Skip to content

Commit b098405

Browse files
committed
add wip deprecation notice
1 parent 5729f58 commit b098405

4 files changed

Lines changed: 26 additions & 0 deletions

File tree

memdocs/configmgr/compliance/deploy-use/create-configuration-items-for-windows-10-devices-managed-with-the-client.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -118,6 +118,9 @@ Use the Configuration Manager **Windows 10 or later** configuration item to mana
118118

119119
### Windows Information Protection
120120

121+
[!INCLUDE [wip-deprecation](../../../includes/wip-deprecation.md)]
122+
<!-- MAXADO-6010051 -->
123+
121124
With the increase of employee-owned devices in the enterprise, there's also an increasing risk of accidental data leaks through apps and services, like email, social media, and the public cloud. These are outside of the organization's control. Examples include when an employee:
122125

123126
- Sends the latest engineering pictures from their personal email account.
Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
---
2+
author: aczechowski
3+
ms.author: aaroncz
4+
ms.prod: configuration-manager
5+
ms.topic: include
6+
ms.date: 07/15/2022
7+
# note this include file is in this folder because it's used in both ConfigMgr and Intune articles
8+
---
9+
10+
<!-- 6010051 -->
11+
12+
> [!NOTE]
13+
> Starting in July 2022, Microsoft is deprecating Windows Information Protection. Microsoft Endpoint Manager is discontinuing future investments in managing and deploying Windows Information Protection.
14+
>
15+
> Support for the Windows Information Protection without enrollment scenario in Microsoft Intune will be removed by the end of December 2022.
16+
>
17+
> For more information, see [MEM blog post]() <!-- QUESTION --> **_TBD link to blog post from Matt_**

memdocs/intune/apps/windows-information-protection-policy-create.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,9 @@ ms.collection:
3333

3434
# Create and deploy Windows Information Protection (WIP) policy with Intune
3535

36+
[!INCLUDE [wip-deprecation](../../includes/wip-deprecation.md)]
37+
<!-- MAXADO-6010051 -->
38+
3639
[!INCLUDE [azure_portal](../includes/azure_portal.md)]
3740

3841
You can use Windows Information Protection (WIP) policies with Windows 10 apps to protect apps without device enrollment.

memdocs/intune/protect/windows-information-protection-configure.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,9 @@ ms.collection:
3232

3333
# Learn about Windows Information Protection and Microsoft Intune
3434

35+
[!INCLUDE [wip-deprecation](../../includes/wip-deprecation.md)]
36+
<!-- MAXADO-6010051 -->
37+
3538
With the increase of employee-owned devices in the enterprise, there's also an increasing risk of accidental data leaks through apps and services, like email, social media, and the public cloud, which are outside of the enterprise's control. For example, an employee sends the latest engineering pictures from a personal email account, copies and pastes product info into a tweet, or saves an in-progress sales report to public cloud storage.
3639

3740
**Windows Information Protection** helps to protect against this potential data leakage without otherwise interfering with the employee experience. It also helps to protect enterprise apps and data against accidental data leaks on enterprise-owned devices and personal devices that employees bring to work without requiring changes to your environment or other apps.

0 commit comments

Comments
 (0)