Class WindowsInformationProtection

All Implemented Interfaces:
com.microsoft.graph.serializer.IJsonBackedObject
Direct Known Subclasses:
MdmWindowsInformationProtectionPolicy, WindowsInformationProtectionPolicy

public class WindowsInformationProtection extends ManagedAppPolicy implements com.microsoft.graph.serializer.IJsonBackedObject
The class for the Windows Information Protection.
  • Field Details

    • azureRightsManagementServicesAllowed

      @SerializedName(value="azureRightsManagementServicesAllowed", alternate="AzureRightsManagementServicesAllowed") @Expose @Nullable public Boolean azureRightsManagementServicesAllowed
      The Azure Rights Management Services Allowed. Specifies whether to allow Azure RMS encryption for WIP
    • dataRecoveryCertificate

      @SerializedName(value="dataRecoveryCertificate", alternate="DataRecoveryCertificate") @Expose @Nullable public WindowsInformationProtectionDataRecoveryCertificate dataRecoveryCertificate
      The Data Recovery Certificate. Specifies a recovery certificate that can be used for data recovery of encrypted files. This is the same as the data recovery agent(DRA) certificate for encrypting file system(EFS)
    • enforcementLevel

      @SerializedName(value="enforcementLevel", alternate="EnforcementLevel") @Expose @Nullable public WindowsInformationProtectionEnforcementLevel enforcementLevel
      The Enforcement Level. WIP enforcement level.See the Enum definition for supported values. Possible values are: noProtection, encryptAndAuditOnly, encryptAuditAndPrompt, encryptAuditAndBlock.
    • enterpriseDomain

      @SerializedName(value="enterpriseDomain", alternate="EnterpriseDomain") @Expose @Nullable public String enterpriseDomain
      The Enterprise Domain. Primary enterprise domain
    • enterpriseInternalProxyServers

      @SerializedName(value="enterpriseInternalProxyServers", alternate="EnterpriseInternalProxyServers") @Expose @Nullable public List<WindowsInformationProtectionResourceCollection> enterpriseInternalProxyServers
      The Enterprise Internal Proxy Servers. This is the comma-separated list of internal proxy servers. For example, '157.54.14.28, 157.54.11.118, 10.202.14.167, 157.53.14.163, 157.69.210.59'. These proxies have been configured by the admin to connect to specific resources on the Internet. They are considered to be enterprise network locations. The proxies are only leveraged in configuring the EnterpriseProxiedDomains policy to force traffic to the matched domains through these proxies
    • enterpriseIPRanges

      @SerializedName(value="enterpriseIPRanges", alternate="EnterpriseIPRanges") @Expose @Nullable public List<WindowsInformationProtectionIPRangeCollection> enterpriseIPRanges
      The Enterprise IPRanges. Sets the enterprise IP ranges that define the computers in the enterprise network. Data that comes from those computers will be considered part of the enterprise and protected. These locations will be considered a safe destination for enterprise data to be shared to
    • enterpriseIPRangesAreAuthoritative

      @SerializedName(value="enterpriseIPRangesAreAuthoritative", alternate="EnterpriseIPRangesAreAuthoritative") @Expose @Nullable public Boolean enterpriseIPRangesAreAuthoritative
      The Enterprise IPRanges Are Authoritative. Boolean value that tells the client to accept the configured list and not to use heuristics to attempt to find other subnets. Default is false
    • enterpriseNetworkDomainNames

      @SerializedName(value="enterpriseNetworkDomainNames", alternate="EnterpriseNetworkDomainNames") @Expose @Nullable public List<WindowsInformationProtectionResourceCollection> enterpriseNetworkDomainNames
      The Enterprise Network Domain Names. This is the list of domains that comprise the boundaries of the enterprise. Data from one of these domains that is sent to a device will be considered enterprise data and protected These locations will be considered a safe destination for enterprise data to be shared to
    • enterpriseProtectedDomainNames

      @SerializedName(value="enterpriseProtectedDomainNames", alternate="EnterpriseProtectedDomainNames") @Expose @Nullable public List<WindowsInformationProtectionResourceCollection> enterpriseProtectedDomainNames
      The Enterprise Protected Domain Names. List of enterprise domains to be protected
    • enterpriseProxiedDomains

      @SerializedName(value="enterpriseProxiedDomains", alternate="EnterpriseProxiedDomains") @Expose @Nullable public List<WindowsInformationProtectionProxiedDomainCollection> enterpriseProxiedDomains
      The Enterprise Proxied Domains. Contains a list of Enterprise resource domains hosted in the cloud that need to be protected. Connections to these resources are considered enterprise data. If a proxy is paired with a cloud resource, traffic to the cloud resource will be routed through the enterprise network via the denoted proxy server (on Port 80). A proxy server used for this purpose must also be configured using the EnterpriseInternalProxyServers policy
    • enterpriseProxyServers

      @SerializedName(value="enterpriseProxyServers", alternate="EnterpriseProxyServers") @Expose @Nullable public List<WindowsInformationProtectionResourceCollection> enterpriseProxyServers
      The Enterprise Proxy Servers. This is a list of proxy servers. Any server not on this list is considered non-enterprise
    • enterpriseProxyServersAreAuthoritative

