In this we blog chapter will discuss the setup and configuration of Windows Information Protection (WIM), Mobile Application Management (MAM) and Azure Right Management (RMS). As a final result, you will be able to protect corporate data leaked by mistake, have a way to track data leakage for further investigation, block data storage to untrusted locations and have a way to securely share data outside of your company.
Set-Up Windows Information Protection
With the increase of employee-owned devices in the enterprise, there’s an increasing risk of accidental data disclosure through apps and services, like email, social media, and the public cloud, which are outside of the enterprise’s control. For example, when an employee sends the latest engineering pictures from their personal email account, copies and pastes product info into a tweet, or saves an in-progress sales report to their public cloud storage.
WIP helps to protect against this potential data leakage without otherwise interfering with the employee experience. On both, enterprise-owned devices and personal devices that employees bring to work, enterprise applications as well as data can be protected by WIP without requiring changes to the customer environment or applications. Azure Information Protection and Azure Rights Management will work alongside WIP in the future to extend data protection for data that leaves the device, such as when email attachments are sent from an enterprise aware version of a rights management mail client.
Thus, WIP will provide an end-to-end protection of data, addressing all situations an employee is confronted with. For this, it is necessary to differentiate between two scenarios: Data-At-Rest, when data is stored and worked on at a Desktop, Tablet PC or mobile device, and Data-In-Transit, when data is being sent or received via email or shared via SharePoint or OneDrive for Business for instance. In order to address all use cases, both, the protection of data in rest, and the protection of Data-In-Transit is crucial for an end-to-end protection.
Data-At-Rest
Data-At-Rest is data, which is handled on a device itself only. Data on this device can be compromised when the device itself is lost or stolen and unauthorized access is possible.
Many customers understand the need for a Data-At-Rest Protection solution for mobile devices as a mobile phone is easily lost. Nonetheless, not only mobile devices need to be protected. Especially personal computers (PCs) are not only susceptible of extraction of data, but also to other risks when the device is unencrypted. Attackers can use hacking tools to log into the devices with a local admin account and extract domain user usernames and passwords (Pass-The-Hash attacks). Furthermore, data can easily be extracted if no secure wiping procedures are used when you decommission devices and disks due to age or hardware failure.
These scenarios explain why it is crucial to encrypt every volume on every device, particularly if it is an OS volume, including desktops, servers and mobile devices. The protection of Data-At-Rest with WIP leverages Encrypting File System (EFS). Data-At-Rest protection ensures that all enterprise related data which is stored on a PC is encrypted.
Data-At-Rest encryption and decryption
WIP uses public key encryption in conjunction with symmetric key encryption to provide confidentiality for files that resists all but the most sophisticated methods of attack. The file encryption key (FEK) — a symmetric bulk encryption key — is used to encrypt the file and is then itself encrypted by using the public key of the user, which is located in the user’s profile. The encrypted FEK is stored with the encrypted file and is unique to it. To decrypt the FEK, WIP uses the encryptor’s private key which only the file encryptor has. In addition to this, the DRA is also able to decrypt the file.
Data-At-Rest encryption workflow
Data-At-Rest decryption workflow
Revoke on un-enroll
In case a device gets stolen or an employee leaves the company, WIP protected data needs to be made inaccessible to the original user of the device.
One possibility to do that is by removing the private/public key pair of the user from the device. This ensures that the user on the device cannot decrypt his/her WIP protected files any longer, as the private key, which would be needed for that operation, does not exist anymore. In case the user’s keys are removed from the device, the EDP protected data still resides on the desktop device of that user – but it is inaccessible. Of course, the Data Recovery Agent is always able to decrypt the data. For more details about the DRA, please refer to DRA section
Another possibility to make data inaccessible for someone is by wiping the device. When a device was stolen, a complete wipe of the device might be necessary. This operation removes both personal as well as enterprise owned files and can be performed via SCCM or Intune. In case an employee resigns and takes his/her BYOD device with him/her, it is also possible to remove enterprise data only. This can be done by performing a selective wipe via Microsoft Intune, not yet with SCCM.
Note:
For mobile devices WIP protected data gets always wiped.
Revoke on un-enroll workflow
Data-In-Transit
Note: The protection of data-in-transit is a future feature of WIP.
Besides the risk of having one’s device stolen or lost, data can easily be mishandled by employees. The exchange of data needs to be as secure as possible, adding encryption to an organization’s data at all times. Thus, in addition to protecting data-at-rest, data-in-transit needs to be protected.
Data-in-transit can be compromised by the following scenarios, for example:
-
Data can be mishandled by accident. By accidentally sending an email with the wrong attachment, or sending the email to the wrong recipient data is disclosed.
-
Confidential data can be shared with unauthorized third parties by copy and pasting parts of it to personal apps like Facebook or WhatsApp.
Whenever data is sent via email or shared with someone, Azure Rights Management Services (RMS) needs to be added to WIP.
Encrypting File SystemEncrypting File System
Application and Data Types
Enterprise Data Protection clusters any applications and data into three areas: business, personal, and enlightened.
Personal applications and data are not managed and do not apply and Enterprise Data Protection related behaviors. These applications cannot have files written out in an encrypted format. Business applications and data are managed and are also called enlightened or unenlightened.
Unenlightened applications are policy unaware. They consider all data corporate and encrypt everything. Typically, unenlightened applications can be recognized because the Windows Desktop shows them as always running in enterprise mode and the Windows Save As experiences only allow to save files as enterprise ones.
Enlightened applications and data are aware of the Windows Information Protection policy. They can differentiate between corporate and personal data, correctly determining which to protect, based on the set policies. For example, enlightened applications provide users the user interface to choose between saving data as encrypted or non-encrypted. In case the user decides to save a file which has been identified as an enterprise resource as non-encrypted, the appropriate UI would warn the user of his/her actions.
The following applications are example of enlightened Microsoft applications:
Modern Apps or Universal Windows Apps
- Microsoft Edge
- Microsoft People
- Mobile Office apps, including Word, Excel, PowerPoint, OneNote, and Outlook Mail and Calendar
- Microsoft Photos
- Microsoft OneDrive
- Groove Music
- Microsoft Paint
- Microsoft Movies & TV
- Microsoft Messaging
Classic Apps or Win32 Apps
- Internet Explorer 11
- Notepad
Enlightened applications need to be added to the list of protected applications to allow them to access applications and data and to interact differently when used with not allowed, non-enterprise aware, or personal-only apps.
Business, enlightened and personal applications and data
Protection Modes
Enterprise Data Protection can operate in one of four different protection and management modes when using applications and data.
Mode |
Description |
Block |
WIP looks for inappropriate data sharing practices and stops the employee from completing the action. This can include sharing information across non-enterprise-protected apps in addition to sharing enterprise data between other people and devices outside of corporate environment. |
Override |
WIP looks for inappropriate data sharing, warning employees if they do something deemed potentially unsafe. However, this management mode lets the employee override the policy and share the data, logging the action to s audit log, accessible through the Reporting CSP. |
Silent |
WIP runs silently, logging inappropriate data sharing, without blocking anything. |
Off |
Windows Information Protection is turned off and does not help to protect or audit data. After Windows Information Protection is turned off, an attempt is made to decrypt any closed Windows Information Protection -tagged files on the locally attached drives. |
Reporting and Auditing
The Windows Information Protection reporting automatically audits the usage of WIP protected files. This includes any WIP policy violations (e.g. “override corporate saving”).
As Windows Information Protection does not support an out-of-the box solution for WIP Reporting, a custom implementation is recommended. To give a general idea, there will be a scale report which exemplarily shows Windows Information Protection reports in Intune. On desktop devices, Windows Event Forwarding could also be used to forward the events to an SIEM for analysis/processing.
Data Recovery Agent
The data recovery agent (DRA) is able to recover Windows Information Protection encrypted data.
If an employee leaves the company and WIP protected data needs to be made available for someone, a DRA can help to do so. The DRA could also help to recover data in case an employee’s certificate is accidentally revoked.
Usually, data can only be decrypted using a person’s private key and the symmetric FEK when the public key was used to decrypt it in the first place. In addition to encrypting data with the FEK protected by the owner’s public key, data is also encrypted with the FEK protected by the public key of the DRA. This way, besides the owner of the document, the DRA can decrypt data.
Note:
The DRA is a highly privileged role and must be protected accordingly. The private key should be bound to a smartcard, so that the private key never actually gets copied to a device when performing a decryption of data on a Windows 10 desktop device.
You have two options for backing up the private key:
- Export the DRA certificate containing the private key manually
- Use the Certificate Authority to archive the private key in its database when the DRA certificate is issued
The DRA certificate can be either issued from a CA or from a specific user device as a self-signed certificate. The public key is exported in Base64 format and added to the Windows Information Protection policy in SCCM or the MDM (e.g. Microsoft Intune). When provisioning the WIP policy to the devices, the DRA certificate (public key only) is provisioned to each device. From then onwards, besides the user’s public key, the DRA public key is wrapped around data when encrypting it. This way, not only the private key of the user but also the private key of the DRA can decrypt data.
