How to Create Configure Deploy Windows 10 WIP Policies Using SCCM Intune Endpoint Protection

How to Create Configure Deploy Windows 10 WIP Policies Using SCCM Intune Endpoint Protection? Endpoint Protection is the new solution that is going to replace Windows Information Protection (WIP).

In this post, I’ll give an overview of Windows Information Protection (WIP)/Enterprise Data Protection (EDP) policy configuration and Windows 10  EDP End User Experience.

What is WIP/EDP? Endpoint Protection

It is very important to understand that WIP is an accidental Data Leakage protection solution by Microsoft. Windows 10 enterprise has loads of security enhancements. I think Microsoft invested heavily mainly on 3 pieces and those are

  • 1. Secure Identities
  • 2. Information Protection
  • 3. Threat Resistance.  

Data Protection Options? Endpoint Protection

Windows Information Protection/EDP is part of Information Protection. Within information protection, Microsoft recommends having

1. Encryption (Bit locker),


3. Azure Information Protection (or RMS).

Endpoint Protection
Endpoint Protection

WIP/EDP is fully supported in Windows 10 anniversary edition (1607) which is released recently. We can use Intune standalone and SCCM CB 1606 to configure Windows Information Protection policies. Endpoint Protection policies?

Before implementing the WIP in your organization, it’s very important to find out which are the WIP enabled applications and we have to define which WIP mode the applications will be in Allow and Exempt.

Before I go into details, here is video tutorial to explain the configurations along with Windows 10 end user experience demo.   I used Windows 10 Insider Build 14342 with Microsoft Intune.

How to Create – Deploy WIP EDP Using SCCM CB 1606 and End-user experience of WIP :-

Endpoint Protection

How to start Implementing Windows 10 Windows Information Protection Using Intune

Endpoint Protection

Following are the quick steps to configure (Intune console) the Windows 10 EDP policies:-

Configure the list of Windows 10 Apps (Universal/Store or Desktop) which you wanted to protect through EDP
Select the EDP/WIP Mode of protection
Configure the Network locations/IP Range
Upload the Data Recovery certificates
EDP settings

Configure the list of Windows 10 Apps (Universal/store or Desktop) which you wanted to protect through WIP

There are two types of Apps in Intune console which we can configure Universal/Store and Desktop apps. To configure Windows 10 EDP/WIP policies, we need to first identify the applications which you wanted to protect via EDP policies. For that First thing we need to get the Publisher details and product name of the apps.  How to get those information ? Intune Console:-

Endpoint Protection

SCCM Console :-


You can find the publisher and product name of store, desktop apps using Local Security Policy – > Application Control Policies – > App Locker – > Package app Rules.

Endpoint Protection

Select the WIP/EDP Mode of protection – Endpoint Protection

Which mode of protection you wanted select for EDP polciy – I selected the block mode !! The protection modes available in EDP policy are  1. Block 2.Override 3. Silent 4.Off

Endpoint Protection

Configure the Network locations through EDP/WIP Policies

Network locations that the apps you configured can access. No other apps can access these locations. These network location settings are very important for EDP/WIP policy to work on Windows 10 machine !! Below 4 network location settings are mandatory settings (I think):-

Primary Domain (my primary domain is trail tenant) Enterprise Cloud Domain (Exchange Online)| Enterprise Network Domain (Dummy URL is fine I think – it worked for me) Enterprise IPv4 Range (Any IP range is fine I think – Hyper-V lab IP Range worked for me)
Internal IP range Intune Console :-


SCCM Console :-


Configure WIP/EDP Data recovery agent cert

Configure WIP/EDP Data recovery agent cert is mandatory now !! The recommended way is to re-use the EFS DRA from your domain, when you have one. There are some other ways to create a test cert !!I have uploaded one as you can see in the below picture :-

Endpoint Protection

Configure WIP/EDP Policy settings

WIP/EDP Settings – Last piece of WIP/EDP configuration in Intune. By default none of these settings are not enabled !! Allow user to edit or decrypt data – > NO
Protect App content when the device is in locked state – > Yes


Windows 10 WIP/EDP – End User Experience

In my example here :-

WordPad is NOT EDP protected APP – I tried to copy the enterprise mail content to an unprotected app and it gave me the following error “This is work content only – your organization,, doesn’t allow you to change the ownership of this content from work to Personal”


Notepad is EDP Protected APP – I tried to copy the enterprise mail content to an WIP/EDP protected app  (NOTEPAD) and it allowed me to copy the content.  And you should notice the EDP lock symbol.


Internet Explorer(IE) provides a EDP Lock Symbol when you browse an Enterprise location :-


Microsoft Edge provides an EDP Lock Symbol when you browse an Enterprise location :-


OneDrive universal application provides an EDP Lock Symbol for enterprise OneDrive account but not for personal OneDrive account



:- Here

Endpoint security – Microsoft Security