windows-itpro-docs/windows/keep-secure/create-edp-policy-using-intune.md
2016-05-11 13:46:30 -07:00

23 KiB
Raw Blame History

title, description, ms.assetid, ms.prod, ms.mktglfcycl, ms.sitesec, author
title description ms.assetid ms.prod ms.mktglfcycl ms.sitesec author
Create an enterprise data protection (EDP) policy using Microsoft Intune (Windows 10) Microsoft Intune helps you create and deploy your enterprise data protection (EDP) policy, including letting you choose your protected apps, your EDP-protection level, and how to find enterprise data on the network. 4b307c99-3016-4d6a-9ae7-3bbebd26e721 W10 explore library eross-msft

Create an enterprise data protection (EDP) policy using Microsoft Intune

Applies to:

  • Windows 10 Insider Preview
  • Windows 10 Mobile Preview

[Some information relates to pre-released product, which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.]

Microsoft Intune helps you create and deploy your enterprise data protection (EDP) policy, including letting you choose your protected apps, your EDP-protection level, and how to find enterprise data on the network.

Add an EDP policy

After youve installed and set up Intune for your organization, you must create an EDP-specific policy.

To add an EDP policy

  1. Open the Intune administration console, and go to the Policy node, and then click Add Policy from the Tasks area.

  2. Go to Windows, click the Enterprise Data Protection (Windows 10 and Mobile and later) policy, pick the EDP template, click Create and Deploy a Custom Policy, and then click Create Policy.

    Microsoft Intune: Create your new policy from the New Policy screen

  3. Type a name (required) and an optional description for your policy into the Name and Description boxes.

    Microsoft Intune: Fill out the required Name and optional Description fields

Add individual apps to your Protected App list

During the policy-creation process in Intune, you can choose the apps you want to give access to your enterprise data through EDP. Apps included in this list can protect data on behalf of the enterprise and are restricted from copying or moving enterprise data to unprotected apps.

The steps to add your apps are based on the type of app it is; either a Universal Windows Platform (UWP) app, or a signed Desktop app, also known as a Classic Windows application.

Important
EDP-aware apps are expected to prevent enterprise data from going to unprotected network locations and to avoid encrypting personal data. On the other hand, EDP-unaware apps might not respect the corporate network boundary and will encrypt all files they create or modify, meaning that they could encrypt personal data and cause data loss during the revocation process. Care must be taken to get a support statement from the software provider that their app is safe with EDP before adding it to your Protected App list.

**Note**
If you want to use **File hash** or **Path** rules, instead of Publisher rules, you must follow the steps in the [Add multiple apps to your enterprise data protection (EDP) Protected Apps list](add-apps-to-protected-list-using-custom-uri.md) topic.

To add a UWP app

  1. From the Configure the following apps to be protected by EDP table in the Protected Apps area, click Add.

  2. Click Universal App, type the Publisher Name and the Product Name into the associated boxes, and then click OK. If you don't have the publisher or product name, you can find them for both desktop devices and Windows 10 Mobile phones by following these steps.

    To find the Publisher and Product name values for Microsoft Store apps without installing them

    1. Go to the Windows Store for Business website, and find your app. For example, Microsoft OneNote.

      Note
      If your app is already installed on desktop devices, you can use the AppLocker local security policy MMC snap-in to gather the info for adding the app to the Protected App list. For info about how to do this, see the Add multiple apps to your enterprise data protection (EDP) Protected Apps list topic.

    2. Copy the ID value from the app URL. For example, Microsoft OneNote's ID URL is https://www.microsoft.com/store/apps/onenote/9wzdncrfhvjl, and you'd copy the ID value, 9wzdncrfhvjl.

    3. In a browser, run the Store for Business portal web API, to return a JavaScript Object Notation (JSON) file that includes the publisher and product name values. For example, run https://bspmts.mp.microsoft.com/v1/public/catalog/Retail/Products/9wzdncrfhvjl/applockerdata, where 9wzdncrfhvjl is replaced with your ID value.

    The API runs and opens a text editor with the app details.

    ``` json
    {
      "packageIdentityName": "Microsoft.Office.OneNote",
      "publisherCertificateName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US"
    }
    ```
    
    1. Copy the publisherCertificateName value into the Publisher Name box and copy the packageIdentityName value into the Product Name box of Intune.