Note:
It is strongly recommended to use a CA to issue the DRA certificate.
Current Windows Information Protection Limitations
As of June 2016, there exist several limitations in WIP:
- Windows Information Protection supports only Office 2016 click-to-run. It does not support Office Desktop 2013 MSI/C2R and Office 2016 MSI.
- Windows Information Protection does not support multiple users on one device. The first domain user who authenticates him-/herself on the device is eligible for EDP protection.
- Windows Information Protection does not support a protection of Data-In-Transit within the Windows 10 Anniversary Update timeframe. Only Data-At-Rest is protected by WIP so far.
- Windows Information Protection does not protect enterprises from malicious user behavior. For example, when a user intentionally circumvents the WIP protection by saving a corporate document as a private one and shares content of it afterwards with an unauthorized third-person, and thereby abuses the functionality of enlightened apps.
- Windows Information Protection supports no automatic reporting regarding WIP violations. Event forwarding to a SIEM solution is therefore recommended for domain-joined machines. Otherwise, a custom implementation for Windows Information Protection reporting is possible.
Technical Implementation
The following section will describe the step by step configurations on Windows Information Protection policy using Configuration Manager with Microsoft Intune. This document assumes that Active Directory and PKI infrastructure (ADCS) have been deployed in the IT environment.
Hybrid – Configuration Manager with Microsoft Intune
Hybrid always refers to a hybrid identity by synchronizing the local AD to Azure AD.
The following prerequisites need to be present for a Hybrid identity implementation
- Users need to be present in both Azure AD and the local AD.
- The devices need to be managed in Configuration Manager (version 1606 or later), which manages domain joined devices only, in combination with a cloud-based MDM, e.g. Microsoft Intune, to manage mobile devices.
- Windows 10 Anniversary Update needs to be running on all devices which want to get WIP provisioned.
When those prerequisites are met, WIP is provisioned as follows:
- The user adds his/her work or school account or performs a domain join using their AD account.
- Windows 10 devices are managed with MDM and/or Configuration Manager.
- The WIP policy is created within the Configuration Manager.
- The Configuration Manager then provisions the policy including the DRA key (public key only) to the user devices.
- Windows Information Protection can then be used by the users.
Creating a Data Recovery Agent
A key recovery agent is a person who is authorized to recover a data on behalf of an end user. Because the role of key recovery agents can involve sensitive data, only highly trusted individuals should be assigned to this role.
To identify a key recovery agent, you must configure the Key Recovery Agent certificate template to allow the person assigned to this role to enroll for a key recovery agent certificate.
Note:
If you are already using a Data Recovery Agent (DRA) for EFS, you can use the same account to decrypt/recover files protected by Windows Information Protection.If you want to use multiple DRAs, you can also create a security group including several accounts.
Creating the Data Recovery Agent Account
Create the following account:
Display Name |
Username |
Password |
Description |
Data Recovery Agent | svc_dra | **** | Will be used to decrypt/recover files which were previously encrypted by WIP/EFS. Domain User Account. |
Creating the Certificate Template
Membership in Domain Admins, or equivalent, is the minimum required to complete this procedure.
- Open the Certification Authority Snap-in, expand the name of your CA, right-click Certificate Templates and click Manage.
- The Certificate Templates Console starts.
- Right-click the EFS Recovery Agent Template and click Duplicate Template.
- Open the tab General and enter a Template display name.
- Check the box Publish certificate in Active Directory.
- Open the tab Request Handling and verify that the purpose is set to Encryption and Allow private key to be exported is checked.
Note:
If you want to archive the private key by leveraging the CA key archival feature you must also check Archive subject’s encryption private key.
Check Managing Key Archival and Recovery for Key recovery settings on Certificate Services.
- Open the tab Security, and click Add.
- The Select Users, Computers, Service Accounts and Groups window opens.
- Enter the name of your service account, click Check Names and confirm with OK.
- Check the permission for Enroll.
Note:
After a DRA certificate is issued, you may remove the permission for the service account from the template security settings.
- Click Apply and OK.
- Close the Certificate Templates Console window.
- Right-click Certificate Templates, select New and click Certificate Template to Issue.
- Select the previously created template from the list and click OK.
Requesting a DRA certificate
- Login with the previously created account to a domain-joined system.
Note: If this step violates your corporate policy, please refer to this TechNet article about requesting a certificate on behalf of a user. Additional requirements may apply. https://technet.microsoft.com/en-us/library/cc770802.aspx
You can also use the Certificate Authority Web Enrollment (certsrv) feature to request the certificate. Please refer to the following TechNet article for further guidance. This step requires logon with the service account to the certificate web services. https://technet.microsoft.com/en-us/library/hh831649.aspx
- Open certmgr.msc, expand Personal, right-click Certificates (or Personal), select All Tasks and click Request New Certificate.
- The Certificate Enrollment Wizard starts.
- Click Next, verify Active Directory Enrollment Policy is selected, click Next, select the previously created certificate template from the list and click Enroll.
- Wait for the enrollment process to complete and click Finish.
Export the DRA certificate
You have to export the DRA certificate twice. Once including the private key so you can back it up at a secure location and the second time without the private key. The second one will later be used when creating the INTUNE/CONFIGURATION MANAGER policy for WIP.
Export the DRA certificate including the private key
Note:
This step is only required if you don’t archive the private key using the CA key archival feature.
- Right click on the DRA certificate, select All Tasks and click Export.
- Click Next, select Yes, export the private key and click Next again.
- Enter a secure password and click Next.
- Browse to a secure location and click Save.
- Click Finish.
Export the DRA certificate without the private key
- Open certmgr.msc, expand Personal, expand Certificates, right-click the previously created DRA certificate, select All Tasks and click Export.
- The Certificate Export Wizard starts.
- Click Next, verify No, do not export the private key is selected, click Next, select Base-64 encoded X.509 (.CER), click Next, specify a filename and location, click Next, click Finish.
- Open Windows Explorer and navigate to the location of the exported certificate.
- Copy the certificate to a location where it can later be accessed when creating the Intune/CONFIGURATION MANAGER policy.
Note:
After the private key was successfully backed up, either by using the key archival feature or by saving it to a secure backup location, deleting the certificate with the private key from the system is recommended where it was requested.
Creating a Group Policy for the DRA
Note:
If there is already a deployed EFS Certificate, they need to use the existing DRA certificate for the Windows Information Protection encryption and decryption. This certificate is used as a Recovery Certificate prior to the DRA certificate in WIP configured in Configuration Manager. If there is no certificate deployed in EFS, then the DRA certificate in WIP will be used.
- Open the Group Policy Management Snap-in.
- Expand your forest, expand Domains, expand your domain, expand and right-click Group Policy Objects (GPO) and click New.
- Enter a Name, optionally select a Source Starter GPO and click OK.
- Right-click on the newly created GPO and click Edit.
- The Group Policy Management Editor starts.
- Expand Computer Configuration, expand Policies, expand Windows Settings, expand Security Settings, expand Public Key Policies and click Encrypting File System.
- Right-click Encrypting File System click Add Data Recovery Agent.
Note:
If you click New Data Recovery Agent and have sufficient permissions, a certificate for the currently logged on user will be automatically issued by one of your CAs. This certificate is based on the default certificate template EFSRecovery.
- The Add Data Recovery Agent Wizard starts.
- Click Next, click Browse Directory, type the name of the previously created service account, click Check Name and click OK.
- A confirmation pane showing the previously enrolled certificate for the service account is shown.
- Verify the certificate information and continue by clicking OK.
- Click Next and click Finish.
- Verify the information in the right pane of the Group Policy Management Editor.
Create a Policy with System Center Configuration Manager
After you’ve installed and set up System Center Configuration Manager for your organization, you must create a configuration item for WIP, which in turn becomes your Windows Information Protection policy.
There are Mandatory Polices that you must include in the Windows Information Protection Policy that you will create otherwise WIP will not work, these are:
- Protected Application List
- EDP Protection Mode
- Corporate Identity
- Enterprise Network Domain
- Enterprise IP Address Range
- Data Recovery Agent Certificate
Create a Configuration Item Policy for WIP
- Open the System Center Configuration Manager console, click the Assets and Compliance node, expand the Overview node, expand the Compliance Settings node, and then expand the Configuration Items node.
- Click the Create Configuration Item button.
- The Create Configuration Item Wizard starts.
- On the General Information screen, type a name (required) and an optional description for your policy into the Name and Description boxes.
- In the Specify the type of configuration item you want to create area, pick the option that represents whether you use System Center Configuration Manager client for device management, and then click Next.
