IntuneWindowsInformationProtectionPolicyWindows10MdmEnrolled

Parameters

Parameter Attribute DataType Description Allowed Values
Id Write String The unique identifier for an entity. Read-only.
DisplayName Key String Policy display name.
AzureRightsManagementServicesAllowed Write Boolean Specifies whether to allow Azure RMS encryption for WIP
DataRecoveryCertificate Write MSFT_MicrosoftGraphwindowsInformationProtectionDataRecoveryCertificate Specifies a recovery certificate that can be used for data recovery of encrypted files. This is the same as the data recovery agent(DRA) certificate for encrypting file system(EFS)
EnforcementLevel Write String WIP enforcement level.See the Enum definition for supported values. Possible values are: noProtection, encryptAndAuditOnly, encryptAuditAndPrompt, encryptAuditAndBlock. noProtection, encryptAndAuditOnly, encryptAuditAndPrompt, encryptAuditAndBlock
EnterpriseDomain Write String Primary enterprise domain
EnterpriseInternalProxyServers Write MSFT_MicrosoftGraphwindowsInformationProtectionResourceCollection[] This is the comma-separated list of internal proxy servers. For example, '157.54.14.28, 157.54.11.118, 10.202.14.167, 157.53.14.163, 157.69.210.59'. These proxies have been configured by the admin to connect to specific resources on the Internet. They are considered to be enterprise network locations. The proxies are only leveraged in configuring the EnterpriseProxiedDomains policy to force traffic to the matched domains through these proxies
EnterpriseIPRanges Write MSFT_MicrosoftGraphwindowsInformationProtectionIPRangeCollection[] Sets the enterprise IP ranges that define the computers in the enterprise network. Data that comes from those computers will be considered part of the enterprise and protected. These locations will be considered a safe destination for enterprise data to be shared to
EnterpriseIPRangesAreAuthoritative Write Boolean Boolean value that tells the client to accept the configured list and not to use heuristics to attempt to find other subnets. Default is false
EnterpriseNetworkDomainNames Write MSFT_MicrosoftGraphwindowsInformationProtectionResourceCollection[] This is the list of domains that comprise the boundaries of the enterprise. Data from one of these domains that is sent to a device will be considered enterprise data and protected These locations will be considered a safe destination for enterprise data to be shared to
EnterpriseProtectedDomainNames Write MSFT_MicrosoftGraphwindowsInformationProtectionResourceCollection[] List of enterprise domains to be protected
EnterpriseProxiedDomains Write MSFT_MicrosoftGraphwindowsInformationProtectionProxiedDomainCollection[] Contains a list of Enterprise resource domains hosted in the cloud that need to be protected. Connections to these resources are considered enterprise data. If a proxy is paired with a cloud resource, traffic to the cloud resource will be routed through the enterprise network via the denoted proxy server (on Port 80). A proxy server used for this purpose must also be configured using the EnterpriseInternalProxyServers policy
EnterpriseProxyServers Write MSFT_MicrosoftGraphwindowsInformationProtectionResourceCollection[] This is a list of proxy servers. Any server not on this list is considered non-enterprise
EnterpriseProxyServersAreAuthoritative Write Boolean Boolean value that tells the client to accept the configured list of proxies and not try to detect other work proxies. Default is false
ExemptApps Write MSFT_MicrosoftGraphwindowsInformationProtectionApp[] Exempt applications can also access enterprise data, but the data handled by those applications are not protected. This is because some critical enterprise applications may have compatibility problems with encrypted data.
IconsVisible Write Boolean Determines whether overlays are added to icons for WIP protected files in Explorer and enterprise only app tiles in the Start menu. Starting in Windows 10, version 1703 this setting also configures the visibility of the WIP icon in the title bar of a WIP-protected app
IndexingEncryptedStoresOrItemsBlocked Write Boolean This switch is for the Windows Search Indexer, to allow or disallow indexing of items
NeutralDomainResources Write MSFT_MicrosoftGraphwindowsInformationProtectionResourceCollection[] List of domain names that can used for work or personal resource
ProtectedApps Write MSFT_MicrosoftGraphwindowsInformationProtectionApp[] Protected applications can access enterprise data and the data handled by those applications are protected with encryption
ProtectionUnderLockConfigRequired Write Boolean Specifies whether the protection under lock feature (also known as encrypt under pin) should be configured
RevokeOnUnenrollDisabled Write Boolean This policy controls whether to revoke the WIP keys when a device unenrolls from the management service. If set to 1 (Don't revoke keys), the keys will not be revoked and the user will continue to have access to protected files after unenrollment. If the keys are not revoked, there will be no revoked file cleanup subsequently.
RightsManagementServicesTemplateId Write String TemplateID GUID to use for RMS encryption. The RMS template allows the IT admin to configure the details about who has access to RMS-protected file and how long they have access
SmbAutoEncryptedFileExtensions Write MSFT_MicrosoftGraphwindowsInformationProtectionResourceCollection[] Specifies a list of file extensions, so that files with these extensions are encrypted when copying from an SMB share within the corporate boundary
Description Write String The policy's description.
Assignments Write MSFT_IntuneWindowsInformationProtectionPolicyWindows10MdmEnrolledPolicyAssignments[] Represents the assignment to the Intune policy.
Ensure Write String Present ensures the policy exists, absent ensures it is removed. Present, Absent
Credential Write PSCredential Credentials of the Admin
ApplicationId Write String Id of the Azure Active Directory application to authenticate with.
TenantId Write String Id of the Azure Active Directory tenant used for authentication.
ApplicationSecret Write PSCredential Secret of the Azure Active Directory tenant used for authentication.
CertificateThumbprint Write String Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.
ManagedIdentity Write Boolean Managed ID being used for authentication.
AccessTokens Write StringArray[] Access token used for authentication.

