Get All AIP encrypted files - SharePoint Online

One of the recent project merger and acquisition.  Technology - M365 tenant to Tenant migration Areas of consolidation 1. Mailboxes  2. SharePoint online data 3. OneDrive for Business data 4. Teams data migration 5. Security and Compliance Migration  Area of concern from security and compliance side was the encrypted files within EXO, SPO, Teams, ODB. Issue with encrypted data migration - end users will not be able to access the documents once the Source tenant is decommissioned.   Solution available -  Ask end users to unencrypt the data before migration  Alternet Solution - 1. Decrypt the files, mails using eDiscovery - This will give us output in PST format will is available for offline access, but the data in source will still be encrypted.  Decryption in eDiscovery - Microsoft Purview (compliance) | Microsoft Docs   2. Use Get-AIPfileLabel and Get-AIPFileLabel but in order to use this you must be aware of all the files paths.  Challenges -  1. We do not want end user intervention

Block users from saving data on System Drive on Intune Managed Device

Recently i delivered a project for Intune Deployment and came up with a requirement as follows

End Users Should not be able to save data locally on C or D Drive, instead they should be allowed to save data only in One Drive for business (synced with System) 

Based on the requirement i did my research and found the Following.

  • its possible to control the Local System settings on a Azure AD joined Machine and Managed by Intune.
  • There is no options to define exceptions in policies to allow data saving in certain folders. 

Now most of us will think WIP (windows information protection) policy will help us protecting the data on device, however that's not completely true as .

  • User can change the File Ownership to personal if the WIP policy is set to Allow Override.
  • User can save the file locally on the system
  • User will not be able to copy the data from work file to Personal file if policy is set to Allow override.
  • Unenlightened apps cannot differentiate between personal and corporate data as they are not aware of the WIP APIs (not integrated into source code) and if targeted by WIP policy  OS will enforce the application to treat all data being used as corporate and apply for the protection on it. 
So there is limitation in using WIP to achieve the target.

Now We decided to test Administrative Policies to Block users from Saving Data locally. 

Create a Configuration profile 

  • Login to Endpoint Manager Intune portal https://endpoint.microsoft.com/#home
  • Navigate to Devices -> Windows -> Configuration profiles.
  • Click on +Create Profile.
  • Select Platform: Select Windows 10 and later.
Give the Name & Description and proceed next.

  • click on the +Add Settings link to bring up the new blade of the policy configuration wizard. This bring new blade called the Settings Picker with a search box.
  • Expand Settings catalog is – Administrative Templates\Windows Components\File Explorer
  • In the “File Explorer” subcategory – Select the settings catalog Prevent access to drives from My Computer 
Proceed Next and Configure the policy > enable the Setting and under the Dropdown select the Drive to Block the access 



Deploy the policy to the group. User will experience a Pop up stating operation cancelled due to restrictions if they will try to save data on the drive. 

You can also hide the Drive from System if you select the settings as per the Image above.  

Conclude - Its not Possible to Allow users to save data only on One Drive for Business and restrict on System Drives. 

Comments

Popular posts from this blog

Error - AttributeValueMustBeUnique in Azure AD connect sync

Error - QuarantinedAttributeValueMustBeUnique

Add members to office 365 Security Group Using PowerShell and CSV

Enforce MFA using CSV

Analyze Office 365 Message headers