- On the Supported Platforms screen, click the Windows 10 box, and then click Next.
- On the Device Settings screen, select Enterprise Data Protection, and then click Next.
- The Configure Enterprise Data Protection settings page appears, where you’ll configure the policy for your organization.
Choose Which Apps Can Access to your Enterprise Data
During the policy-creation process in Configuration Manager, you can choose the apps you want to give access to your enterprise data through Windows Information Protection. Apps included in this list can protect data on behalf of the enterprise and are restricted from copying or moving enterprise data to unprotected apps or unprotected network locations. This is Mandatory.
The steps to add your apps are based on the type of app it is; either a Universal Windows Platform (UWP) app, or a signed Classic Windows application.
Note:
Windows Information Protection -aware apps are expected to prevent enterprise data from going to unprotected network locations and to avoid encrypting personal data. On the other hand, WIP-unaware apps might not respect the corporate network boundary and will encrypt all files they create or modify, meaning that they could encrypt personal data and cause data leaks during the revocation process. Care must be taken to get a support statement from the software provider that their app is safe with Windows Information Protection before adding it to your Protected App list.
To add a Universal app
-
From the Configure the following apps to be protected by EDP table in the Protected Apps area, click Add.
-
Click Universal App, type the Publisher Name and the Product Name into the associated boxes, and then click OK. If you don’t have the publisher or product name, you can find them by following these steps.
Within Configuration Manager, a new option can be added to all apps which are added to the App Rules: For each app you can choose if it is set to Allow, Exempt, and Block If it is set to Allow, all WIP operations are allowed. In case it is set to Exempt, it bypasses the encryption capability (opening encrypted files is working, but saving a file as an encrypted file is not working). Block is to avoid accidental allow
Recommendation:
All enlightened apps should be set to Allow. The Exempt mode should be used very rarely as no protection of corporate data can be enforced within exempted apps. It is usually use for Application Compatibility and Use for unenlightened apps needed for work that touch personal data. Block is recommended for unenlightened apps that handle work & personal data.
Unenlightened apps: Whether to use the Allow, Exempt or Block mode depends on whether it should be able to access personal data. If unenlightened apps shall be handling enterprise only (e.g. LOB app, like in-house finance), that should be set to Allowed. (to ensure its data gets encrypted.) But should test the revocation process thoroughly.
If an unenlightened app could access personal data, you’d want to tell the admin to choose to Exempt mode (knowing that it will potentially leak, but won’t be encrypting personal data).
To find the Publisher and Product name values for Microsoft Store apps without installing them Go to the Windows Store for Business
website, and find your app. For example, Microsoft OneNote. Copy the ID value from the app URL. For example, Microsoft OneNote’s ID URL is https://www.microsoft.com/store/apps/onenote/9wzdncrfhvjl, and you’d copy the ID value, 9wzdncrfhvjl. In a browser, run the Store for Business portal web API, to return a JavaScript Object Notation (JSON) file that includes the publisher and product name values. For example, run
https://bspmts.mp.microsoft.com/v1/public/catalog/Retail/Products/9wzdncrfhvjl/applockerdata
where 9wzdncrfhvjl is replaced with your ID value.
The API runs and opens a text editor with the app details.
{
“packageIdentityName”: “Microsoft.Office.OneNote”,
“publisherCertificateName”: “CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US”
}
Copy the publisherCertificateName value and paste them into the Publisher Name box, copy the packageIdentityName value into the Product Name box of the Add app box, and then click OK.
Note:
The JSON file might also return a windowsPhoneLegacyId value for both the Publisher Name and Product Name boxes. This means that you have an app that’s using a XAP package and that you must set the Product Name as windowsPhoneLegacyId, and set the Publisher Name as “CN=” followed by the windowsPhoneLegacyId.
For example:
{
“windowsPhoneLegacyId”: “ca05b3ab-f157-450c-8c49-a1f127f5e71d”,
}
To add a Classic Windows application
- From the Configure the following apps to be protected by EDP table in the Protected Apps area, click Add.
- A dialog box appears, letting you pick whether the app is a Universal App or a Desktop App.
- Click Desktop App, pick the options you want (see table), and then click OK.
Option |
Manages |
All fields left as “*” | All files signed by any publisher. (Not recommended.) |
Publisher selected | All files signed by the named publisher. This might be useful if your company is the publisher and signer of internal line-of-business apps. |
Publisher and Product Name selected | All files for the specified product, signed by the named publisher. |
Publisher, Product Name, and File Name selected | Any version of the named file or package for the specified product, signed by the named publisher. |
Publisher, Product Name, File Name, and File Version, Exactly, selected | Specified version of the named file or package for the specified product, signed by the named publisher. |
Publisher, Product Name, File Name, and File Version, And above selected | Specified version or newer releases of the named file or package for the specified product, signed by the named publisher. This option is recommended for enlightened apps that weren’t previously enlightened. |
Publisher, Product Name, File Name, and File Version, And below selected | Specified version or older releases of the named file or package for the specified product, signed by the named publisher. |
If you’re unsure about what to include for the publisher, you can run this PowerShell command:
-
Get-AppLockerFileInformation -Path “<path of the exe>”
Where “<path of the exe>” goes to the location of the app on the device.
For example:
- Get-AppLockerFileInformation -Path “C:Program FilesInternet Exploreriexplore.exe”.
In this example, you’d get the following info:
Path Publisher
—- ———
%PROGRAMFILES%INTERNET EXPLORERIEXPLORE.EXE O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=USINTERNET EXPLOR…
Where the text, O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US is the publisher name to enter in the Publisher Name box.
TIP: Another way to easily get the Publisher Name and Product Name for the Universal Applications or Classic Applications is to have them installed in a reference PC then run a PowerShell cmdlet to extract all that information.
Modern App or Universal Windows Apps – This will output a csv file with the Product and Publisher name information installed in the Windows 10 PC. |
Get-AppxPackage | Select Name, Publisher | Export-Csv -path c:TempOutPut.csv -notypeinformation |
Manage the Windows Information Protection -Protection Level for your Enterprise Data
After you’ve added the apps you want to protect with EDP, you’ll need to apply an app management mode. This is mandatory.
We recommend that you start with Silent or Override while verifying with a small group that you have the right apps on your App Rules. After you’re done, you can change to your final enforcement policy, either Override or Block.
Mode |
Description |
Block | Windows Information Protection looks for inappropriate data sharing practices and stops the employee from completing the action. This can include sharing info across non-enterprise-protected apps in addition to sharing enterprise data between other people and devices outside of your enterprise. |
Override | Windows Information Protection looks for inappropriate data sharing, warning employees if they do something deemed potentially unsafe. However, this management mode lets the employee override the policy and share the data, logging the action to your audit log, accessible through the Reporting CSP. |
Silent | Windows Information Protection runs silently, logging inappropriate data sharing, without blocking anything. |
Off (not recommended) | Windows Information Protection is turned off and doesn’t help to protect or audit your data. |
Note:
After you turn off Windows Information Protection, an attempt is made to decrypt any closed WIP-tagged files on the locally attached drives.
Choose Where Apps Can Access Enterprise Data
After you’ve added a management level to your protected apps, you’ll need to decide where those apps can access enterprise data on your network.
Primary Identity Domain / Corporate Identity (Mandatory)
Specify the name of your primary identity domain in the Primary domain/Corporate Identity field. The domain should usually match your User Principal Name suffix. For example, if your user’s UPN is user@contoso.com, then you should enter contoso.com as the requested domain name.
The domain you enter here is also used to tag your files. Depending on a later policy setting, users might see a symbol indicating that the currently opened application is protected by WIP.
If you have multiple suffixes or mail addresses you can specify those in the next step.
Network Locations
There are 8 options, including your protected domain, cloud domain, network domain, proxy server, internal proxy server, IPv4 range, and IPv6 range.
