--- title: Create an enterprise data protection (EDP) policy using Microsoft Intune (Windows 10) description: Microsoft Intune helps you create and deploy your enterprise data protection (EDP) policy, including letting you choose your protected apps, your EDP-protection level, and how to find enterprise data on the network. ms.assetid: 4B307C99-3016-4D6A-9AE7-3BBEBD26E721 ms.prod: W10 ms.mktglfcycl: explore ms.sitesec: library author: brianlic-msft --- # Create an enterprise data protection (EDP) policy using Microsoft Intune **Applies to:** - Windows 10 Insider Preview - Windows 10 Mobile Preview \[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. An app that calls an API introduced in Windows 10 Anniversary SDK Preview Build 14295 cannot be ingested into the Windows Store during the Preview period.\] Microsoft Intune helps you create and deploy your enterprise data protection (EDP) policy, including letting you choose your protected apps, your EDP-protection level, and how to find enterprise data on the network. ## In this topic: - [Add an EDP policy](#add-edp-policy) - [Choose which apps can access your enterprise data](#choose-apps) - [Exempt apps from EDP restrictions](#exempt-apps) - [Manage the EDP protection level for your enterprise data](#protect-level) - [Define your enterprise-managed identity domains](#define-enterprise-managed-identity-domains) - [Choose where apps can access enterprise data](#choose-where-apps) - [Choose your optional EDP-related settings](#optional-settings) ## Add an EDP policy After you’ve installed and set up Intune for your organization, you must create an EDP-specific policy. **To add an EDP policy** 1. Open the Intune administration console, and go to the **Policy** node, and then click **Add Policy**. 2. Click **Add Policy** from the **Tasks** area. 3. Go to **Windows**, click the **Enterprise Data Protection (Windows 10 and Mobile and later) policy**, pick the EDP template, click **Create and Deploy a Custom Policy**, and then click **Create Policy**. 4. Type a name (required) and an optional description for your policy into the **Name** and **Description** boxes.  ## Add individual apps to your Protected App list During the policy-creation process in Intune, you can choose the apps you want to give access to your enterprise data through EDP. Apps included in this list can protect data on behalf of the enterprise and are restricted from copying or moving enterprise data to unprotected apps. The steps to add your apps are based on the type of app it is; either a Universal Windows Platform (UWP) app, or a signed Desktop app, also known as a Classic Windows application. **Important** EDP-aware apps are expected to prevent enterprise data from going to unprotected network locations and to avoid encrypting personal data. On the other hand, EDP-unaware apps might not respect the corporate network boundary and will encrypt all files they create or modify, meaning that they could encrypt personal data and cause data loss during the revocation process. Care must be taken to get a support statement from the software provider that their app is safe with EDP before adding it to your **Protected App** list. **Note** If you want to use **File hash** or **Path** rules, instead of Publisher rules, you must follow the steps in the [Add multiple apps to your enterprise data protection (EDP) Protected Apps list](add-apps-to-protected-list-using-custom-uri.md)) topic. **To add a UWP app** 1. From the **Configure the following apps to be protected by EDP** table in the **Protected Apps** area, click **Add.** 2. Click **Universal App**, type the **Publisher Name** and the **Product Name** into the associated boxes, and then click **OK**. If you don't have the publisher or product name, you can find them for both desktop devices and Windows 10 Mobile phones by following these steps. **To find the Publisher and Product name values for Microsoft Store apps without installing them** 1. Go to the [Windows Store for Business](http://go.microsoft.com/fwlink/?LinkID=722910) website, and find your app. For example, Microsoft OneNote. **Note** If your app is already installed on desktop devices, you can use the AppLocker local security policy MMC snap-in to gather the info for adding the app to the **Protected App** list. For info about how to do this, see the [Add multiple apps to your enterprise data protection (EDP) Protected Apps list](add-apps-to-protected-list-using-custom-uri.md)) topic. 2. Copy the ID value from the app URL. For example, Microsoft OneNote's ID URL is https://www.microsoft.com/store/apps/onenote/9wzdncrfhvjl, and you'd copy the ID value, `9wzdncrfhvjl`. 3. In a browser, run the Store for Business portal web API, to return a JavaScript Object Notation (JSON) file that includes the publisher and product name values. For example, run https://bspmts.mp.microsoft.com/v1/public/catalog/Retail/Products/*9wzdncrfhvjl*/applockerdata, where *9wzdncrfhvjl* is replaced with your ID value. The API runs and opens a text editor with the app details. ``` syntax { "packageIdentityName": "Microsoft.Office.OneNote", "publisherCertificateName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US" } ``` 4. Copy the `publisherCertificateName` value into the **Publisher Name** box and copy the `packageIdentityName` value into the **Product Name** box of Intune. **Important** The JSON file might also return a `windowsPhoneLegacyId` value for both the **Publisher Name** and **Product Name** boxes. This means that you have an app that’s using a XAP package and that you must set the **Product Name** as `windowsPhoneLegacyId`, and set the **Publisher Name** as “CN=” followed by the `windowsPhoneLegacyId`. For example: ``` syntax { "windowsPhoneLegacyId": "ca05b3ab-f157-450c-8c49-a1f127f5e71d", } ```  **To find the Publisher and Product name values for apps installed on Windows 10 Mobile phones** 1. If you need to add mobile apps that aren't distributed through the Store for Business, you must use the Windows Device Portal feature. 2. **Note** Your PC and phone must be on the same wireless network. 3. On the Windows Phone, go to **Settings**, choose **Update & security**, and then choose **For developers**. 4. In the **For developers** screen, turn on **Developer mode**, turn on **Device Discovery**, and then turn on **Device Portal**. 5. Copy the URL in the **Device Portal** area into your device's browser, and then accept the SSL certificate. 6. In the **Device discovery** area, press **Pair**, and then enter the PIN into the website from the previous step. 7. On the **Apps** tab of the website, click the drop-down box to choose the app you want to know more about. The **Publisher** and **Product Name** values appear. 8. Copy the `publisherCertificateName` value and paste it into the **Publisher Name** box and the `packageIdentityName` value into the **Product Name** box of Intune. **Important** The JSON file might also return a `windowsPhoneLegacyId` value for both the **Publisher Name** and **Product Name** boxes. This means that you have an app that’s using a XAP package and that you must set the **Product Name** as `windowsPhoneLegacyId`, and set the **Publisher Name** as “CN=” followed by the `windowsPhoneLegacyId`. For example: ``` syntax { "windowsPhoneLegacyId": "ca05b3ab-f157-450c-8c49-a1f127f5e71d", } ``` **To add a Classic Windows application** 1. From the **Configure the following apps to be protected by EDP** table in the **Protected Apps** area, click **Add.** A dialog box appears, letting you pick whether the app is a **Universal App** or a **Desktop App**. 2. Click **Desktop App**, pick the options you want (see table), and then click **OK**.
Option | Manages |
---|---|
All fields left as “*” |
All files signed by any publisher. (Not recommended.) |
Publisher selected |
All files signed by the named publisher. This might be useful if your company is the publisher and signer of internal line-of-business apps. |
Publisher and Product Name selected |
All files for the specified product, signed by the named publisher. |
Publisher, Product Name, and File Name selected |
Any version of the named file or package for the specified product, signed by the named publisher. |
Publisher, Product Name, File Name, and File Version, Exactly, selected |
Specified version of the named file or package for the specified product, signed by the named publisher. |
Publisher, Product Name, File Name, and File Version, And above selected |
Specified version or newer releases of the named file or package for the specified product, signed by the named publisher. This option is recommended for enlightened apps that weren't previously enlightened. |
Publisher, Product Name, File Name, and File Version, And below selected |
Specified version or older releases of the named file or package for the specified product, signed by the named publisher. |
Mode | Description |
---|---|
Block | EDP looks for inappropriate data sharing practices and stops the employee from completing the action. This can include sharing info across non-enterprise-protected apps in addition to sharing enterprise data between other people and devices outside of your enterprise. |
Override | EDP looks for inappropriate data sharing, warning employees if they do something deemed potentially unsafe. However, this management mode lets the employee override the policy and share the data, logging the action to your audit log, accessible through the [Reporting CSP](http://go.microsoft.com/fwlink/p/?LinkID=746459). |
Silent | EDP runs silently, logging inappropriate data sharing, without blocking anything. |
Off
(Not recommended) |
EDP is turned off and doesn't help to protect or audit your data |
Network location type | Format | Description |
---|---|---|
Enterprise Cloud Domain |
contoso.sharepoint.com,proxy1.contoso.com|office.com|proxy2.contoso.com |
Specify the cloud resources traffic to restrict to your protected apps. For each cloud resource, you may also specify an internal proxy server that routes your traffic from your Enterprise Internal Proxy Server policy. If you have multiple resources, you must use the "|" delimiter. Include the "," delimiter just before the "|" if you don’t use proxies. For example: |
Enterprise Network Domain |
domain1.contoso.com,domain2.contoso.com |
Specify the DNS suffix used in your environment. All traffic to the fully-qualified domains using this DNS suffix will be protected. If you have multiple resources, you must use the "," delimiter. This setting works with the IP Ranges settings to detect whether a network endpoint is enterprise or personal on private networks. |
Enterprise Proxy Server |
domain1.contoso.com:80;domain2.contoso.com:137 |
Specify the proxy server and the port traffic is routed through. If you have multiple resources, you must use the ";" delimiter. This setting is required if you use a proxy in your network. If you don't have a proxy server, you might find that enterprise resources are unavailable when a client is behind a proxy, such as when using certain Wi-Fi hotspots at hotels and restaurants. |
Enterprise Internal Proxy Server |
proxy1.contoso.com;proxy2.contoso.com |
Specify the proxy servers your cloud resources will go through. If you have multiple resources, you must use the ";" delimiter. |
Enterprise IPv4 Range |
Starting IPv4 Address: 3.4.0.1 Ending IPv4 Address: 3.4.255.254 Custom URI: 3.4.0.1-3.4.255.254,10.0.0.1-10.255.255.254 |
Specify the addresses for a valid IPv4 value range within your intranet. If you are adding a single range, you can enter the starting and ending addresses into your management system’s UI. If you want to add multiple addresses, we suggest creating a Custom URI, using the "-" delimiter between start and end of a range, and the "," delimiter to separate ranges. |
Enterprise IPv6 Range |
Starting IPv6 Address: 2a01:110:: Ending IPv6 Address: 2a01:110:7fff:ffff:ffff:ffff:ffff:ffff Custom URI: 2a01:110::-2a01:110:7fff:ffff:ffff:ffff:ffff:ffff,fd00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff |
Specify the addresses for a valid IPv6 value range within your intranet. If you are adding a single range, you can enter the starting and ending addresses into your management system’s UI. If you want to add multiple addresses, we suggest creating a Custom URI, using the "-" delimiter between start and end of a range, and the "," delimiter to separate ranges. |