How to Create Configure Deploy Windows 10 WIP Policies Using SCCM Intune Endpoint Protection

How to Create Configure Deploy Windows 10 WIP Policies Using SCCM Intune Endpoint Protection? Endpoint Protection is the new solution that is going to replace Windows Information Protection (WIP).

In this post, I’ll give an overview of Windows Information Protection (WIP)/Enterprise Data Protection (EDP) policy configuration and Windows 10  EDP End User Experience.

What is WIP/EDP? Endpoint Protection

It is very important to understand that WIP is an accidental Data Leakage protection solution by Microsoft. Windows 10 enterprise has loads of security enhancements. I think Microsoft invested heavily mainly on 3 pieces and those are

Patch My PC
  • 1. Secure Identities
  • 2. Information Protection
  • 3. Threat Resistance.  

Data Protection Options? Endpoint Protection

Windows Information Protection/EDP is part of Information Protection. Within information protection, Microsoft recommends having

1. Encryption (Bit locker),

2. WIP/EDP

1E Nomad

3. Azure Information Protection (or RMS).

Endpoint Protection
Endpoint Protection

WIP/EDP is fully supported in Windows 10 anniversary edition (1607) which is released recently. We can use Intune standalone and SCCM CB 1606 to configure Windows Information Protection policies. Endpoint Protection policies?

Before implementing the WIP in your organization, it’s very important to find out which are the WIP enabled applications and we have to define which WIP mode the applications will be in Allow and Exempt.

Before I go into details, here is video tutorial to explain the configurations along with Windows 10 end user experience demo.   I used Windows 10 Insider Build 14342 with Microsoft Intune.

How to Create – Deploy WIP EDP Using SCCM CB 1606 and End-user experience of WIP :-

httpv://www.youtube.com/watch?v=embed/ogylLn18C10
Endpoint Protection

How to start Implementing Windows 10 Windows Information Protection Using Intune

httpv://www.youtube.com/watch?v=embed/k2shaV2Kj3Q
Endpoint Protection

Following are the quick steps to configure (Intune console) the Windows 10 EDP policies:-

Configure the list of Windows 10 Apps (Universal/Store or Desktop) which you wanted to protect through EDP
Select the EDP/WIP Mode of protection
Configure the Network locations/IP Range
Upload the Data Recovery certificates
EDP settings

Configure the list of Windows 10 Apps (Universal/store or Desktop) which you wanted to protect through WIP

There are two types of Apps in Intune console which we can configure Universal/Store and Desktop apps. To configure Windows 10 EDP/WIP policies, we need to first identify the applications which you wanted to protect via EDP policies. For that First thing we need to get the Publisher details and product name of the apps.  How to get those information ? Intune Console:-

Windows10_Intune_EDP_Policies_1
Endpoint Protection

SCCM Console :-

WIP_How_to_Add_App_Rules

You can find the publisher and product name of store, desktop apps using Local Security Policy – > Application Control Policies – > App Locker – > Package app Rules.

WIP_App_Publisher_Details_Package_Name_1
Endpoint Protection

Select the WIP/EDP Mode of protection – Endpoint Protection

Which mode of protection you wanted select for EDP polciy – I selected the block mode !! The protection modes available in EDP policy are  1. Block 2.Override 3. Silent 4.Off

Windows10_Intune_EDP_Policies_4
Endpoint Protection

Configure the Network locations through EDP/WIP Policies

Network locations that the apps you configured can access. No other apps can access these locations. These network location settings are very important for EDP/WIP policy to work on Windows 10 machine !! Below 4 network location settings are mandatory settings (I think):-

Primary Domain (my primary domain is trail tenant)
PuneITPro.onmicrosoft.com Enterprise Cloud Domain (Exchange Online)
outlook.office.com|outlook.office365.com Enterprise Network Domain (Dummy URL is fine I think – it worked for me)

blogs.anoopcnair.com Enterprise IPv4 Range (Any IP range is fine I think – Hyper-V lab IP Range worked for me)
Internal IP range 192.0.0.1-192.255.255.254 Intune Console :-

Windows10_Intune_EDP_Policies_5

SCCM Console :-

WIP_Corporate_Network_Definition

Configure WIP/EDP Data recovery agent cert

Configure WIP/EDP Data recovery agent cert is mandatory now !! The recommended way is to re-use the EFS DRA from your domain, when you have one. There are some other ways to create a test cert !!I have uploaded one as you can see in the below picture :-

Windows10_Intune_EDP_Policies_6
Endpoint Protection

Configure WIP/EDP Policy settings

WIP/EDP Settings – Last piece of WIP/EDP configuration in Intune. By default none of these settings are not enabled !! Allow user to edit or decrypt data – > NO
Protect App content when the device is in locked state – > Yes

Windows10_Intune_EDP_Policies_7

Windows 10 WIP/EDP – End User Experience

In my example here :-

WordPad is NOT EDP protected APP – I tried to copy the enterprise mail content to an unprotected app and it gave me the following error “This is work content only – your organization, PuneITPro.onmicrosoft.com, doesn’t allow you to change the ownership of this content from work to Personal”

Windows10_Intune_EDP_Policies_9


Notepad is EDP Protected APP – I tried to copy the enterprise mail content to an WIP/EDP protected app  (NOTEPAD) and it allowed me to copy the content.  And you should notice the EDP lock symbol.

Windows10_Intune_EDP_Policies_10

Internet Explorer(IE) provides a EDP Lock Symbol when you browse an Enterprise location :-

Windows10_Intune_EDP_Policies_8

Microsoft Edge provides an EDP Lock Symbol when you browse an Enterprise location :-

Windows10_Intune_EDP_Policies_11

OneDrive universal application provides an EDP Lock Symbol for enterprise OneDrive account but not for personal OneDrive account

Windows10_Intune_EDP_Policies

Reference

:- Here

Endpoint security – Microsoft Security

13 thoughts on “How to Create Configure Deploy Windows 10 WIP Policies Using SCCM Intune Endpoint Protection”

  1. Awesome posting Anoop – very helpful.
    I have a couple of quick questions regarding Outlook on Windows 10 Mobile with an On-Premise Exchange – how would you configure the configuration item?

    -Is the primary domain in the configuration item all the corporate email domains?
    -The Enterprise Network domain: the local active directory domain where the Exchange resides (e.g mx01.domain.local)
    -The IP Ranges: the IP range of the Exchange server?

    Thank you in advance!

    Br,
    Mike

    Reply
  2. Hi there, apologies as I don’t think this is the right post for this but I’m trying to upgrade windows mobiles from 8.1 to 10 using SCCM CB hybrid. I’ve got the compliance policy that makes 10 available, however I’m trying to force the upgrade to go in. I don’t really want to get all the phones and click “upgrade”I just want them to do so when enrolled and they get the policy. Is there a way to do that please?

    Reply
  3. Hello Anup,

    i had been asked implement WIP in my Org and i have followed all the steps provided by MS but WIP is not working as expected. Am am using SCCM to deploy WIP policies on 1803 machines and on the client machines i see my WIP baseline and compliant status says “Non-Compliant”. its been quite a long time am working on this project but could not find what’s stopping WIP to work on my test devices. It would be great if you can assist me here. thanks.

    Reply
  4. Hello Anoop,

    i had been asked implement WIP in my Org and i have followed all the steps provided by MS but WIP is not working as expected. Am am using SCCM to deploy WIP policies on 1803 machines and on the client machines i see my WIP baseline and compliant status says “Non-Compliant”. its been quite a long time am working on this project but could not find what’s stopping WIP to work on my test devices. It would be great if you can assist me here. thanks.

    Reply

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.