      @SerializedName(value="enterpriseProxyServersAreAuthoritative", alternate="EnterpriseProxyServersAreAuthoritative") @Expose @Nullable public Boolean enterpriseProxyServersAreAuthoritative
      The Enterprise Proxy Servers Are Authoritative. Boolean value that tells the client to accept the configured list of proxies and not try to detect other work proxies. Default is false
    • exemptApps

      @SerializedName(value="exemptApps", alternate="ExemptApps") @Expose @Nullable public List<WindowsInformationProtectionApp> exemptApps
      The Exempt Apps. Exempt applications can also access enterprise data, but the data handled by those applications are not protected. This is because some critical enterprise applications may have compatibility problems with encrypted data.
    • iconsVisible

      @SerializedName(value="iconsVisible", alternate="IconsVisible") @Expose @Nullable public Boolean iconsVisible
      The Icons Visible. Determines whether overlays are added to icons for WIP protected files in Explorer and enterprise only app tiles in the Start menu. Starting in Windows 10, version 1703 this setting also configures the visibility of the WIP icon in the title bar of a WIP-protected app
    • indexingEncryptedStoresOrItemsBlocked

      @SerializedName(value="indexingEncryptedStoresOrItemsBlocked", alternate="IndexingEncryptedStoresOrItemsBlocked") @Expose @Nullable public Boolean indexingEncryptedStoresOrItemsBlocked
      The Indexing Encrypted Stores Or Items Blocked. This switch is for the Windows Search Indexer, to allow or disallow indexing of items
    • isAssigned

      @SerializedName(value="isAssigned", alternate="IsAssigned") @Expose @Nullable public Boolean isAssigned
      The Is Assigned. Indicates if the policy is deployed to any inclusion groups or not.
    • neutralDomainResources

      @SerializedName(value="neutralDomainResources", alternate="NeutralDomainResources") @Expose @Nullable public List<WindowsInformationProtectionResourceCollection> neutralDomainResources
      The Neutral Domain Resources. List of domain names that can used for work or personal resource
    • protectedApps

      @SerializedName(value="protectedApps", alternate="ProtectedApps") @Expose @Nullable public List<WindowsInformationProtectionApp> protectedApps
      The Protected Apps. Protected applications can access enterprise data and the data handled by those applications are protected with encryption
    • protectionUnderLockConfigRequired

      @SerializedName(value="protectionUnderLockConfigRequired", alternate="ProtectionUnderLockConfigRequired") @Expose @Nullable public Boolean protectionUnderLockConfigRequired
      The Protection Under Lock Config Required. Specifies whether the protection under lock feature (also known as encrypt under pin) should be configured
    • revokeOnUnenrollDisabled

      @SerializedName(value="revokeOnUnenrollDisabled", alternate="RevokeOnUnenrollDisabled") @Expose @Nullable public Boolean revokeOnUnenrollDisabled
      The Revoke On Unenroll Disabled. This policy controls whether to revoke the WIP keys when a device unenrolls from the management service. If set to 1 (Don't revoke keys), the keys will not be revoked and the user will continue to have access to protected files after unenrollment. If the keys are not revoked, there will be no revoked file cleanup subsequently.
    • rightsManagementServicesTemplateId

      @SerializedName(value="rightsManagementServicesTemplateId", alternate="RightsManagementServicesTemplateId") @Expose @Nullable public UUID rightsManagementServicesTemplateId
      The Rights Management Services Template Id. TemplateID GUID to use for RMS encryption. The RMS template allows the IT admin to configure the details about who has access to RMS-protected file and how long they have access
    • smbAutoEncryptedFileExtensions

      @SerializedName(value="smbAutoEncryptedFileExtensions", alternate="SmbAutoEncryptedFileExtensions") @Expose @Nullable public List<WindowsInformationProtectionResourceCollection> smbAutoEncryptedFileExtensions
      The Smb Auto Encrypted File Extensions. Specifies a list of file extensions, so that files with these extensions are encrypted when copying from an SMB share within the corporate boundary
    • assignments

      @SerializedName(value="assignments", alternate="Assignments") @Expose @Nullable public TargetedManagedAppPolicyAssignmentCollectionPage assignments
      The Assignments. Navigation property to list of security groups targeted for policy.
    • exemptAppLockerFiles

      @SerializedName(value="exemptAppLockerFiles", alternate="ExemptAppLockerFiles") @Expose @Nullable public WindowsInformationProtectionAppLockerFileCollectionPage exemptAppLockerFiles
      The Exempt App Locker Files. Another way to input exempt apps through xml files
    • protectedAppLockerFiles

      @SerializedName(value="protectedAppLockerFiles", alternate="ProtectedAppLockerFiles") @Expose @Nullable public WindowsInformationProtectionAppLockerFileCollectionPage protectedAppLockerFiles
      The Protected App Locker Files. Another way to input protected apps through xml files
  • Constructor Details

    • WindowsInformationProtection

      public WindowsInformationProtection()
  • Method Details

    • setRawObject

      public void setRawObject(@Nonnull com.microsoft.graph.serializer.ISerializer serializer, @Nonnull com.google.gson.JsonObject json)
      Sets the raw JSON object
      Specified by:
      setRawObject in interface com.microsoft.graph.serializer.IJsonBackedObject
      Overrides:
      setRawObject in class ManagedAppPolicy
      Parameters:
      serializer - the serializer
      json - the JSON object to set this object to