MSFT_IntuneWindowsInformationProtectionPolicyWindows10MdmEnrolledPolicyAssignments

Parameters

Parameter Attribute DataType Description Allowed Values
dataType Write String The type of the target assignment. #microsoft.graph.groupAssignmentTarget, #microsoft.graph.allLicensedUsersAssignmentTarget, #microsoft.graph.allDevicesAssignmentTarget, #microsoft.graph.exclusionGroupAssignmentTarget, #microsoft.graph.configurationManagerCollectionAssignmentTarget
deviceAndAppManagementAssignmentFilterType Write String The type of filter of the target assignment i.e. Exclude or Include. Possible values are:none, include, exclude. none, include, exclude
deviceAndAppManagementAssignmentFilterId Write String The Id of the filter for the target assignment.
groupId Write String The group Id that is the target of the assignment.
groupDisplayName Write String The group Display Name that is the target of the assignment.
collectionId Write String The collection Id that is the target of the assignment.(ConfigMgr)

MSFT_MicrosoftGraphWindowsInformationProtectionDataRecoveryCertificate

Parameters

Parameter Attribute DataType Description Allowed Values
Certificate Write String Data recovery Certificate
Description Write String Data recovery Certificate description
ExpirationDateTime Write String Data recovery Certificate expiration datetime
SubjectName Write String Data recovery Certificate subject name

MSFT_MicrosoftGraphWindowsInformationProtectionResourceCollection

Parameters

Parameter Attribute DataType Description Allowed Values
DisplayName Write String Display name
Resources Write StringArray[] Collection of resources

MSFT_MicrosoftGraphWindowsInformationProtectionIPRangeCollection

Parameters

Parameter Attribute DataType Description Allowed Values
DisplayName Write String Display name
Ranges Write MSFT_MicrosoftGraphIpRange[] Collection of ip ranges

MSFT_MicrosoftGraphIpRange

Parameters

Parameter Attribute DataType Description Allowed Values
CidrAddress Write String IPv4 address in CIDR notation. Not nullable.
LowerAddress Write String Lower address.
UpperAddress Write String Upper address.
odataType Write String The type of the entity. #microsoft.graph.iPv4CidrRange, #microsoft.graph.iPv6CidrRange, #microsoft.graph.iPv4Range, #microsoft.graph.iPv6Range

MSFT_MicrosoftGraphWindowsInformationProtectionProxiedDomainCollection

Parameters

Parameter Attribute DataType Description Allowed Values
DisplayName Write String Display name
ProxiedDomains Write MSFT_MicrosoftGraphProxiedDomain[] Collection of proxied domains

MSFT_MicrosoftGraphProxiedDomain

Parameters

Parameter Attribute DataType Description Allowed Values
IpAddressOrFQDN Write String The IP address or FQDN
Proxy Write String Proxy IP or FQDN

MSFT_MicrosoftGraphWindowsInformationProtectionApp

Parameters

Parameter Attribute DataType Description Allowed Values
Denied Write Boolean If true, app is denied protection or exemption.
Description Write String The app's description.
DisplayName Write String App display name.
ProductName Write String The product name.
PublisherName Write String The publisher name
BinaryName Write String The binary name.
BinaryVersionHigh Write String The high binary version.
BinaryVersionLow Write String The lower binary version.
odataType Write String The type of the entity. #microsoft.graph.windowsInformationProtectionDesktopApp, #microsoft.graph.windowsInformationProtectionStoreApp

Description

Intune Windows Information Protection Policy for Windows10 Mdm Enrolled

Permissions

Microsoft Graph

To authenticate with the Microsoft Graph API, this resource required the following permissions:

Delegated permissions

  • Read

    • Group.Read.All, DeviceManagementApps.Read.All
  • Update

    • Group.Read.All, DeviceManagementApps.ReadWrite.All

Application permissions

  • Read

    • Group.Read.All, DeviceManagementApps.Read.All
  • Update

    • Group.Read.All, DeviceManagementApps.ReadWrite.All

Examples

Example 1

This example is used to test new resources and showcase the usage of new resources being worked on. It is not meant to use as a production baseline.

Configuration Example
{
    param(
        [Parameter()]
        [System.String]
        $ApplicationId,

        [Parameter()]
        [System.String]
        $TenantId,

        [Parameter()]
        [System.String]
        $CertificateThumbprint
    )
    Import-DscResource -ModuleName Microsoft365DSC

    node localhost
    {
        IntuneWindowsInformationProtectionPolicyWindows10MdmEnrolled 'Example'
        {
            DisplayName                            = 'WIP'
            AzureRightsManagementServicesAllowed   = $False
            Description                            = 'DSC'
            EnforcementLevel                       = 'encryptAndAuditOnly'
            EnterpriseDomain                       = 'domain.co.uk'
            EnterpriseIPRanges                     = @(
                MSFT_MicrosoftGraphwindowsInformationProtectionIPRangeCollection {
                    DisplayName = 'ipv4 range'
                    Ranges      = @(
                        MSFT_MicrosoftGraphIpRange {
                            UpperAddress = '1.1.1.3'
                            LowerAddress = '1.1.1.1'
                            odataType    = '#microsoft.graph.iPv4Range'
                        }
                    )
                }
            )
            EnterpriseIPRangesAreAuthoritative     = $True
            EnterpriseProxyServersAreAuthoritative = $True
            IconsVisible                           = $False
            IndexingEncryptedStoresOrItemsBlocked  = $False
            ProtectedApps                          = @(
                MSFT_MicrosoftGraphwindowsInformationProtectionApp {
                    Description   = 'Microsoft.MicrosoftEdge'
                    odataType     = '#microsoft.graph.windowsInformationProtectionStoreApp'
                    Denied        = $False
                    PublisherName = 'CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US'
                    ProductName   = 'Microsoft.MicrosoftEdge'
                    DisplayName   = 'Microsoft Edge'
                }
            )
            ProtectionUnderLockConfigRequired      = $False
            RevokeOnUnenrollDisabled               = $False
            Ensure                                 = 'Present'
            ApplicationId         = $ApplicationId;
            TenantId              = $TenantId;
            CertificateThumbprint = $CertificateThumbprint;
        }
    }
}

Example 2

This example is used to test new resources and showcase the usage of new resources being worked on. It is not meant to use as a production baseline.

Configuration Example
{
    param(
        [Parameter()]
        [System.String]
        $ApplicationId,

        [Parameter()]
        [System.String]
        $TenantId,

        [Parameter()]
        [System.String]
        $CertificateThumbprint
    )
    Import-DscResource -ModuleName Microsoft365DSC

    node localhost
    {
        IntuneWindowsInformationProtectionPolicyWindows10MdmEnrolled 'Example'
        {
            DisplayName                            = 'WIP'
            AzureRightsManagementServicesAllowed   = $False
            Description                            = 'DSC'
            EnforcementLevel                       = 'encryptAndAuditOnly'
            EnterpriseDomain                       = 'domain.com' # Updated Property
            EnterpriseIPRanges                     = @(
                MSFT_MicrosoftGraphwindowsInformationProtectionIPRangeCollection {
                    DisplayName = 'ipv4 range'
                    Ranges      = @(
                        MSFT_MicrosoftGraphIpRange {
                            UpperAddress = '1.1.1.3'
                            LowerAddress = '1.1.1.1'
                            odataType    = '#microsoft.graph.iPv4Range'
                        }
                    )
                }
            )
            EnterpriseIPRangesAreAuthoritative     = $True
            EnterpriseProxyServersAreAuthoritative = $True
            IconsVisible                           = $False
            IndexingEncryptedStoresOrItemsBlocked  = $False
            ProtectedApps                          = @(
                MSFT_MicrosoftGraphwindowsInformationProtectionApp {
                    Description   = 'Microsoft.MicrosoftEdge'
                    odataType     = '#microsoft.graph.windowsInformationProtectionStoreApp'
                    Denied        = $False
                    PublisherName = 'CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US'
                    ProductName   = 'Microsoft.MicrosoftEdge'
                    DisplayName   = 'Microsoft Edge'
                }
            )
            ProtectionUnderLockConfigRequired      = $False
            RevokeOnUnenrollDisabled               = $False
            Ensure                                 = 'Present'
            ApplicationId         = $ApplicationId;
            TenantId              = $TenantId;
            CertificateThumbprint = $CertificateThumbprint;
        }
    }
}

Example 3

This example is used to test new resources and showcase the usage of new resources being worked on. It is not meant to use as a production baseline.

Configuration Example
{
    param(
        [Parameter()]
        [System.String]
        $ApplicationId,

        [Parameter()]
        [System.String]
        $TenantId,

        [Parameter()]
        [System.String]
        $CertificateThumbprint
    )
    Import-DscResource -ModuleName Microsoft365DSC

    node localhost
    {
        IntuneWindowsInformationProtectionPolicyWindows10MdmEnrolled 'Example'
        {
            DisplayName                            = 'WIP'
            Ensure                                 = 'Absent'
            ApplicationId         = $ApplicationId;
            TenantId              = $TenantId;
            CertificateThumbprint = $CertificateThumbprint;
        }
    }
}