includes the new configuration item](/mem/configmgr/compliance/deploy-use/create-configuration-baselines)
|
||||||
|
|
||||||
## Related topics
|
- [Create a new collection](/mem/configmgr/core/clients/manage/collections/create-collections)
|
||||||
|
|
||||||
- [How to collect Windows Information Protection (WIP) audit event logs](collect-wip-audit-event-logs.md)
|
- [Deploy the baseline to the collection](/mem/configmgr/compliance/deploy-use/deploy-configuration-baselines)
|
||||||
|
|
||||||
- [General guidance and best practices for Windows Information Protection (WIP)](guidance-and-best-practices-wip.md)
|
- Move devices from old collection to new collection
|
||||||
|
|
||||||
- [Limitations while using Windows Information Protection (WIP)](limitations-with-wip.md)
|
|
||||||
|
|
||||||
- **[Create a configuration baseline that includes the new configuration item](/mem/configmgr/compliance/deploy-use/create-configuration-baselines)**
|
|
||||||
|
|
||||||
- **[Create a new collection](/mem/configmgr/core/clients/manage/collections/create-collections)**
|
|
||||||
|
|
||||||
- **[Deploy the baseline to the collection](/mem/configmgr/compliance/deploy-use/deploy-configuration-baselines)**
|
|
||||||
|
|
||||||
- **Move devices from old collection to new collection**
|
|
||||||
|
|
||||||
**liz for above do we have a reference link for doing this move**
|
|
Binary file not shown.
Before Width: | Height: | Size: 46 KiB After Width: | Height: | Size: 51 KiB |
Binary file not shown.
After Width: | Height: | Size: 44 KiB |
Loading…
x
Reference in New Issue
Block a user