maciejrebisz.com

IT

WIP app learning in Windows Analytics – Mobile-First Cloud-First

maximios December 4, 2022

This is not a blog post about setting up Windows Information Protection (WIP), but on how to help the IT admin see what applications there are used in the corporate environment and  how to get the app inside the WIP policy so it is a allowed app from IT.

When using a AzureAD joined Windows 10 device that are MDM managed with Intune – it is not possible to use the same tools as you can do on a domain joined device, a example is event forward collector. Windows Analytics is the best way of collecting the information the information in my opinion, but every company that want a great inside into the Windows 10 environment should be running  Windows Analytics.

When you are trying to access your company resources in this example Office 365 from a non company app in this example chrome browser you will get blocked.

When using Windows Analytics Device health solutions you will be able to monitor WIP app Learning

You can see who many users in your organisation is using WIP, and what apps that have WIP access events, in this example Google Chrome when trying to access Office 365

Click on Google Chrome to see detailes

Click on Table and you have all the information you need to change your WIP policy in Intune

Inside the Intune App protection policy for Windows:

Click Add apps

Enter the information you need to get Google Chrome a corporate app:

Name = Google Chrome

Publisher = O=GOOGLE INC, L=MOUNTAIN VIEW, S=CALIFORNIA, C=US

Product Name = Google Chrome

File = chrome.exe

Min version = * (You can specify a min version number if your corporate policy state that you need to be specific)

Max version = * (You can specify a min version number if your corporate policy state that you need to be specific – just remember to change it when Google releases a new version of Google Chrome or it will no longer be a corporate app))

After a sync of Intune policies to the device Chrome Browser is a corporate app that are allowed to access corporate data.

Happy testing

Read more at:

Protect your enterprise data using Windows Information Protection (WIP)

Related Posts

IT /

Intune – Windows device enrollment restrictions – Cloud First

IT /

How to add “hidden” Windows UWP to Windows Store for Business – Cloud First

IT /

Office 2016 Active Directory-Based activation – Cloud First

‹ Intune Enrollment status page for Windows is back – Mobile-First Cloud-First › How to setup Intune to use Apple DEP – Mobile-First Cloud-First

Recent Posts

  • Intune – Windows device enrollment restrictions – Cloud First
  • How to add “hidden” Windows UWP to Windows Store for Business – Cloud First
  • Office 2016 Active Directory-Based activation – Cloud First
  • How to deploy Windows Local Experience Packs with Intune – Cloud First
  • Conditional Access for Outlook Web Access (OWA) – Cloud First

Recent Comments

No comments to show.

Archives

  • November 2025
  • October 2025
  • August 2025
  • July 2025
  • June 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • November 2024
  • September 2024
  • July 2024
  • June 2024
  • March 2024
  • December 2023
  • August 2023
  • June 2023
  • March 2023
  • February 2023
  • December 2022
  • September 2022
  • August 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • January 2022
  • December 2021
  • October 2021
  • September 2021
  • August 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • February 2020
  • January 2020
  • December 2019
  • October 2019
  • September 2019
  • June 2019
  • April 2019
  • March 2019
  • February 2019
  • March 2018
  • February 2018
  • December 2017
  • October 2017
  • August 2017

Categories

  • IT

Back to Top

© maciejrebisz.com 2026
Powered by WordPress • Themify WordPress Themes