Step-by-Step Guide to Enforce Proxies for UWP Apps and Stop Data Leaks using Intune Policy

Let’s discuss Step-by-Step Guide to Enforce Proxies for UWP Apps and Stop Data Leaks using Intune Policy. This policy defines the list of proxy servers that UWP apps must use to reach the public internet. Enterprise Proxy Server policy is only applies to Universal Windows Platform (UWP) apps.

This policy is part of the broader Windows Network Boundary settings and directly supports advanced security features like Windows Information Protection (WIP) and Microsoft Defender Application Guard (MDAG).

With Enterprise Proxy Server Policy, admins can ensure that modern apps and Windows services know exactly which trusted proxies they must use to reach the internet. This is the most crucial function for security. It prevents proxy setting overrides, ensures security inspection (SSL decryption) always happens.

This policy can be implemented for Security-Focused Enterprises like Large Corporations with Strict Network Policies, Large Corporations with Strict Network Policies and Organizations Using Advanced Security Features.

Patch My PC

Step-by-Step Guide to Enforce Proxies for UWP Apps and Stop Data Leaks using Intune Policy

Enterprise Proxy Server Policy provides many advantages for users. Users can access internal applications, cloud resources, and network drives securely without having to manually configure proxy settings. When browsing to an untrusted site, the session is automatically isolated by Application Guard, protecting the user’s device and the company network.

Configure Policy from Intune Portal

Admins can enforce this policy for large number of devices in an organization. This policy allows admins to configure for complex network boundaries (IPs, domains, proxies) from a single Intune console, with explicit control over network traffic routing.

Step-by-Step Guide to Enforce Proxies for UWP Apps and Stop Data Leaks using Intune Policy - Fig.1
Step-by-Step Guide to Enforce Proxies for UWP Apps and Stop Data Leaks using Intune Policy – Fig.1

Profile Choosing Step

After that you can choose appropriate platform and profile type. This is necessary step for policy creation and you cannot change profile and platfrom after creating profile. Here I would like to configure the policy to Windows 10 and later platform and settings catalog profile. Then click on the Create button.

Step-by-Step Guide to Enforce Proxies for UWP Apps and Stop Data Leaks using Intune Policy - Fig.2
Step-by-Step Guide to Enforce Proxies for UWP Apps and Stop Data Leaks using Intune Policy – Fig.2

Begin Policy with Basic Tab

Basic Tab is the first tab that helps users to give identity for policy. For this you can add Name and description for the settings you want to select for policy creation. Here is Name is mandatory and description is optional. After adding this click on the Next button.

Step-by-Step Guide to Enforce Proxies for UWP Apps and Stop Data Leaks using Intune Policy - Fig.3
Step-by-Step Guide to Enforce Proxies for UWP Apps and Stop Data Leaks using Intune Policy – Fig.3

Configure Enterprise Proxy Servers Policy

After that you will get Configuration settings tab which helps you to access specific settings. To get the settings click on the +Add settings hyperlink and select specific settings from Settings Picker. Here, I would like to select the settings by browsing by Category. I choose Network Isolation. Then, I choose Enterprise Proxy Servers Policy settings.

Step-by-Step Guide to Enforce Proxies for UWP Apps and Stop Data Leaks using Intune Policy - Fig.4
Step-by-Step Guide to Enforce Proxies for UWP Apps and Stop Data Leaks using Intune Policy – Fig.4

Add Value

If you enable this policy setting, apps on proxied networks can access the Internet without relying on the Private Network capability. However, in most situations Windows Network Isolation will be able to correctly discover proxies. By default, any proxies configured with this setting are merged with proxies that are auto-discovered.

To make this policy configuration the sole list of allowed proxies, enable the “Proxy definitions are authoritative” setting. If you disable or don’t configure this policy setting, apps will use the Internet proxies auto-discovered by Windows Network Isolation.

  • [3efe:3022::1000];18.0.0.1;18.0.0.2
Step-by-Step Guide to Enforce Proxies for UWP Apps and Stop Data Leaks using Intune Policy - Fig.5
Step-by-Step Guide to Enforce Proxies for UWP Apps and Stop Data Leaks using Intune Policy – Fig.5

Adding Scope Tags

Scope Tag is not a mandatory step for policy creation. But you can add Scope tags for visibility restrictions. Here, I don’t add scope tags for Enterprise IP Range Policy. Click on the Next button.

Step-by-Step Guide to Enforce Proxies for UWP Apps and Stop Data Leaks using Intune Policy - Fig.6
Step-by-Step Guide to Enforce Proxies for UWP Apps and Stop Data Leaks using Intune Policy – Fig.6

Selecting Group from the Assignment Tab

To assign the policy to specific groups, you can use the Assignment Tab. Here I click, +Add groups option under Included groups. I choose a group from the list of groups and click on the Select button. Again, I click on the Select button to continue.