Add additional network locations your apps can access by clicking Add, and then choosing your location type, including:
Network Location Type |
Format |
Description |
Enterprise Protected Domain |
contoso.com|fabrikam.com|adatum.com |
Specify additional identity domains beside the primary domain which was added in the previous step. This might include additional UPN- or Mail-suffixes. These domains will also be used to tag WIP protected files. |
Enterprise Cloud Domain |
contoso.sharepoint.com,proxy1.contoso.com|office.com|proxy2.contoso.com |
Specify the cloud resources traffic to restrict to your protected apps. For each cloud resource, you may also specify an internal proxy server that routes your traffic from your Enterprise Internal Proxy Server policy. If you have multiple resources, you must use the “|” delimiter. Include the “,” delimiter just before the “|” if you don’t use proxies. For example: [URL,Proxy]|[URL,Proxy]. |
Enterprise Network Domain (Mandatory) |
domain1.contoso.com, |
Specify the DNS suffix used in your environment. All traffic to the fully qualified domains using this DNS suffix will be protected. If you have multiple resources, you must use the “,” delimiter. This setting works with the IP Ranges settings to detect whether a network endpoint is enterprise or personal on private networks. |
Enterprise Proxy Server |
domain1.contoso.com:80; domain2.contoso.com:137 |
Specify the proxy server and the port traffic is routed through. If you have multiple resources, you must use the “;” delimiter. This setting is required if you use a proxy in your network. If you don’t have a proxy server, you might find that enterprise resources are unavailable when a client is behind a proxy, such as when using certain Wi-Fi hotspots at hotels and restaurants. |
Enterprise Internal Proxy Server |
proxy1.contoso.com; |
Specify the proxy servers your cloud resources will go through. If you have multiple resources, you must use the “;” delimiter. |
Enterprise IPv4 Range (Mandatory) |
Starting IPv4 Address: 3.4.0.1 Ending IPv4 Address: 3.4.255.254 Custom URI: 3.4.0.1- |
Specify the addresses for a valid IPv4 value range within your intranet. If you are adding a single range, you can enter the starting and ending addresses into your management system’s UI. If you want to add multiple addresses, we suggest creating a Custom URI, using the “-” delimiter between start and end of a range, and the “,” delimiter to separate ranges. |
Enterprise IPv6 Range |
Starting IPv6 Address: 2a01:110:: Ending IPv6 Address: 2a01:110:7fff:ffff:ffff:ffff:ffff:ffff Custom URI: 2a01:110::- 2a01:110:7fff:ffff:ffff:ffff:ffff:ffff,fd00::fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff |
Specify the addresses for a valid IPv6 value range within your intranet. If you are adding a single range, you can enter the starting and ending addresses into your management system’s UI. If you want to add multiple addresses, we suggest creating a Custom URI, using the “-” delimiter between start and end of a range, and the “,” delimiter to separate ranges. |
Neutral Sites |
login.microsoftonline.com, login.windows.net |
Intended for authentication sites. Can be used for both work or personal; context carried from last redirect |
- Add as many locations as you need, and then click OK.
Configure Additional Policy Options
Enterprise Proxy Servers are authoritative
If you enable this setting the client reads the locally configured proxy from the IE
settings and treats it as an enterprise proxy server though it might not be explicitly specified as an Enterprise Proxy Server.
Enterprise IP Addresses are authoritative
If you enable this setting the client tries to access information from Active Directory Sites and Services and read the configured Subnets. Those subnets will be automatically treated as enterprise locations even though they might not be explicitly specified in the IPv4 address range(s) configured.
Additionally, any locally connected IP address will be monitored. If additional identifiers like the Enterprise Network Domain Name apply to this connection it might also be considered a corporate network address.
Show Icons
If you enable this setting your clients will display several indicators that an app is managed by WIP. When you pin a tile of a managed application to the start menu:
When you open an application from the App Rules it will show a notification in the top right corner:
Specify a data recovery certificate in case of data loss (Mandatory)
Here you can specify the previously exported DRA certificate which does not include the private key. Please check Export the DRA certificate without the private key for reference.
Show the Personal option in Shell
Enabling this setting prevents users from decrypting data that is tagged as corporate data. The corresponding options are either not available or greyed out.
Protect corporate data when device locked
Activating this setting prevents any access to corporate files when a device is in a locked state. This includes any applications running in the background or notifications usually shown on the lock screen.
Revoke on unenroll
If you enable this setting and unenroll a client from WIP, all user keys get automatically revoked. Please be aware if you leave this setting unchecked and a client gets unenrolled from Windows Information Protection, protected data is potentially vulnerable to data leakage as the protected data is fully accessible by the user without any protection or auditing.
Allow Windows Search
When an WIP policy is configured, Windows encrypts corporate data on the local disk. Set this option to true to allow the Windows Search to index encrypted corporate data and Store apps so that they appear in the Windows Search results. Set this option to false to prevent these items from appearing in Windows Search results.
Deploying the Configuration Item
- Open the System Center Configuration Manager console, click the Assets and Compliance node, expand the Overview node, right-click Device Collections and then click Create Device Collection.
Note:
You may decide to deploy the configuration baseline to a group of users instead of a group of devices. Though this is possible, please keep in mind that WIP does currently not support multi-user scenarios.
- The Create Device Collection Wizard starts.
- Enter a Name (for example, Enterprise Data Protection Collection) and click Browse.
- In Limiting Collection field, if your devices are managed by the System Center Configuration Manager client, please select All Desktop and Server Clients and confirm with OK. Otherwise please choose All Systems and confirm with OK.
- Click Next, expand Add Rule and select Direct Rule.
- The Create Direct Membership Rule Wizard starts, and click Next.
- In the Value field, enter the name(s) of the client(s) that should be managed by EDP. You can use “%” as a wildcard.
- Click Next, select the client(s) from the list, click Next and Next.
- Please wait for the process to complete and exit the wizard by clicking Close.
- Click Next, review the settings, click Next once more, wait for the process to complete and finish by clicking Close.
- Expand the Compliance Settings node, right-click the Configuration Baselines node and select Create Configuration Baseline.
- The Create Configuration Baseline window starts.
- Enter a Name for the Baseline, expand Add and select Configuration Items.
- Select the previously created configuration item, click Add and confirm by finishing with OK. Click OK again to close Create Configuration Baseline window.
- Right-click the newly created configuration baseline and select Deploy.
- The Deploy Configuration Baselines window opens.
- Verify the baseline shows up under Selected configuration baselines.
- Check Remediate noncompliant rules when supported. Optionally check Allow remediation outside the maintenance window.
- In Select the collection for this Configuration baseline deployment, Click Browse and change the scope to Device Collections
- Select the previously created Device Collection and confirm by clicking OK.
- Click OK to close Create Configuration Baseline window.
- Go to the test cases after finishing this step.
Unenrollment from Windows Information Protection
If you want to unenroll a specific device, you have multiple options to choose from:
- Unenroll from the device itself by removing the connection to the Mobile Device Management service
- Remote wipe via Exchange Server
Please note that this feature only works for mobile devices registered via Exchange Server. Additional information can be found on TechNet:
https://technet.microsoft.com/en-us/library/aa998614.aspx
- Selective/Full wipe via Configuration Manager console
Please note that this feature is only available in hybrid mode with a correctly configured Microsoft Intune subscription. Additional information can be found on TechNet: https://technet.microsoft.com/en-us/library/dn956981.aspx
- Uninstall the Configuration Manager client
If you unenroll a desktop device, the user key gets revoked during the unenrollment process. The WIP protected data remains on the device and can still be accessed with the private key of the DRA.
If you unenroll a mobile device, the user key gets revoked and additionally all WIP protected data gets removed as well. In case you might not want to completely unenroll but rather disable WIP, you have the following options:
- Disable WIP in the configuration item.
- Remove the device from the deployment scope.
Note: Please be aware that disabling WIP does not revoke or remove the user keys which could lead to data leakage as the user has full access to protected data without any WIP policy awareness/auditing/enforcement.
Recovery
- Sign in to the devices where the encrypted files are located with a DRA account.
- Attach the smart card containing the private key of the DRA to the device
- Launch a command prompt (Admin)
- Type cipher /d <encryptedfile.extension>
Note:
Please refer to the TechNet article for further information about the cipher tool.
https://technet.microsoft.com/en-us/library/bb490878.aspx
Scripts & Useful Commands
Command to create a DRA certificate
For customers that doesn’t have PKI Infrastructure but still want to deploy WIP Policy, they can use a Self-Sign generated certificate by the chosen Data Recovery Agent.
- Sign in to a Windows 10 machine with a DRA user account. You will need to know a local Administrator credential later.
- Launch elevated CMD and navigate to a folder directory where you want to create a DRA certificates.
-
Type cipher /r:EFS-DRA-FILENAME
- (Enter a password when prompted. This will create two certificates, a .cer file and a .pfx file.)
- (Enter a password when prompted. This will create two certificates, a .cer file and a .pfx file.)
- The .cer file (cert without private key) is the one you will use to your EDP Policy and the .pfx file (cert with private key) should be kept on a secured location.
To verify the DRC is correctly configured on an WIP client machine
(*without* an EFS DRA configured through Group Policy):
- Encrypt a file with WIP
- Launch elevated CMD and navigate to the encrypted file location
- Type cipher /c filename (cipher /file.txt)
- Verify that Recovery Certificates: lists a certificate with thumbprint that matches the expected DRA Cert.
To quickly recover data (or verify your DRC settings are correct)
- Copy the encrypted file to a known location on a machine you have admin access to
- Install the EFSDRA.pfx (using the password)
- Launch elevated CMD and navigate to encrypted file
- cipher /d <encryptedfile.extension>
Troubleshooting
- Control Panel, Configuration Manager, Actions, select Machine Policy Retrieval & Evaluation Cycle and click Run Now.
