![]() In Azure, select Azure Active Directory from Services and click on Mobility (MDM and MAM).įrom the choices listed, choose Restore default MAM URLs and then select the scope. I used Enterprise Mobility + Security E3 licenses for the users in this lab. If you don’t have one you can sign up for a 30 day free Intune trial here. ![]() In this guide I assume you’ve already got an Azure subscription (trial or otherwise) and Intune. I’ve already configured Azure for Automatic Enrollment but it’s up to you whether you want to use that option (or not). In this article I’m going to show you how to set this up with Intune (in Azure) and I’ll give some examples of how enterprise protected data acts when in different scenarios, in addition, I’ll explain how you can audit or review logs about this and have a quick glance at the reporting capabilities in Intune. To gain access to the latest capabilities in Intune you should use Windows 10 Creators Update (version 1703). in addition, you’ll need a license for Azure AD Premium. The prerequisites for WIP are as follows, you’ll need a Windows 10 operating system (that is version 1607 or later) and you’ll need a management solution such as Intune or SCCM or a 3rd party MDM solution. ![]() In other words, you can use WIP to protect enterprise data from leaving the enterprise. WIP also helps to protect enterprise apps and data against accidental data leak on enterprise-owned devices and personal devices that employees bring to work without requiring changes to your environment or other apps. Windows Information Protection helps to protect against this potential data leakage without otherwise interfering with the employee experience. For example, when an employee sends the latest engineering pictures from their personal email account, copies and pastes product info into a tweet, or saves an in-progress sales report to their public cloud storage. With the increase of employee-owned devices in the enterprise, there’s also an i ncreasing risk of accidental data leak through apps and services, like email, social media, and the public cloud, which are outside of the enterprise’s control.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |