Microsoft Edge support for Windows Information Protection (WIP)


Microsoft Edge for Business is now available in Edge stable version 116! Learn more about the new, dedicated work experience with native enterprise grade security, productivity, manageability, and AI built in.

This article describes how Microsoft Edge supports Windows Information Protection (WIP).


This applies to Microsoft Edge version 81 or later. Windows information protection will be discontinued over time. For more information, see Announcing the sunset of Windows Information Protection (WIP).


Windows Information Protection (WIP) is a Windows 10 feature that helps protect enterprise data from unauthorized or accidental disclosure. With the rise of remote work, there's an increased risk of sharing corporate data outside the workplace. This risk increases when personal activities and work activities occur on corporate devices.

Microsoft Edge supports WIP to help protect content in a web environment where users often share and distribute content.

System requirements

The follow requirements apply to devices using WIP in the enterprise:

  • Windows 10, version 1607 or later
  • Only Windows client SKUs
  • One of the management solutions described in WIP prerequisites

Windows Information Protection benefits

WIP provides the following benefits:

  • Obvious separation between personal and corporate data, without requiring employees to switch environments or apps.
  • Additional data protection for existing line-of-business apps without a need to update the apps.
  • The ability to remote wipes corporate data from Intune Mobile Device Management (MDM) enrolled devices while leaving personal data unaffected.
  • Audit reports for tracking issues and for remedial actions such as compliance training for users.
  • Integration with your existing management system to configure, deploy, and manage WIP. Some examples are Microsoft Intune, Microsoft Endpoint Configuration Manager, or your current mobile device management (MDM) system.

WIP policy and protection modes

Using policies, you can configure the four protection modes described in the following table. For more information, see WIP-protection modes.

Mode Description
Block WIP looks for inappropriate data sharing practices and stops the employee from completing the action. This search can include sharing enterprise data to non-enterprise-protected apps in addition to sharing enterprise data between apps or attempting to share outside of your organization's network.
Allow Overrides WIP looks for inappropriate data sharing, warning employees if they do something deemed potentially unsafe. However, this management mode lets the employee override the policy and share the data, logging the action to your audit log.
Silent WIP runs silently, logging inappropriate data sharing, without stopping anything that would have been prompted for employee interaction while in Allow Overrides mode. Unallowed actions, like apps inappropriately trying to access a network resource or WIP-protected data, are still stopped.
Off WIP is turned off and doesn't help to protect or audit your data. After you turn off WIP, an attempt is made to decrypt any WIP-tagged files on the locally attached drives. Your previous decryption and policy info isn't automatically reapplied if you turn WIP protection back on.

WIP features supported in Microsoft Edge

Starting with Microsoft Edge version 81, the following features are supported:

  • Work sites will be indicated by a briefcase icon on the address bar.
  • Files downloaded from a work location are automatically encrypted.
  • Silent/Block/Override enforcement for work file uploads to non-work locations.
  • Silent/Block/Override enforcement for file Drag & Drop actions.
  • Silent/Block/Override enforcement for Clipboard actions.
  • Browsing to work locations from non-work profiles automatically redirects to the Work Profile (associated with the Microsoft Entra identity.)
  • IE Mode supports full WIP functionality.

Working with WIP in Microsoft Edge

After WIP support is enabled for Microsoft Edge, users will see when work-related information is accessed. The next screenshot shows the briefcase icon in the address bar, indicating that work-related information is accessed via the browser.

Address bar indicator for sites marked as "work"

Microsoft Edge gives users the ability to share protected content in an unapproved website. The next screenshot shows the Microsoft Edge prompt that allows a user to use protected content in an unapproved website.

Prompt for protected content override

Configure policies to support WIP

Using WIP with Microsoft Edge requires the presence of a work profile.

Ensure the presence of a work profile

On hybrid joined machines, Microsoft Edge is automatically signed in with the Microsoft Entra account. To make sure that users don't remove this profile, which is needed for WIP, configure the following policy:


If your environment isn't hybrid joined, you can hybrid join using these instructions: Plan your Microsoft Entra hybrid join implementation.

If hybrid joining isn't an option, you can use on-prem Microsoft Entra accounts to allow Microsoft Edge to auto create a special work profile with the users' domain accounts. Note that on-premises accounts may not receive all of Microsoft Entra features, such as cloud sync, Office NTP, and so on.

Microsoft Entra accounts

For Microsoft Entra accounts, you must configure the following policy to have the Microsoft Edge auto create a special work profile.

Windows policies for WIP

You can configure WIP using Windows policies. For more information, see Create and deploy WIP policies using Microsoft Intune

Frequently Asked Questions

How do I resolve Error Code -2147024540?

This error code corresponds to the following Windows Information Protection error: ERROR_EDP_POLICY_DENIES_OPERATION: The requested operation was blocked by Windows Information Protection policy. For more information, contact your system administrator.

Microsoft Edge shows this error when the organization has enabled Windows Information Protection (WIP) to only allow users with approved applications to access corporate resources. In this case because Microsoft Edge isn't on the approved applications list, the admin will have to update the WIP policies to grant access to Microsoft Edge.

The following screenshot shows how the Microsoft Intune is used to add Microsoft Edge as an allowed app for WIP.

Intune dialog to add Microsoft Edge as an app for WIP

If you're not using Microsoft Intune, download and apply the policy update in the WIP Enterprise AppLocker Policy file.

See also