- Switch to the Configurations tab and click Refresh until your policy appears.
- When your policy appears the status is likely to be Unknown or Non-Compliant.
- Select your policy and click Evaluate Now.
- Hit Refresh a couple of times until the Compliance State is Compliant.
Reference:
https://technet.microsoft.com/en-us/itpro/windows/whats-new/edp-whats-new-overview
https://technet.microsoft.com/en-us/itpro/windows/keep-secure/protect-enterprise-data-using-edp
https://technet.microsoft.com/en-us/itpro/windows/keep-secure/create-edp-policy-using-sccm
Set-Up Mobile Application Management (MAM)
System Center Configuration Manager application management policies let you modify the functionality of apps that you deploy to help bring them into line with your company compliance and security policies. For example, you can restrict cut, copy, and paste operations within a restricted app, or configure an app to open all web links inside a managed browser. App management policies support:
- Devices that run Android 4 and later.
- Devices that run iOS 7 and later.
To apply restrictions to an app, the app must incorporate the Microsoft Intune App Software Development Kit (SDK). There are two methods of obtaining this type of app:
- Use a policy managed app (Android and iOS): Has the App SDK built-in. To add this type of app, you specify a link to the app from an app store such as the iTunes store or Google Play. No further processing is required for this type of app. For a list of the policy managed apps that are available for iOS and Android devices, see https://www.microsoft.com/en-us/cloud-platform/microsoft-intune-partners
- Use a ‘wrapped’ app – (Android and iOS): Apps that are repackaged to include the App SDK by using the Microsoft Intune App Wrapping Tool. This tool is typically used to process company apps that were created in-house. It cannot be used to process apps that were downloaded from the app store. See Prepare iOS apps for mobile application management with the Microsoft Intune App Wrapping Tool and Prepare Android apps for mobile application management with the Microsoft Intune App Wrapping Tool.
Create and deploy an app with a mobile application management policy
Step 1: Obtain the link to a policy managed app, or create a wrapped app
-
To obtain a link to a policy managed app – From the app store, find, and note the URL of the policy managed app you want to deploy.
- For example, the URL of the Microsoft Word App for iOS is: https://itunes.apple.com/us/app/microsoft-word/id586447913?mt=8
- for Android is: https://play.google.com/store/apps/details?id=com.microsoft.office.word&hl=en
- For example, the URL of the Microsoft Word App for iOS is: https://itunes.apple.com/us/app/microsoft-word/id586447913?mt=8
- To create a wrapped app – Use the information in the topics Prepare iOS apps for mobile application management with the Microsoft Intune App Wrapping Tool and Prepare Android apps for mobile application management with the Microsoft Intune App Wrapping Tool to create a wrapped app.
The tool creates a processed app and an associated manifest file. You will use these files when you create a Configuration Manager application containing the app.
Note:
You can check what are the applications that are currently have a built in Intune SDK and “MAM Aware” apps here: https://www.microsoft.com/en-us/cloud-platform/microsoft-intune-partners
When you update to the 1602 release from 1511, Configuration Manager automatically creates the following Microsoft Office mobile apps for Android and iOS:
Step 2: Create a Configuration Manager application that contains an app
The procedure to create the Configuration Manager application differs depending on whether you are using a policy managed app (external link), or an app that was created by using the Microsoft Intune App Wrapping Tool for iOS (App package for iOS). Use one of the following procedures to create the Configuration Manager application.
To create an application for an app wrapping tool for iOS and Android app
- In the Configuration Manager console, click Software Library.
- In the Software Library workspace, expand Application Management, and then click Applications.
- In the Home tab, in the Create group, click Create Application to open the Create Application Wizard.
- On the General page, select Automatically detect information about this application from installation files.
- In the Type drop-down list, select App package for iOS (*.ipa file) or App package for Android (*.apk file)
- Click Browse to select the app package you want to import, and then click Next.
- On the General Information page, enter the descriptive text and category information that you want users to see in the company portal.
- Complete the wizard.
The new application is displayed in the Applications node of the Software Library workspace.
To create an application containing a link to a policy managed app
- In the Configuration Manager console, click Software Library.
- In the Software Library workspace, expand Application Management, and then click Applications.
- In the Home tab, in the Create group, click Create Application to open the Create Application Wizard.
- On the General page, select Automatically detect information about this application from installation files.
- In the Type drop-down, select one of the following:
- For iOS: App Package for iOS from App Store and Enter the URL for the app (from step 1), and then click Next.
- For Android: App Package for Android on Google Play
- On the General Information page, enter the descriptive text and category information that you want users to see in the company portal.
- Complete the wizard.
The new application is displayed in the Applications node of the Software Library workspace.
Step 3: Create an application management policy
- In the Configuration Manager console, click Software Library.
- In the Software Library workspace, expand Application Management, and then click Application Management Policies.
- In the Home tab, in the Create group, click Create Application Management Policy.
- On the General page, enter the name and description for the policy, and then click Next.
- On the Policy Type page, select the platform either iOS or Android device and the policy type for this policy, and then click Next. The following policy types are available:
- General: The General policy type lets you modify the functionality of apps that you deploy to help bring them into line with your company compliance and security policies. For example, you can restrict cut, copy, and paste operations within a restricted app.
- Managed Browser: Configure whether to allow or block the managed browser from opening a list of URLs. The Managed Browser policy type lets you modify the functionality of the Intune Managed Browser app. This is a web browser that lets you manage the actions that users can perform, including the sites they can visit, and how links to content within the browser are opened. Learn more about the Intune Managed Browser app for iOS and the Intune Managed Browser app for Android.
- On the iOS Policy or Android Policy page, configure the following values as required, and then click Next. The options might differ depending on the device type for which you are configuring the policy.
Value |
More information |
Restrict web content to display in a corporate managed browser | When this setting is enabled, any links in the app will be opened in the Managed Browser. You must have deployed this app to devices in order for this option to work. |
Prevent Android backups or Prevent iTunes and iCloud backups | Disables the backup of any information from the app. |
Allow app to transfer data to other apps | Specifies the apps that this app can send data to. You can choose to not allow data transfer to any app, only allow transfer to other restricted apps, or to allow transfer to any app. For iOS devices, to prevent document transfer between managed and unmanaged apps, you must also configure and deploy a mobile device security policy that disables the setting Allow managed documents in other unmanaged apps. If you select to only allow transfer to other restricted apps, the Intune PDF and image viewers (if deployed) will be used to open content of the respective types. |
Allow app to receive data from other apps | Specifies the apps that this app can receive data from. You can choose to not allow data transfer from any app, only allow transfer from other restricted apps, or allow transfer from any app. |
Prevent “Save As” | Disables use of the Save As option in any app that uses this policy. |
Restrict cut, copy and paste with other apps | Specifies how cut, copy, and paste operations can be used with the app. Choose from: Blocked – Do not allow cut, copy, and paste operations between this app and other apps. Policy Managed Apps – Only allow cut, copy, and paste operations between this app and other restricted apps. Policy Managed Apps with Paste In – Allow data cut or copied from this app only to be pasted into other restricted apps. Allow data to cut or copied from any app to be pasted into this app. Any App – No restrictions to cut, copy, and paste operations to, or from this app. |
Require simple PIN for access | Requires the user to enter a PIN number which they specify to use this app. The user will be asked to set this up the first time they run the app. |
Number of attempts before PIN reset | Specify the number of PIN entry attempts which can be made before the user must reset the PIN. |
Require corporate credentials for access | Requires that the user must enter their corporate logon information before they can access the app. |
Require device compliance with corporate policy for access | Only allows the app to be used when the device is not jailbroken or rooted. |
Recheck the access requirements after (minutes) | In the Timeout field, specify the time period before the access requirements for the app are rechecked after the app is launched. In the Offline grace period field, if the device is offline, specify the time period before the access requirements for the app are rechecked. |
Encrypt app data | Specifies that all data associated with this app will be encrypted, including data stored externally, such as SD cards. Encryption for iOS For apps that are associated with a Configuration Manager mobile application management policy, data is encrypted at rest using device level encryption provided by the OS. This is enabled through device PIN policy that must be set by the IT admin. When a PIN is required, the data will be encrypted per the settings in the mobile application management policy. As stated in Apple documentation, the modules used by iOS 7 are FIPS 140-2 certified. Encryption for Android For apps that are associated with a Configuration Manager mobile application management policy, encryption is provided by Microsoft. Data is encrypted synchronously during file I/O operations according to the setting in the mobile application management policy. Managed apps on Android use AES-128 encryption in CBC mode utilizing the platform cryptography libraries. The encryption method is not FIPS 140-2 certified. Content on the device storage will always be encrypted. |
Block screen capture (Android devices only) | Specifies that the screen capture capabilities of the device are blocked when using this app. |
- On the Managed Browser page, select whether the managed browser is allowed to open only URLs in the list or to block the managed browser from opening the URLs in the list, manage the URLs in the list, and then click Next.
