This commit is contained in:
Justin Hall 2019-05-13 10:17:20 -07:00
parent 54afe89f23
commit b779a2462e

View File

@ -11,7 +11,7 @@ manager: dansimp
audience: ITPro audience: ITPro
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 05/10/2019 ms.date: 05/13/2019
--- ---
# Create a Windows Information Protection (WIP) policy using the Azure portal for Microsoft Intune # Create a Windows Information Protection (WIP) policy using the Azure portal for Microsoft Intune
@ -588,7 +588,7 @@ After you've decided where your protected apps can access enterprise data on you
- **On.** Protects files that are copied to a removable drive. You can enter a TemplateID GUID to specify who can access the Azure Rights Management protected files, and for how long. The RMS template is only applied to the files on removable media, and is only used for access control—it doesnt actually apply Azure Information Protection to the files. Curly braces {} are required around the RMS Template ID, but they are removed after you save the policy. - **On.** Protects files that are copied to a removable drive. You can enter a TemplateID GUID to specify who can access the Azure Rights Management protected files, and for how long. The RMS template is only applied to the files on removable media, and is only used for access control—it doesnt actually apply Azure Information Protection to the files. Curly braces {} are required around the RMS Template ID, but they are removed after you save the policy.
If you dont specify an [RMS template](https://docs.microsoft.com/information-protection/deploy-use/configure-custom-templates), its a regular EFS file using a default RMS template that everyone in the tenant will have access to. If you dont specify an [RMS template](https://docs.microsoft.com/information-protection/deploy-use/configure-custom-templates), its a regular EFS file using a default RMS template that all users can access.
- **Off, or not configured.** Stops WIP from encrypting Azure Rights Management files that are copied to a removable drive. - **Off, or not configured.** Stops WIP from encrypting Azure Rights Management files that are copied to a removable drive.
@ -603,7 +603,7 @@ After you've decided where your protected apps can access enterprise data on you
## Encrypted file extensions ## Encrypted file extensions
You can restrict which files are protected by WIP when they are downloaded from an SMB share within your enterprise network locations. If this setting is configured, only files with te extensions in the list will be encrypted. If this setting is not specified, the existing auto-encryption behavior is applied. You can restrict which files are protected by WIP when they are downloaded from an SMB share within your enterprise network locations. If this setting is configured, only files with the extensions in the list will be encrypted. If this setting is not specified, the existing auto-encryption behavior is applied.
![WIP encrypted file extensions](images/wip-encrypted-file-extensions.png) ![WIP encrypted file extensions](images/wip-encrypted-file-extensions.png)