How to Create Configure and Deploy Windows 10 WIP Policies Using SCCM Intune

How to implement Windows 10 DLP solution called EDP or WIP with in your enterprise. This post and videos will help you to understand it better


In this post, I’ll give an overview of Windows Information Protection (WIP)/Enterprise Data Protection (EDP) policy configuration and Windows 10  EDP End User Experience. What is WIP/EDP? It is very important to understand that WIP is accidental Data Leakage protection solution by Microsoft. Windows 10 enterprise has loads of security enhancements. I think, Microsoft invested heavily on mainly on 3 pieces and those are 1.  Secure Identities 2. Information Protection and 3. Threat Resistance.  Windows Information Protection/EDP is part of Information Protection. Within information protection, Microsoft recommend to have 1. Encryption (Bit locker), 2. WIP/EDP and  3. Azure Information Protection (or RMS).


WIP/EDP is fully supported in Windows 10 anniversary edition (1607) which is released recently. We can use Intune standalone and SCCM CB 1606 to configure Windows Information Protection policies. Before implementing the WIP in your organization, it’s very important to find out which are the WIP enabled applications and we have to define which WIP mode the applications will be in Allow and Exempt.

Before I go into details, here is video tutorial to explain the configurations along with Windows 10 end user experience demo.   I used Windows 10 Insider Build 14342 with Microsoft Intune.

How to Create – Deploy WIP EDP Using SCCM CB 1606 and End-user experience of WIP :-

How to start Implementing Windows 10 Windows Information Protection Using Intune

Following are the quick steps to configure (Intune console) the Windows 10 EDP policies:-

Configure the list of Windows 10 Apps (Universal/Store or Desktop) which you wanted to protect through EDP
Select the EDP/WIP Mode of protection
Configure the Network locations/IP Range
Upload the Data Recovery certificates
EDP settings

Configure the list of Windows 10 Apps (Universal/store or Desktop) which you wanted to protect through WIP

There are two types of Apps in Intune console which we can configure Universal/Store and Desktop apps. To configure Windows 10 EDP/WIP policies, we need to first identify the applications which you wanted to protect via EDP policies. For that First thing we need to get the Publisher details and product name of the apps.  How to get those information ?
Intune Console:-
SCCM Console :-
You can find the publisher and product name of store, desktop apps using Local Security Policy –> Application Control Policies –> App Locker –> Package app Rules.

Select the WIP/EDP Mode of protection

Which mode of protection you wanted select for EDP polciy – I selected the block mode !! The protection modes available in EDP policy are  1. Block 2.Override 3. Silent 4.Off

Configure the Network locations through EDP/WIP Policies

Network locations that the apps you configured can access. No other apps can access these locations. These network location settings are very important for EDP/WIP policy to work on Windows 10 machine !!

Below 4 network location settings are mandatory settings (I think):-
Primary Domain (my primary domain is trail tenant)
Enterprise Cloud Domain (Exchange Online)|
Enterprise Network Domain (Dummy URL is fine I think – it worked for me)
Enterprise IPv4 Range (Any IP range is fine I think – Hyper-V lab IP Range worked for me)
Internal IP range
Intune Console :-
 SCCM Console :-

Configure WIP/EDP Data recovery agent cert

Configure WIP/EDP Data recovery agent cert is mandatory now !! The recommended way is to re-use the EFS DRA from your domain, when you have one. There are some other ways to create a test cert !!I have uploaded one as you can see in the below picture :-

Configure WIP/EDP Policy settings

WIP/EDP Settings – Last piece of WIP/EDP configuration in Intune. By default none of these settings are not enabled !!
Allow user to edit or decrypt data –> NO
Protect App content when the device is in locked state –> Yes

Windows 10 WIP/EDP – End User Experience

In my example here :-

WordPad is NOT EDP protected APP – I tried to copy the enterprise mail content to an unprotected app and it gave me the following error “This is work content only – your organization,, doesn’t allow you to change the ownership of this content from work to Personal

Notepad is EDP Protected APP – I tried to copy the enterprise mail content to an WIP/EDP protected app  (NOTEPAD) and it allowed me to copy the content.  And you should notice the EDP lock symbol.


Internet Explorer(IE) provides a EDP Lock Symbol when you browse an Enterprise location :-


Microsoft Edge provides an EDP Lock Symbol when you browse an Enterprise location :-


OneDrive universal application provides an EDP Lock Symbol for enterprise OneDrive account but not for personal OneDrive account


Reference :- Here


  1. Awesome posting Anoop – very helpful.
    I have a couple of quick questions regarding Outlook on Windows 10 Mobile with an On-Premise Exchange – how would you configure the configuration item?

    -Is the primary domain in the configuration item all the corporate email domains?
    -The Enterprise Network domain: the local active directory domain where the Exchange resides (e.g mx01.domain.local)
    -The IP Ranges: the IP range of the Exchange server?

    Thank you in advance!


  2. Hi there, apologies as I don’t think this is the right post for this but I’m trying to upgrade windows mobiles from 8.1 to 10 using SCCM CB hybrid. I’ve got the compliance policy that makes 10 available, however I’m trying to force the upgrade to go in. I don’t really want to get all the phones and click “upgrade”I just want them to do so when enrolled and they get the policy. Is there a way to do that please?


Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.