- Complete the wizard.
Deploy Apps and Associate the Application Management Policy.
- In the Configuration Manager console, click Software Library.
- In the Software Library workspace, expand Application Management, and then click Applications.
- In the Applications list, select the application that you want to deploy. Then, on the Home tab, in the Deployment group, click Deploy.
- On the General page of the Deploy Software Wizard, specify the following information:
- Software – This displays the application to deploy. You can click Browse to select a different application.
- Collection – Click Browse to select the collection to deploy the application to.
- Automatically distribute content for dependencies – If this is enabled and any of the deployment types in the application contain dependencies, then the dependent application content will be also sent to distribution points.
Important:
If you update the dependent application after the primary application has been deployed, any new content for the dependency will not be automatically distributed.
- On the Content page of the wizard,
- If you are deploying applications that will be coming from the App Store for iOS or Google Play for Android or Windows Store, just click Next
- If you are deploying applications that are wrapped and have. App package for iOS (*.ipa file) or App package for Android (*.apk file), then you have to select Add and select the manage.microsoft.com distribution point and click Next
- On the Deployment Settings page of the Deploy Software Wizard, specify the following information:
- Action – From the drop-down list, choose whether this deployment is intended to Install or Uninstall the application.
Note:
If an application is deployed twice to a device, once with an action of Install and once with an action of Uninstall, the application deployment with an action of Install will take priority.You cannot change the action of a deployment after it has been created.
-
Purpose – From the drop-down list, choose one of the following options:
- Available – If the application is deployed to a user, the user sees the published application in Software Center and can install it on demand.
- Required – The application is deployed automatically according to the configured schedule. However, a user can track the application deployment status if it is not hidden, and can install the application before the deadline from Software Center.
- Available – If the application is deployed to a user, the user sees the published application in Software Center and can install it on demand.
Note:
When the deployment action is set to Uninstall, the deployment purpose is automatically set to Required and cannot be changed.
Note:
Application approval requests are displayed in the Approval Requests node, under Application Management in the Software Library workspace. If an approval request is not approved within 45 days, it will be removed. Additionally, reinstalling the Configuration Manager client might cancel any pending approval requests. The options Software Installation and System restart (if required to complete the installation) are not used if the deployment purpose is set to Available. You can also configure the level of notification a user sees when the application is installed.
- For Application that are “Managed Apps” or MAM aware, an Application Management page will be visible. When a deployment type is created for an app that requires an application management policy, Configuration Manager will recognize that an app management policy must be linked to this deployment type when the associated app gets deployed and prompt you to associate an app management policy.
Important: If the application is already deployed, then the deployment for the new deployment type will fail until this association is made. You can make the association in Properties for the application, on the Application Management tab.
Important: For devices that run operating systems earlier than iOS 7.1, associated policies will not be removed when the app is uninstalled.
If the device is unenrolled from Configuration Manager, polices are not removed from the apps. Apps that had policies applied will retain the policy settings even after the app is uninstalled and reinstalled.
- (for iOS apps only) – On the App Configuration Policies page of the wizard, click New to associate this deployment with an iOS app configuration policy (if you have created one). For more information about this type of policy, see Configure iOS apps with app configuration policies in System Center Configuration Manager.
- On the Summary page of the Deploy Software Wizard, review the actions that will be taken by this deployment, and then click Next to complete the wizard.
Monitor the App Deployment
Once you have created and deployed an app associated with a mobile application management policy, you can monitor the app and resolve any policy conflicts.
- In the Configuration Manager console, click Software Library.
- In the Monitoring workspace, expand Overview, and then click Deployments.
- Select the deployment and on the Home tab, click Properties.
- In the details pane for the deployment, click Application Management Policies under Related Objects.
How policy conflicts are resolved
When there is a mobile application management policy conflict on the first deployment to the user or device, the specific setting value in conflict will be removed from the policy deployed to the app, and the app will use a built-in conflict value.
When there is a mobile app management policy conflict on later deployments to the app or user, the specific setting value in conflict will not be updated on the mobile app management policy deployed to the app, and the app will use the existing value for that setting.
In cases where the device or user receives two conflicting policies, the following behavior applies:
- If a policy has already been deployed to the device, the existing policy settings are not overwritten.
-
If no policy has already been deployed to the device, and two conflicting settings are deployed, the default setting built into the device is used.
Reference: https://technet.microsoft.com/en-us/library/mt613194.aspx
Setup Email, VPN, Wi-Fi Profiles
Since you have now deployed client certificates from the NDES setup earlier, you can use it to make the profiles that you want to deploy to have a certificate based authentication.
Email Profiles
You can use email profiles to configure the Native email client on the following device types:
-
Windows Phone 8 and later
-
Windows 10 desktop, Windows 10 Mobile, and later
-
OS 7.1 and later
-
For Android, only Samsung KNOX Standard (4.0 and later)
Start the Create Exchange ActiveSync Email Profile Wizard.
- In the System Center Configuration Manager console, click Assets and Compliance.
- In the Assets and Compliance workspace, expand Compliance Settings, expand Company Resource Access, and then click Email Profiles.
- On the Home tab, in the Create group, click Create Exchange ActiveSync Profile.
- On the General page of the Create Exchange ActiveSync Email Profile Wizard, specify the following information:
- Configure Exchange ActiveSync settings for the Exchange ActiveSync email profile
- Exchange ActiveSync host: Specify the hostname of your company Exchange Server that hosts Exchange ActiveSync services.
- Account name: Specify the display name for the email account as it will be displayed to users on their devices.
-
Account user name: Select how the email account user name is configured on client devices. You can select one of the following options from the drop-down list:
- User Principal Name Use the full user principal name to log onto Exchange.
- Primary SMTP Address Use the users primary SMTP address to log onto Exchange.
- User Principal Name Use the full user principal name to log onto Exchange.
-
Email address: Select how the email address for the user on each client device is generated. You can select one of the following options from the drop-down list:
- Primary SMTP Address Use the users primary SMTP address to log onto Exchange.
- User Principal Name Use the full user principal name as the email address.
- Primary SMTP Address Use the users primary SMTP address to log onto Exchange.
-
Account domain: Choose one of the following options:
- Obtain from Active Directory
- Custom
- Obtain from Active Directory
-
Authentication method: Choose one of the following authentication methods that will be used to authenticate the connection to Exchange ActiveSync:
- Certificates An identity certificate will be used to authenticate the Exchange ActiveSync connection.
- Username and Password The device user must supply a password to connect to Exchange ActiveSync (the user name is configured as part of the email profile).
- Certificates An identity certificate will be used to authenticate the Exchange ActiveSync connection.
- Identity certificate: Click Select and then select a certificate to use for identity.
Note:
If you have deployed an email profile and then wish to change the values for host or Email address, you must delete the existing email profile and create a new one with the required values.
- Configure synchronization settings for the Exchange ActiveSync email profile
- On the Supported Platforms page of the Create Exchange ActiveSync Email Profile Wizard, select the operating systems on which the email profile will be installed, or click Select all to install the email profile on all available operating systems.
- On the Summary page of the wizard, review the actions to be taken, and then complete the wizard. The new Exchange ActiveSync email profile is displayed in the Email Profiles node in the Assets and Compliance workspace.
NOTE:
If you want to remove an email profile from a device, edit the deployment and remove any groups of which the device is a member.
Reference: https://technet.microsoft.com/en-us/library/mt629448.aspx
VPN Profiles
You can configure the following device types with VPN profiles:
- Devices that run Windows 8.1 32-bit
- Devices that run Windows 8.1 64-bit
- Devices that run Windows RT 8.1
- Devices that run Windows Phone 8.1
- Devices that run iOS 5, iOS 6, iOS 7 and iOS 8
- Devices that run Android 4.0 and later
Step 1: Start the Create VPN Profile Wizard
- In the System Center Configuration Manager console, click Assets and Compliance.
- In the Assets and Compliance workspace of the System Center Configuration Manager console, expand Compliance Settings, expand Company Resource Access, and then click VPN Profiles.
- On the Home tab, in the Create group, click Create VPN Profile.
- On the General page of the Create VPN Profile Wizard, specify the following information
-
On the Connection page of the wizard, Provide Connection Information for the VPN Profile
Note: Below are the supported connection type for the VPN connection of different platforms.
