Microsoft Information Protection is a Unified solution integrating Information protection solutions such as Office 365 Information Protection, Windows Information Protection, and Azure Information Protection. Refer (here). From this post, I am targeting a BYOD strategy where the company does not have any ownership or authority over the end-user device. Still, corporate data can be protected on this personal device.
Windows information protection deployed through Intune App protection policy on without enrolled device to Intune will achieve this scenario. Before jump into the step-by-step configurations, let's understand the overall concept.
01 - Understanding Microsoft Information Protection
03 - Windows Information Protection | Intune App Protection Without Enrolment | User Experience
Microsoft Information Protection is a Unified solution to address Device Protection, Data Separation, Leak Protection, Sharing Protection. It uses Information protection solutions such as BitLocker, Office 365 Information Protection, Windows Information Protection, and Azure Information Protection.
Windows Information Protection
WIP helps to protect against potential information leakage without otherwise interfering with the user experience. WIP also helps to protect enterprise apps and information against accidental information leakage on enterprise-owned, corporate-owned, and employee-owned devices (BYOD) without requiring changes to your environment or other apps
App protection policies (APP) are rules that ensure an organization's data remains safe or contained in a managed app. A policy can be enforced to monitor or prohibit move corporate data from these applications. It is ensured data is safe within these manage apps. A managed app is an app that has app protection policies applied to it and can be managed by Intune.
There are two types of app protection policies that can be applied to Windows 10
Enlighten and unenlightened applications
Before configuring the WIP-WE policy, you need to define the user scope of the MAM provider. This setting only affects Windows 10 devices, not Android or iOS devices.
Log in to the Azure Portal – Azure Active directory - Mobility (MDM and MAM) – Microsoft Intune - MAM user scope.
Select a group for the BYOD users or select All users. If the URL is different than what is on the screenshot, click Restore default MAM URLs to get the original.
This will register the device to the Azure Active Directory when the user signs in to the WIP policy specified protected application.
Note – you can add unenlightened apps as well. When adding a custom app, make sure to select the correct EXE name and the publisher. Also, as I explained before, unenlightened apps do not become aware of the separation of corporate and personal data, so it treats all the data as corporate and applies policies.
Windows Information protection mode – you can select a protection mode from below list
Block – this will block corporate data being shared with other than protected apps.
Allow overrides – Users will get notified when they tried to move the protected app's data to none protected. It will not block the action, notification, and log.
Silent – User will not get a notification when moving protected data to unprotected apps. Action will be logged.
Off – will not enforce the policy.
Corporate identity -
This is how corporate or enterprise data being identified. This field should only contain the primary domain of the company. All other corporate domains should be added to the Protected domains in the network perimeter.
Here I am selecting Block and my primary domain.
Note - There are no default locations included with WIP. You must add each of your network locations. This area applies to any network endpoint device that gets an IP address in your enterprise’s range and is also bound to one of your enterprise domains, including SMB shares. Local file system locations should just maintain encryption (for example, on local NTFS, FAT, ExFAT).
here I’m only considering Office 365 and Microsoft application access, below network boundaries, should be added. If you have additional domains, add them to Protected Domains.
After you have assigned the policy, it will be received by the users in few minutes. There is an Azure report you can download to see the status.
Endpoint management portal – Apps – Monitor – App Protection status click App Protection report: WIP without enrolment. You can get the username, device name, policy, and last sync time.
This is how you configure a WIP policy on BYOD devices to restrict access to corporate data. From the next post, let's discuss the user experience and what to expect from this policy. This would be very important to implement BYOD hygiene and how users can work efficiently.
Next - Windows Information Protection | Intune App Protection Without Enrolment | User Experience
I hope this post is useful.
Cheers