Step-by-Step Guide to Enforce Proxies for UWP Apps and Stop Data Leaks using Intune Policy - Fig.7
Step-by-Step Guide to Enforce Proxies for UWP Apps and Stop Data Leaks using Intune Policy – Fig.7

Finalize Policy

This is the Fina step for policy creation. You can review all the details on this tab and avoid misconfiguration. After verifying all the details, click on the Create Button. After creating the policy, you will get a success message.

Step-by-Step Guide to Enforce Proxies for UWP Apps and Stop Data Leaks using Intune Policy - Fig.8
Step-by-Step Guide to Enforce Proxies for UWP Apps and Stop Data Leaks using Intune Policy – Fig.8

Device Check-in Status

Device Check-in Status Page shows if the Policy is succeeded or Not. Before checking this, you can sync the device on Company Portal for Faster policy deployment. Then Go to Devices > Configuration > Search for the Policy. Here, the policy shows as successful.

Step-by-Step Guide to Enforce Proxies for UWP Apps and Stop Data Leaks using Intune Policy - Fig.9
Step-by-Step Guide to Enforce Proxies for UWP Apps and Stop Data Leaks using Intune Policy – Fig.9

Client Side Verification

It helps you check the client side and verify the policy status. Open the Client device and open the Event Viewer. Go to Start > Event Viewer. Navigate to Logs: In the left pane, go to Application and Services Logs > Microsoft > Windows > DeviceManagement-Enterprise-Diagnostics-Provider > Admin.

MDM PolicyManager: Set policy string, Policy: (EnterpriseProxyServers), Area: (Networklsolation),
EnrollmentID requesting merge: (EB427D85-802F-46D9-A3E2-D5B414587F63), Current User:
(Device), String: ([3efe:3022 :: 1000];18.0.0.1;18.0.0.2), Enrollment Type: (0x6), Scope: (0x0).

Step-by-Step Guide to Enforce Proxies for UWP Apps and Stop Data Leaks using Intune Policy - Fig.10
Step-by-Step Guide to Enforce Proxies for UWP Apps and Stop Data Leaks using Intune Policy – Fig.10

Removing the Assigned Group from Enterprise Proxy Servers Policy Settings

If you want to remove the Assigned group from the policy, it is possible from the Intune Portal. To do this, open the Policy on Intune Portal and edit the Assignments tab and the Remove Policy.

To get more detailed information, you can refer to our previous post – Learn How to Delete or Remove App Assignment from Intune using by Step-by-Step Guide.

Step-by-Step Guide to Enforce Proxies for UWP Apps and Stop Data Leaks using Intune Policy - Fig.11
Step-by-Step Guide to Enforce Proxies for UWP Apps and Stop Data Leaks using Intune Policy – Fig.11

How to Delete Enterprise Proxy Servers Policy

You can easily delete the Policy from the Intune Portal. From the Configuration section, you can delete the policy. It will completely remove it from the client devices.

For detailed information, you can refer to our previous post – How to Delete Allow Clipboard History Policy in Intune Step by Step Guide.

Step-by-Step Guide to Enforce Proxies for UWP Apps and Stop Data Leaks using Intune Policy - Fig.12
Step-by-Step Guide to Enforce Proxies for UWP Apps and Stop Data Leaks using Intune Policy – Fig.12

Windows CSP Details

This setting doesn’t apply to desktop apps. A semicolon-separated list of Internet proxy server IP addresses. These addresses are categorized as Internet by Windows Network Isolation and are accessible to apps that have the Internet Client or Internet Client/Server capabilities.

NameValue
NameWF_NetIsolation_Domain_Proxies
Friendly NameInternet proxy servers for apps
Element NameDomain Proxies.
LocationComputer Configuration
PathNetwork > Network Isolation
Registry Key NameSOFTWARE\Policies\Microsoft\Windows\NetworkIsolation
ADMX File NameNetworkIsolation.admx
Step-by-Step Guide to Enforce Proxies for UWP Apps and Stop Data Leaks using Intune Policy – Table.1
Step-by-Step Guide to Enforce Proxies for UWP Apps and Stop Data Leaks using Intune Policy - Fig.13
Step-by-Step Guide to Enforce Proxies for UWP Apps and Stop Data Leaks using Intune Policy – Fig.13

Need Further Assistance or Have Technical Questions?

Join the LinkedIn Page and Telegram group to get the step-by-step guides and news updates. Join our Meetup Page to participate in User group meetings. Also, Join the WhatsApp Community to get the latest news on Microsoft Technologies. We are there on Reddit as well.

Author

Anoop C Nair has been Microsoft MVP for 10 consecutive years from 2015 onwards. He is a Workplace Solution Architect with more than 22+ years of experience in Workplace technologies. He is a Blogger, Speaker, and Local User Group Community leader. His primary focus is on Device Management technologies like SCCM and Intune. He writes about technologies like Intune, SCCM,   Windows, Cloud PC,  Windows, Entra,  Microsoft Security, Career, etc

Leave a Comment