Connection Type |
iOS and Mac OS X |
Android |
Windows 8.1 |
Windows RT |
Windows RT 8.1 |
Windows Phone 8.1 |
Windows 10 Desktop and Mobile |
Cisco AnyConnect |
Yes |
Yes |
No |
No |
No |
No |
Yes, (OMA-URI, Mobile only) |
Pulse Secure |
Yes |
Yes |
Yes |
No |
Yes |
Yes |
Yes |
F5 Edge Client |
Yes |
Yes |
Yes |
No |
Yes |
Yes |
Yes |
Dell SonicWALL Mobile Connect |
Yes |
Yes |
Yes |
No |
Yes |
Yes |
Yes |
CheckPoint Mobile VPN |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Microsoft SSL (SSTP) |
No |
No |
No |
No |
No |
No |
VPNv1 OMA-URI* |
Microsoft Automatic |
No |
No |
No |
No |
No |
Yes (OMA-URI) |
Yes |
IKEv2 |
iOS Custom Profile |
No |
No |
No |
No |
Yes (OMA-URI) |
Yes |
PPTP |
iOS Custom Profile |
No |
No |
No |
No |
No |
Yes |
L2TP |
iOS Custom Profile |
No |
No |
No |
No |
Yes (OMA-URI) |
Yes |
Note:
Please take a look for more information about your VPN profile connection type here: https://technet.microsoft.com/en-US/library/mt629189.aspx
From the drop-down list, select the connection type for the VPN connection
Note:
Before you can use VPN profiles deployed to a device, you must ensure that any third-party VPN apps that you require are installed.
- Server list: Click Add to add a new server to use for the VPN connection. Depending on the connection type, you can add one or more VPN servers and also specify which server is to be the default server.
Note:
Devices that run iOS do not support using multiple VPN servers. If you configure multiple VPN servers and then deploy the VPN profile to an iOS device, only the default server is used.
- Configure the Authentication Method for the VPN Profile
Authentication method |
Supported connection types |
Certificates Note: If the client certificate is used to authenticate to a RADIUS server, such as a Network Policy Server, the Subject Alternative Name in the certificate must be set to the User Principal Name. |
– Cisco AnyConnect – Pulse Secure – F5 Edge Client – Dell SonicWALL Mobile Connect – Check Point Mobile VPN |
Username and Password | – Pulse Secure – F5 Edge Client – Dell SonicWALL Mobile Connect – Check Point Mobile VPN |
Microsoft EAP-TTLS | – Microsoft SSL (SSTP) – Microsoft Automatic – PPTP – IKEv2 – L2TP |
Microsoft protected EAP (PEAP) | – Microsoft SSL (SSTP) – Microsoft Automatic – IKEv2 – PPTP – L2TP |
Microsoft secured password (EAP-MSCHAP v2) | – Microsoft SSL (SSTP) – Microsoft Automatic – IKEv2 – PPTP – L2TP |
Smart Card or other certificate | – Microsoft SSL (SSTP) – Microsoft Automatic – IKEv2 – PPTP – L2TP |
MSCHAP v2 | – Microsoft SSL (SSTP) – Microsoft Automatic – IKEv2 – PPTP – L2TP |
RSA SecurID (iOS only) | – Microsoft SSL (SSTP) – Microsoft Automatic – PPTP – L2TP |
Use machine certificates | -IKEv2 |
Note:
Devices that run iOS support only RSA SecurID and MSCHAP v2 for the authentication method when the connection type is PPTP. To avoid reporting errors, deploy a separate PPTP VPN profile to devices that run iOS.
For iOS devices, the SCEP profile you select will be embedded in the VPN profile. For other platforms, an applicability rule is added to ensure that the VPN profile is not installed if the certificate is not present, or not compliant.
If the SCEP certificate you specify is not compliant, or has not been deployed, then the VPN profile will not be installed on the device.
- Configure Proxy Settings for the VPN Profile
- Configure Supported Platforms for the VPN Profile
Reference:
https://technet.microsoft.com/en-US/library/mt629189.aspx
Wi-Fi Profiles
You can configure the following device types with Wi-Fi profiles:
- Devices that run Windows 8.1 32-bit
- Devices that run Windows 8.1 64-bit
- Devices that run Windows RT 8.1
- Devices that run Windows Phone 8.1
- Devices that run Windows 10 Desktop or Mobile
- iPhone devices that run iOS 5, iOS 6, iOS 7 and iOS 8
- iPad devices that run iOS 5, iOS 6, iOS 7 and iOS 8
- Android devices that run version 4
Start the Create Wi-Fi Profile Wizard
- In the Configuration Manager console, click Assets and Compliance.
- In the Assets and Compliance workspace, expand Compliance Settings, expand Company Resource Access, and then click Wi-Fi Profiles.
- On the Home tab, in the Create group, click Create Wi-Fi Profile.
- On the General page of the Create Wi-Fi Profile Wizard, enter a unique name and description for the Wi-Fi profile. You can use a maximum of 256 characters.
- In SSID, specify the name (SSID), of the wireless network that you want devices to be able to connect to. You can use a maximum of 32 characters. The SSID name is case-sensitive, so be sure to enter it exactly as it is configured.
- Configure Security for the Wi-Fi Profile.
In this example WPA2-Enterprise is selected as the security type and will use a certificate based authentication
-
Select the Use a certificate on the computer and tick the Use Simple Certificate selection.
Note:
For Android devices only: the security types WPA – Personal, WPA2 – Personal and WEP are not supported.
For Windows Phone devices only: the EAP types LEAP and EAP-FAST are not supported.
For iOS devices only: You must configure the client certificate and either the trusted server certificate name or the root certificate, as follows: Trusted server certificate names: If the server that the device connects to uses a server authentication certificate to identify the server and help secure the communication channel, enter the name or names in that certificate’s subject name or subject alternative name
Note: If the client certificate that you select for EAP or client authentication for an iOS device will be used to authenticate to a Remote Authentication Dial-In User Service (RADIUS) server, such as a server that is running Network Policy Server, you must set the Subject Alternative Name to the User Principal Name.
Select root certificates for server validation: If the server that the device connects to uses a server authentication certificate that the device does not trust, select the certificate profile that contains the root certificate for the server certificate, to create a certificate chain of trust on the device.
Select a client certificate for client authentication: If the server or network device requires a client certificate to authenticate the connecting device, select the certificate profile that contains the client authentication certificate.
Reference:
https://technet.microsoft.com/en-US/library/mt629440.aspx
Deploy VPN, WIFI or Email Profile
- In the Configuration Manager console, click Assets and Compliance.
- In the Assets and Compliance workspace, expand Compliance Settings, expand Company Resource Access, and select the Profiles you want to deploy either VPN, WIFI, or Email Profiles.
- In the Type of Profiles list, select the VPN, WIFI, or Email Profiles that you want to deploy, right click and Deploy.
- In the Deploy VPN Profile dialog box, specify the following information:
- Collection – Click Browse to select the collection where you want to deploy the VPN profile.
- Generate an alert – Enable this option to configure an alert that is generated if the VPN profile compliance is less than a specified percentage by a specified date and time. You can also specify whether you want an alert to be sent to System Center Operations Manager.
-
Specify the compliance evaluation schedule for this VPN profile – Specify the schedule by which the deployed VPN profile is evaluated on client computers. The schedule can be either a simple or a custom schedule.
Note:
The profile is evaluated by client computers when the user logs on.
- Click OK to close the Deploy VPN Profile dialog box and to create the deployment. For more information about how to monitor the deployment, see How to monitor VPN profiles in System Center Configuration Manager.
Monitor the Deployment of the VPN, WIFI or Email Profile
- In the System Center Configuration Manager console, click Monitoring.
- In the Monitoring workspace, click Deployments.
- In the Deployments list, select the Profile deployment for which you want to review compliance information. In this example, a certificate profile was deployed.
- You can review summary information about the compliance of the profile deployment on the main page. To view more detailed information, select profile deployment, and then right click View Status to open the Deployment Status page.
The Deployment Status page contains the following tabs:
- Compliant: Displays the compliance of the profile that is based on the number of affected assets.
- Error: Displays a list of all errors for the selected profile deployment that is based on the number of affected assets.
- Non-Compliant: Displays a list of all noncompliant rules within the profile that are based on the number of affected assets.
- Unknown: Displays a list of all users that did not report compliance for the selected profile deployment together with the current client status of the devices.
Set-Up Azure Rights Management (RMS)
Important: Before you activate Rights Management, make sure that your organization has a service plan that includes Rights Management services. If not, you will not be able to activate Azure RMS.
Activate Azure RMS
When you activate Azure Rights Management (Azure RMS), your organization can start to protect important data by using applications and services that support this information protection solution. Administrators can also manage and monitor protected files and emails that your organization owns. You must enable Rights Management before you can begin to use the information rights management (IRM) features within Office, SharePoint, and Exchange, and protect any sensitive or confidential file.
There are different ways to activate Rights Management from your management portal, select whether you will use the Office 365 admin center (preview or classic), or the Azure classic management portal. In this document Azure Classic management portal will be use.
-
After you have signed up for your Azure account, sign in to the Azure classic portal.
-
In the left pane, click ACTIVE DIRECTORY.
-
From the Active Directory page, click RIGHTS MANAGEMENT.
