I can really se the need for tracking a document without protecting it. Everyone can freely share this document but I can track who and when it is used. Could be based on a signature instead of encryption.
(Note: the original feature request was called Tracking without Encryption, but this can't be possible as without encryption anyone can open the content even without a connection, and thus tracking would yield extremely unreliable results, so we redefined it as Tracking Without Protection)14 votes
The All Authenticated users feature allows for tracking without protection. Of course, tracking without encryption is not possible since if it’s not encrypted no license is required for accessing the content and thus there can’t be tracking, but the feature currently in preview should meet the same need. I’m renaming the feature request to reflect this reality.
It would be handy for some documents if you could define a wildcard scope or everyone to view a document (with or without an expiration date) while you give for example co-author rights to all tenant users.
This could be usefull for some types of information for example safety sheets that you want everyone to be able to read but to make sure the latest version is used.8 votes
This feature has been released as a public preview.
for instructions, and more information here:
Allow Intune to configure and apply MAM policies on the AIP viewer mobile app for iOS13 votes
iOS AIP mobile app now supports MAM-WE, the feature is not yet exposed in the portal but will be published soon.
Surface AIP policies in the Office 365 DLP engines to allow consistent classification, labeling and protection119 votes
Currently available in Private Preview.
Provide a way to configure the location and style of headers and footers in visual marking. We currently provide Font size, color and alignment.45 votes
Allow the OneDrive for Business Sync client to sync and support protected files from OD4B and SPO libraries, including policies to sync based on classification49 votes
Add new policy options to integrate and enforce Conditional Access policies (such as user, device, location etc) when accessing sensitive information including MFA41 votes
Provide a bulk scanning and ongoing analysis engine to scan data repositories30 votes
- Don't see your idea?