- Managing device features and behavior
- Managing devices with IT policies
- Importing IT policy and device metadata updates
- Creating device support messages
- Enforcing compliance rules for devices
- Sending commands to users and devices
- Deactivating devices
- Controlling the software updates that are installed on devices
- Create a device SR requirements profile for Android Enterprise devices
- Create a device SR requirements profile for Samsung Knox devices
- View users who are running a revoked software release
- Managing OS updates on devices with MDM controls activations
- View available updates for iOS devices
- Update the OS on supervised iOS devices
- Configuring communication between devices and BlackBerry UEM
- Displaying organization information on devices
- Using location services on devices
- Using Activation Lock on iOS devices
- Managing iOS features using custom payload profiles
- Managing factory reset protection for Android Enterprise devices
- Create a Factory reset protection profile
- Manually obtain a user ID for a Google account
- How factory reset protection responds to device resets
- Considerations for using a specific Managed Google Play account when setting up a factory reset protection profile
- Clear factory reset protection from a device
- Setting up Windows Information Protection for Windows 10 devices
- Allowing BitLocker encryption on Windows 10 devices
- Managing attestation for devices
- Migrate iOS devices to use a hardened channel
- BlackBerry Docs
- BlackBerry UEM 12.18
- Administration
- Managing device features
- Setting up Windows Information Protection for Windows 10 devices
Setting up Windows Information Protection for Windows 10 devices
Windows
Information Protection for Windows 10
devicesYou can set up
Windows
Information Protection (WIP) for Windows 10
devices when you want to:
- Separate personal and work data on devices and be able to wipe only work data
- Prevent users from sharing work data outside of protected work apps or with people outside of your organization
- Protect data even if it is moved to or shared on other devices, such as a USB key
- Audit user behavior and take appropriate actions to prevent data leaks
When you set up WIP for devices, you specify the apps that you want to protect with WIP. Protected apps are trusted to create and access work files, while unprotected apps can be blocked from accessing work files. You can choose the level of protection for protected apps based on how you want users to behave when they share work data. When WIP is enabled, all data sharing practices are audited. For more information about WIP, visit protect-enterprise-data-using-wip.
The apps that you specify can be enlightened or unenlightened for enterprise. Enlightened apps can create and access work and personal data. Unenlightened apps can only create and access work data. For more information about enlightened and unenlightened apps, visit enlightened-microsoft-apps-and-wip.html.