    **Important**
    The JSON file might also return a `windowsPhoneLegacyId` value for both the **Publisher Name** and **Product Name** boxes. This means that you have an app thats using a XAP package and that you must set the **Product Name** as `windowsPhoneLegacyId`, and set the **Publisher Name** as “CN=” followed by the `windowsPhoneLegacyId`.

    For example:
    ``` json { "windowsPhoneLegacyId": "ca05b3ab-f157-450c-8c49-a1f127f5e71d", } ``` ![Microsoft Intune: Add a UWP app to the Protected Apps list](images/intune-addapps.png)

    To find the Publisher and Product name values for apps installed on Windows 10 Mobile phones

    1. If you need to add mobile apps that aren't distributed through the Store for Business, you must use the Windows Device Portal feature.

    **Note**
    Your PC and phone must be on the same wireless network.

    1. On the Windows Phone, go to Settings, choose Update & security, and then choose For developers.

    2. In the For developers screen, turn on Developer mode, turn on Device Discovery, and then turn on Device Portal.

    3. Copy the URL in the Device Portal area into your device's browser, and then accept the SSL certificate.

    4. In the Device discovery area, press Pair, and then enter the PIN into the website from the previous step.

    5. On the Apps tab of the website, you can see details for the running apps, including the publisher and product names.

    6. Start the app for which you're looking for the publisher and product name values

    7. Copy the publisherCertificateName value and paste it into the Publisher Name box and the packageIdentityName value into the Product Name box of Intune.

    **Important**
    The JSON file might also return a `windowsPhoneLegacyId` value for both the **Publisher Name** and **Product Name** boxes. This means that you have an app thats using a XAP package and that you must set the **Product Name** as `windowsPhoneLegacyId`, and set the **Publisher Name** as “CN=” followed by the `windowsPhoneLegacyId`.

    For example:
    ``` json { "windowsPhoneLegacyId": "ca05b3ab-f157-450c-8c49-a1f127f5e71d", } ```

To add a Classic Windows application

  1. From the Configure the following apps to be protected by EDP table in the Protected Apps area, click Add.

A dialog box appears, letting you pick whether the app is a **Universal App** or a **Desktop App**.

  1. Click Desktop App, pick the options you want (see table), and then click OK.
    Option Manages
    All fields left as "*" All files signed by any publisher. (Not recommended.)
    Publisher selected All files signed by the named publisher.

    This might be useful if your company is the publisher and signer of internal line-of-business apps.

    Publisher and Product Name selected All files for the specified product, signed by the named publisher.
    Publisher, Product Name, and File Name selected Any version of the named file or package for the specified product, signed by the named publisher.
    Publisher, Product Name, File Name, and File Version, Exactly selected Specified version of the named file or package for the specified product, signed by the named publisher.
    Publisher, Product Name, File Name, and File Version, And above selected Specified version or newer releases of the named file or package for the specified product, signed by the named publisher.

    This option is recommended for enlightened apps that weren't previously enlightened.

    Publisher, Product Name, File Name, and File Version, And below selected Specified version or older releases of the named file or package for the specified product, signed by the named publisher.

If youre unsure about what to include for the publisher, you can run this PowerShell command:

Get-AppLockerFileInformation -Path "<path of the exe>"

Where "<path_of_the_exe>" goes to the location of the app on the device. For example, Get-AppLockerFileInformation -Path "C:\Program Files\Internet Explorer\iexplore.exe".

In this example, you'd get the following info:

Path                                          Publisher
----                                          ---------
%PROGRAMFILES%\INTERNET EXPLORER\IEXPLORE.EXE O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US\INTERNET EXPLOR...

Where the text, O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US is the publisher name to enter in the Publisher Name box.

Microsoft Intune: Add a Classic Windows app to the Protected Apps list

Exempt apps from EDP restrictions

If you're running into compatibility issues where your app is incompatible with EDP, but still needs to be used with enterprise data, you can exempt the app from the EDP restrictions. This means that your apps won't include auto-encryption or tagging and won't honor your network restrictions. It also means that your exempted apps might leak.

To exempt an UWP app

  1. Follow the Add a UWP app steps in the Add multiple apps to your enterprise data protection (EDP) Protected Apps list topic, through to Step 11.

