AdminEnrique Saggese (Principal Program Manager, Information Protection CxE, Microsoft - Azure - Msip)

My feedback

  1. 2 votes
    Sign in
    (thinking…)
    Sign in with: facebook google
    Signed in as (Sign out)

    We’ll send you updates on this idea

  2. 9 votes
    Sign in
    (thinking…)
    Sign in with: facebook google
    Signed in as (Sign out)

    We’ll send you updates on this idea

  3. 196 votes
    Sign in
    (thinking…)
    Sign in with: facebook google
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Unfortunately no ETA is available yet given the dependency on multiple work streams. We'll provide an ETA as soon as one is available.

  4. 6 votes
    Sign in
    (thinking…)
    Sign in with: facebook google
    Signed in as (Sign out)

    We’ll send you updates on this idea

  5. 3 votes
    Sign in
    (thinking…)
    Sign in with: facebook google
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Azure Information Protection » Doc Tracking  ·  Flag idea as inappropriate…  ·  Admin →
  6. 3 votes
    Sign in
    (thinking…)
    Sign in with: facebook google
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Azure Information Protection » Labelling  ·  Flag idea as inappropriate…  ·  Admin →

    Can you explain the objective? If there's a default label and users are not allowed to change it, what is the point in having other labels?

  7. 8 votes
    Sign in
    (thinking…)
    Sign in with: facebook google
    Signed in as (Sign out)

    We’ll send you updates on this idea

  8. 9 votes
    Sign in
    (thinking…)
    Sign in with: facebook google
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Proposed  ·  2 comments  ·  Azure Information Protection » Office 365 and EMS  ·  Flag idea as inappropriate…  ·  Admin →

    While this is a valid request, I want to respond to the comment below that MCAS doesn't support this. MCAS CAN apply AIP classification labels to files in real-time currently, so MCAS can address the scenario described here.

  9. 34 votes
    Sign in
    (thinking…)
    Sign in with: facebook google
    Signed in as (Sign out)

    We’ll send you updates on this idea

    6 comments  ·  Azure Information Protection » Office Clients  ·  Flag idea as inappropriate…  ·  Admin →

    While we agree on the importance of it being native, I want to highlight that you can use AIP classification buttons to trigger Encrypt Only via a transport rule. So from an end-user perspective, it should be a single click operation with what's available today.

  10. 14 votes
    Sign in
    (thinking…)
    Sign in with: facebook google
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Proposed  ·  0 comments  ·  Azure Information Protection » Labelling  ·  Flag idea as inappropriate…  ·  Admin →
  11. 12 votes
    Sign in
    (thinking…)
    Sign in with: facebook google
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Azure Information Protection » Protection  ·  Flag idea as inappropriate…  ·  Admin →

    Please note that this feature is available in AD RMS.

  12. 34 votes
    Sign in
    (thinking…)
    Sign in with: facebook google
    Signed in as (Sign out)

    We’ll send you updates on this idea

    8 comments  ·  Azure Information Protection » Doc Tracking  ·  Flag idea as inappropriate…  ·  Admin →

    The All Authenticated users feature allows for tracking without protection. Of course, tracking without encryption is not possible since if it’s not encrypted no license is required for accessing the content and thus there can’t be tracking, but the feature currently in preview should meet the same need. I’m renaming the feature request to reflect this reality.

  13. 7 votes
    Sign in
    (thinking…)
    Sign in with: facebook google
    Signed in as (Sign out)

    We’ll send you updates on this idea

  14. 17 votes
    Sign in
    (thinking…)
    Sign in with: facebook google
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Under Review  ·  9 comments  ·  Azure Information Protection » User Experience  ·  Flag idea as inappropriate…  ·  Admin →

    Have you tried ctrl+shift+~ and then tab between the labels?

  15. 1 vote
    Sign in
    (thinking…)
    Sign in with: facebook google
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Azure Information Protection » User Experience  ·  Flag idea as inappropriate…  ·  Admin →

    The recommendation in these cases is to use recommendations instead of automatic protection, and to combine that with the OutlookRecommendationEnabled Custom Configuration.
    Of course, with all the caveats related to RunPolicyinBackground which is still in preview due to the significant performance impact it has.

  16. 2 votes
    Sign in
    (thinking…)
    Sign in with: facebook google
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Azure Information Protection » Protection  ·  Flag idea as inappropriate…  ·  Admin →

    Thanks for your suggestion.
    Please note that as of this writing there's no available technology that can block a screen shot from a web browser session on all platforms. Doing so would require the installation of client software, which would defeat the purpose of a web view. This may change with the adoption of HTML5 which may offer such capabilities in the future.
    Until such a capability is available broadly in web browsers, we recommend that if you are sharing content with untrusted individuals you do not enable the option to view on web browser.

  17. 3 votes
    Sign in
    (thinking…)
    Sign in with: facebook google
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Azure Information Protection » Protection  ·  Flag idea as inappropriate…  ·  Admin →

    Please note that this is a known bug which is being addressed. It only triggers on mobile browsers, and f you switch the browser to Desktop mode the attachment will render without problems. We will notify this thread once the issue is fixed.

  18. 29 votes
    Sign in
    (thinking…)
    Sign in with: facebook google
    Signed in as (Sign out)

    We’ll send you updates on this idea

    3 comments  ·  Azure Information Protection » Protection  ·  Flag idea as inappropriate…  ·  Admin →

    @Mr-Tbobe: can you elaborate on the last part of your comment? There are two types of policies, centrally-defined (where the admin defines the list of employees) and end-user defined (ad-hoc, DNF and Encrypt Only fall in this category). In the former, the admin defines a list of recipients/groups, in the later the user does.
    You seem to indicate that you want to have Encrypt-only with a predefined list of recipients, equivalent to having a label with a predefined list of recipients that grants full rights, which is already available since day one.
    Can you clarify if this is not what you meant?

    Please note that DNF is NOT a template. It is a built-in option in Outlook, which is created as an ad-hoc policy for each individual email. We have added some more flexibility through the Encrypt Only option (currently in preview) which works exactly like DNF but grants more rights. Right now it is only available as a transport action but you can trigger it based on an AIP label (and a good practice is to assign DNF as the policy for that label, and have a Transport Rule switch it to Encrypt Only on the fly, so the message is always protected but recipients get the more flexible rights granted by EO). Please do test Encrypt Only since it may already meet your needs.

  19. 3 votes
    Sign in
    (thinking…)
    Sign in with: facebook google
    Signed in as (Sign out)

    We’ll send you updates on this idea

  20. 128 votes
    Sign in
    (thinking…)
    Sign in with: facebook google
    Signed in as (Sign out)

    We’ll send you updates on this idea

    The original feature of enabling labeling capabilities in Mac OS is currently available in public preview.
    This suggestion was forked from the original general request to release an AIP client for Mac. Applying protection for non-Office files is currently available using the Mac RMS Sharing app which is not deprecated (unlike the Windows release). Therefor the suggestion is standing in order to release an AIP Client for non-Office files in Mac and currently updated to “Under Review”

    Please note, the feature tracked in this Idea is for the AIP Client for Mac OS, which would allow for classification and protection of non-Office documents. For classification and protection of Office documents from within Office, the client is already in private preview, and tracked by this Idea: https://msip.uservoice.com/forums/600097-azure-information-protection/suggestions/19602337-integrate-aip-natively-into-office-for-mac

← Previous 1

Feedback and Knowledge Base