-
Select the directory to manage for Rights Management, click ACTIVATE, and then confirm your action.
The RIGHTS MANAGEMENT STATUS should now display Active and the ACTIVATE option is replaced with DEACTIVATE.
NOTE: If you see an activation error, it might be because your service plan or product version does not include Rights Management.
Reference:
https://docs.microsoft.com/en-us/rights-management/deploy-use/activate-service
Set up Azure Rights Management for Exchange Online
The next steps are completed via connecting to Exchange Online with PowerShell
-
Open PowerShell as Administrator
-
Enter the following commands to connect and import the session
-
Set-ExecutionPolicy RemoteSigned
(In the prompt, choose Yes to All)
-
$cred = Get-Credential
(In the prompt, Enter your O365 Admin username and password)
-
$Session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri https://outlook.office365.com/powershell-liveid/ -Credential $cred -Authentication Basic –AllowRedirection
-
Import-PSSession $Session
-
Check your IRM isn’t configured already
-
Get-IRMConfiguration
-
Configure RMS with the online key-sharing location for Exchange Online with PowerShell (locations below). In this example North America was used, but the table below shows all the locations
-
Set-IRMConfiguration -RMSOnlineKeySharingLocation https://sp-rms.na.aadrm.com/TenantManagement/ServicePartner.svc
Location |
RMS key sharing location |
North America | https://sp-rms.na.aadrm.com/TenantManagement/ServicePartner.svc |
European Union | https://sp-rms.eu.aadrm.com/TenantManagement/ServicePartner.svc |
Asia | https://sp-rms.ap.aadrm.com/TenantManagement/ServicePartner.svc |
South America | https://sp-rms.sa.aadrm.com/TenantManagement/ServicePartner.svc |
Office 365 for Government | https://sp-rms.govus.aadrm.com/TenantManagement/ServicePartner.svc1 |
-
Set-IRMConfiguration -InternalLicensingEnabled $true
-
Enable IRM for Exchange Online and Office 365 Message Encryption
-
Import-RMSTrustedPublishingDomain -RMSOnline -name “RMS Online”
-
Import the Trusted Publishing Domain (TPD) from RMS Online
-
Verify successful setup of IRM in Exchange Online
-
Test-IRMConfiguration –sender admin@domain.com
-
View the IRM Configuration
-
Get-IRMConfiguration
Reference:
https://technet.microsoft.com/en-us/library/dn151475(v=exchg.150).aspx
Configuring custom templates for Azure Rights Management
After you have activated Azure Rights Management (Azure RMS), users are automatically able to use two default templates that make it easy for them to apply policies to sensitive files that restrict access to authorized users in your organization. These two templates have the following rights policy restrictions:
Display Name | Rights Included (Common Name) |
<organization name> – Confidential View Only | View, Open, Read |
<organization name> – Confidential | View, Open, Read; Save; Edit Content, Edit; View Rights; Allow Macros; Forward; Reply; Reply All |
Exchange clients and services (for example, the Outlook client, the Outlook Web Access app, and Exchange transport rules) have one additional information rights protection option for emails: Do Not Forward.
Although this option appears to users (and Exchange administrators) as if it’s a default Rights Management template that they can select, Do Not Forward is not a template. That explains why you cannot see it in the Azure classic portal when you view and manage templates for Azure RMS. Instead, the Do Not Forward options is a set of rights that is dynamically applied by users to their email recipients.
Note: Use Do Not Forward when it’s important that only the recipients that the sender chooses should see the information in the email. Use a template for emails to restrict rights to a group of people that the administrator specifies in advance, independently from the sender’s chosen recipients.
To create a custom template:
- Depending on whether you sign in to the Office 365 admin center, or the Azure classic portal, do one of the following:
From the Azure classic portal:
-
In the left pane, click ACTIVE DIRECTORY.
-
From the active directory page, click RIGHTS MANAGEMENT.
-
Select the directory to manage for Rights Management.
-
Create a new template:
You can copy custom templates and the default templates. As a best practice, copy one of the default templates instead of creating a new custom template if you want the template to grant rights to all users in your organization. This method means that you don’t have to create or select multiple groups to specify all users. In this scenario however, be sure to specify a new name and description for the copied template for additional languages.
If you want to create a new template that has very similar settings to an existing template, select the original template on the TEMPLATES page, click COPY, specify a unique name, and make the changes that you need.
If you want to a new one and apply only on selected group, Click ADD
- Choose a language in which you will type the template name and description that users will see (you can add more languages later). Then type a unique name and a description, and click the Complete button.
Note: You can add users from outside your organization (“external users”) to the template by selecting a mail-enabled group that contains contacts from Office 365 or Exchange Online. This lets you assign rights to these users in the same way as you can assign rights to users in your organization. For example, you can prevent customers from editing a price list that you send them. Do not use this template configuration for protecting emails if users from outside your organization will read the protected emails by using the Outlook Web App as they will not be able to view it.
- Assign one of the listed rights to your selected users and groups. These are the users or group that will be able to consume and use the content that is protected by using this template.
- If you selected Custom, click the Next button, and then select those custom rights.
- If you want the template to be visible to only a subset of users when they see a list of templates in applications: Click SCOPE to configure this as a departmental template.
By default, all users and groups in your organization can apply the template created.
- On the TEMPLATE VISIBILITY page, select the users and groups who will be able to see and select the template from the RMS-enlightened applications. As before, as a best practice, use groups rather than users, and the groups or users you select must have an email address.
- Also decide whether you need to configure application compatibility for your departmental template. If you do, click APPLICATION COMPATIBILITY, select the check box, and click Complete.
For example, if you do not configure application compatibility for the departmental template in our Human Resources example, only users in the Human Resources department see the departmental template when they use the RMS sharing application, but no users see the departmental template when they use Outlook Web Access (OWA) from Exchange Server 2013 because Exchange OWA and Exchange ActiveSync do not currently support departmental templates. If you override this default behavior by configuring application compatibility, only users in the Human Resources department see the departmental template when they use the RMS sharing application, but all users see the departmental template when they use Outlook Web Access (OWA). If users use OWA or Exchange ActiveSync from Exchange Online, either all users will see the departmental templates or no users will see the department templates, based on the template status (archival or published) in Exchange Online.
Note:
Office 2016 natively supports departmental templates, and so does Office 2013 starting with version 15.0.4727.1000, released in June 2015 as part of KB 3054853.
- Click CONFIGURE and add additional languages that users use, together with the name and description of this template in that language and also to configure content expiration and Offline access.
- When you are confident that the template is configured appropriately for your users, click PUBLISH to make the template visible for users, and then click SAVE.
- Click the Back button in the classic portal to return to the TEMPLATES page, where your template now has an updated status of Published.
To make any changes to your template, select it, and then use the quick start steps again. Or, select one of the following options:
-
To add more users and groups, and define the rights for those users and groups: Click RIGHTS, then click ADD.
-
To remove users or groups that you previously selected: Click RIGHTS, select the user or group from the list, and then click DELETE.
-
To change which users can see the templates to select them from applications: Click SCOPE, then click ADD or DELETE, or APPLICATION COMPATIBILITY.
-
To make the template no longer visible to all users: Click CONFIGURE, click ARCHIVE, and then click SAVE.
-
To make other configuration changes: Click CONFIGURE, make your changes, and then click SAVE.
Important:
When you make changes to a template that was previously saved or create a new one, clients will not see those changes to the template until templates are refreshed on their computers. Update the templates, each time, you must run the following Exchange Online PowerShell to synchronize these changes to Exchange Online:
-
Import-RMSTrustedPublishingDomain -Name “RMS Online – 1” -RefreshTemplates –RMSOnline
Take note:
“RMS Online – 1″ is the TPD name (a typical name for many organizations, To verify your TPD name, you can use the Get-RMSTrustedPublishingDomain cmdlet.
If you want the templates to be to be available in the Outlook Web App, you must use the Set-RMSTemplate cmdlet and set the Type to Distributed:
-
Set-RMSTemplate -Identity “<name or GUID of the template>” -Type Distributed
Because Outlook Web Access caches the UI for 24 hours, users might not see the new template for up to a day.
Reference:
https://docs.microsoft.com/en-us/rights-management/deploy-use/create-template
https://docs.microsoft.com/en-us/rights-management/deploy-use/configure-usage-rights
https://docs.microsoft.com/en-us/rights-management/deploy-use/refresh-templates
This Blog post was published by the authors
Lutz Seidemann (Architect) and Raymond Michael Sy Guan (Consultant). We both with Microsoft Consulting Services – Worldwide Enterprise Mobility Center of Excellence (CoE).
Disclaimer: The information on this site is provided “AS IS” with no warranties, confers no rights, and is not supported by the authors or Microsoft Corporation. Use of included script samples are subject to the terms specified in the Terms of Use.