  2. In the OMA-URI box at Step 12, type ./Vendor/MSFT/AppLocker/EnterpriseDataProtection/<your_enterprise_name>edpexempt/StoreApp EXE.

    Where edpexempt is added as a substring, making the app exempt.

  3. Open File Explorer, go to the location where you saved your new XML file, and open it using an XML editor, such as Notepad.

  4. Copy the text that has a Type of Appx, within in the RuleCollection tags, and then go back to Intune and paste the text into the Value box of the Add or edit OMA-URI Setting box. For example:

    <RuleCollection Type="Appx" EnforcementMode="Enabled"><your_xml_rules_here></RuleCollection>
    
  5. Click OK to close the Add or edit OMA-URI Setting box, and then click Save Policy.

    After saving the policy, youll need to deploy it to your employees devices. For more info, see the Deploy your enterprise data protection (EDP) policy topic.

To exempt a Classic Windows application

  1. Follow the Add a Classic Windows application app steps in the Add multiple apps to your enterprise data protection (EDP) Protected Apps list topic, through to Step 11.

  2. In the OMA-URI box at Step 12, type ./Vendor/MSFT/AppLocker/EnterpriseDataProtection/<your_enterprise_name>edpexempt/EXE.

    Where edpexempt is added as a substring, making the app exempt.

  3. Open File Explorer, go to the location where you saved your new XML file, and open it using an XML editor, such as Notepad.

  4. Copy the text that has a Type of EXE, within in the RuleCollection tags, and then go back to Intune and paste the text into the Value box of the Add or edit OMA-URI Setting box. For example:

    <RuleCollection Type="Exe" EnforcementMode="Enabled"><your_xml_rules_here></RuleCollection>
    
  5. Click OK to close the Add or edit OMA-URI Setting box, and then click Save Policy.

    After saving the policy, youll need to deploy it to your employees devices. For more info, see the Deploy your enterprise data protection (EDP) policy topic.

Manage the EDP protection level for your enterprise data

After you've added the apps you want to protect with EDP, you'll need to apply a management and protection mode.

We recommend that you start with Silent or Override while verifying with a small group that you have the right apps on your Protected Apps list. After you're done, you can change to your final enforcement policy, either Override or Block.

Mode Description
Block EDP looks for inappropriate data sharing practices and stops the employee from completing the action. This can include sharing info across non-enterprise-protected apps in addition to sharing enterprise data between other people and devices outside of your enterprise.
Override EDP looks for inappropriate data sharing, warning employees if they do something deemed potentially unsafe. However, this management mode lets the employee override the policy and share the data, logging the action to your audit log, accessible through the [Reporting CSP](http://go.microsoft.com/fwlink/p/?LinkID=746459).
Silent EDP runs silently, logging inappropriate data sharing, without blocking anything.
Off EDP is turned off and doesn't help to protect or audit your data.

After you turn off EDP, an attempt is made to decrypt any closed EDP-tagged files on the locally attached drives.

Microsoft Intune: Add the protection level for your Protected Apps list

Define your enterprise-managed identity domains

Specify your companys enterprise identity, expressed as your primary internet domain. For example, if your company is Contoso, its enterprise identity might be contoso.com. The first listed domain (in this example, contoso.com) is the primary enterprise identity string used to tag files protected by any app on the Protected App list.

You can also specify all the domains owned by your enterprise that are used for user accounts, separating them with the "|" character. For example, if Contoso also has some employees with email addresses or user accounts on the fabrikam.com domain, you would use contoso.com|fabrikam.com.

This list of managed identity domains, along with the primary domain, make up the identity of your managing enterprise. User identities (user@domain) that end in any of the domains on this list, are considered managed.

To add your primary domain

  • Type the name of your primary domain into the Primary domain field. For example, contoso.com.

    If you have multiple domains, you must separate them with the "|" character. For example, contoso.com|fabrikam.com.

    Microsoft Intune: Add the primary internet domain for your enterprise identity

Choose where apps can access enterprise data

After you've added a protection level to your apps, you'll need to decide where those apps can access enterprise data on your network. There are 6 options, including your network domain, cloud domain, proxy server, internal proxy server, IPv4 range, and IPv6 range.

Important

  • Every EDP policy should include policy that defines your enterprise network locations.

  • Classless Inter-Domain Routing (CIDR) notation isnt supported for EDP configurations.

To specify where your protected apps can find and send enterprise data on the network

  1. Add additional network locations your apps can access by clicking Add, typing a description into the Description box, and then choosing your location type, including:

    Network location type Format Description
    Enterprise Cloud Domain contoso.sharepoint.com,proxy1.contoso.com|
    office.com|proxy2.contoso.com
    Specify the cloud resources traffic to restrict to your protected apps.

    For each cloud resource, you may also specify an internal proxy server that routes your traffic from your **Enterprise Internal Proxy Server** policy. If you have multiple resources, you must use the | delimiter.

    Include the "," delimiter just before the "|" if you dont use proxies. For example:
    `[URL,Proxy]|[URL,Proxy]`

    Enterprise Network Domain domain1.contoso.com,domain2.contoso.com Specify the DNS suffix used in your environment. All traffic to the fully-qualified domains using this DNS suffix will be protected. If you have multiple resources, you must use the "," delimiter.

    This setting works with the IP Ranges settings to detect whether a network endpoint is enterprise or personal on private networks.

    Enterprise Proxy Server domain1.contoso.com:80;domain2.contoso.com:137 Specify the proxy server and the port traffic is routed through. If you have multiple resources, you must use the ";" delimiter.

    This setting is required if you use a proxy in your network. If you don't have a proxy server, you might find that enterprise resources are unavailable when a client is behind a proxy, such as when using certain Wi-Fi hotspots at hotels and restaurants.

    Enterprise Internal Proxy Server proxy1.contoso.com;proxy2.contoso.com Specify the proxy servers your cloud resources will go through. If you have multiple resources, you must use the ";" delimiter.
    Enterprise IPv4 Range **Starting IPv4 Address:** 3.4.0.1
    **Ending IPv4 Address:** 3.4.255.254
    **Custom URI:** 3.4.0.1-3.4.255.254,10.0.0.1-10.255.255.254
    Specify the addresses for a valid IPv4 value range within your intranet.

    If you are adding a single range, you can enter the starting and ending addresses into your management systems UI. If you want to add multiple addresses, we suggest creating a Custom URI, using the "-" delimiter between start and end of a range, and the "," delimiter to separate ranges.

    Enterprise IPv6 Range **Starting IPv6 Address:** 2a01:110::
    **Ending IPv6 Address:** 2a01:110:7fff:ffff:ffff:ffff:ffff:ffff
    **Custom URI:** 2a01:110::-2a01:110:7fff:ffff:ffff:ffff:ffff:ffff,fd00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
    Specify the addresses for a valid IPv6 value range within your intranet.

    If you are adding a single range, you can enter the starting and ending addresses into your management systems UI. If you want to add multiple addresses, we suggest creating a Custom URI, using the "-" delimiter between start and end of a range, and the "," delimiter to separate ranges.

    Microsoft Intune: Choose the primary domain and the other network locations for protected apps

  2. Add as many locations as you need, and then click OK.

    The Add or Edit Enterprise Network Locations box closes.

  3. In the Use a data recovery certificate in case of data loss box, click Browse to add a data recovery certificate for your policy.

    Adding a data recovery certificate helps you to access locally-protected files on the device. For example, if an employee leaves the company and the IT department has to access EDP-protected data from a Windows 10 company computer. This can also help recover data in case an employee's device is accidentally revoked. For more info about how to find and export your data recovery certificate, see the Data Recovery and Encrypting File System (EFS) topic.

    Microsoft Intune: Specify a data recovery certificate for your policy

After you've decided where your protected apps can access enterprise data on your network, youll be asked to decide if you want to add any optional EDP settings.

To add your optional settings

  1. Choose to set any or all of the optional EDP-related settings:

    • Allow the user to decrypt data that was created or edited by the apps configured above. Clicking Yes, or turning off this setting in Intune, lets your employees right-click to decrypt their protected app data, along with the option to decrypt data in the Save As box and the Save As file picker . Clicking No removes the Decrypt option and saves all data for protected apps as enterprise-encrypted.

    • Protect app content when the device is in a locked state for the apps configured above. Clicking Yes lets EDP help to secure protected app content when a mobile device is locked. We recommend turning this option on to help prevent data leaks from things such as email text that appears on the Lock screen of a Windows 10 Mobile phone.

      Microsoft Intune: Optional EDP settings

  2. Click Save Policy.