Easily managing Personal Data Encryption for known Windows folders

This week is a follow up to this post of a few months ago about getting started with Personal Data Encryption (PDE). That post was really focused on the early introduction of PDE and the functionality that it brings to the table, while this post will basically add-on to that functionality and knowledge. PDE is still a pretty unknown feature that is now actually growing in useful functionalities and could become a very welcome addition to the available data protection capabilities on Windows. With the latest version of Windows 11, version 24H2, PDE now also contains the ability to protect personal data in known Windows folders. Those known Windows folders are Documents, Desktop, and Pictures. That provides organizations with more protection capabilities for personal data, as PDE can be used alongside BitLocker. Main addition is that where the decryption key of BitLocker is released during the boot of the device, the decryption key of PDE is released during the sign-in of the user by using Windows Hello for Business. This post is focused on creating more awareness and showing the new really straight forward configuration options.

Note: Keep in mind that PDE for known Windows folders is available for Windows 11, version 24H2, and later.

Configuring Personal Data Encryption for known Windows folders

When looking at the configuration of PDE for known Windows folders, it all starts with the PDE CSP. That CSP is added to Windows 11, since version 22H2. That CSP contains the EnablePersonalDataEncryption node that can be used to enable PDE. Besides that, starting with Windows 11, version 24H2, that CSP now contains related nodes to enable PDE on specific known Windows folders. That means separate nodes for the Documents, Desktop, and Pictures folders. Those nodes are ProtectFolders/ProtectDocuments, ProtectFolders/ProtectDesktop and ProtectFolders/ProtectPictures. With the latest service release (2409) of Microsoft Intune, there is a new disk encryption template available for PDE. That template is named Personal Data Encryption and can be used to easily configure the different PDE settings, by relying on the PDE CSP. The following eight steps walk through the configuration of enabling PDE for known Windows folders, using that new template.

  1. Open the Microsoft Intune admin center portal and navigate to Endpoint security > Disk encryption
  2. On the Endpoint security | Disk encryption blade, click Create > New Policy
  3. On the Create a profile blade, select Windows > Personal Data Encryption and click Create
  4. On the Basics page, provide at least a unique name to distinguish it from similar profiles and click Next
  5. On the Configuration settings page, as shown below in Figure 1, configure the following and click Next
  • Switch the slider with Enable Personal Data Encryption (User) to Enable Personal Data Encryption (1)
    • Protect Pictures (User): Select Enable PDE on folder (A)
    • Protect Documents (User): Select Enable PDE on folder (B)
    • Protect Desktop (User): Select Enable PDE on folder (C)
  1. On the Scope tags page, configure the required scope tags and click Next
  2. On the Assignments page, configure the assignment for the required user or devices and click Next
  3. On the Review + create page, verify the configuration and click Create

Note: Besides these minimal required settings, also seriously consider configuring the additional hardening settings that are all available within the Settings Catalog to prevent exposure of the encryption keys.

Experiencing Personal Data Encryption for known Windows folders

When the configurations of PDE for known Windows folders are in place, it’s time to look at the user experience. The addition of known Windows folders, makes the configuration of PDE a lot easier to test and verify. Those folders and the files within those folders will be displayed in File Explorer with a yellow lock icon, as shown below in Figure 2 (number 1 and 2). When looking at the Advanced Attributes of those files it will mention the encryption of content, as shown below in Figure 2 (number 3). And when looking at the Details it will clearly show the use of PDE, as shown below in Figure 2 (number 4).

Besides that, something that might even be more obvious, is the message that the user will receive when not using Windows Hello to sign-in. That message was shown in the previous post about getting started with PDE. That message is shown when the user is trying to use something different then Windows Hello, like username-password. In that case, the user will receive the message to use Windows Hello to access files that are encrypted by their organization.

More information

For more information about Personal Data Encryption and the configuration, refer to the following docs.


Discover more from All about Microsoft Intune

Subscribe to get the latest posts sent to your email.

20 thoughts on “Easily managing Personal Data Encryption for known Windows folders”

  1. Peter,
    Thank you for posting this information, your posts are always so informative.
    I can’t wrap my head around using PDE in an enterprise environment. If only the user can open the files what happens if there was an investigation or a legal hold on the device? I’d also worry about an upset employee encrypting all of their files before leaving a company. Then I’d be curious to know how Defender and DLP is handled when the files are encrypted.
    Hopefully Microsoft will release more information about how to handle the scenarios above.

    Reply
    • Hi David,
      At this moment it’s only for the local data in the known Windows folders (and to be complete, the Mail app). When using OneDrive KFM, that information is also available in the OneDrive of the user.
      Regards, Peter

      Reply
  2. How does PDE work with security tools? For example: EDR or forensic tools? Are those tools (probably running as system) able to see into the encrypted files if the user has logged in and unlocked the encryption keys?

    Reply
  3. Is PDE going to replace Controlled Folder Access , does it co-exists, or do I need to decide on one?
    CFA is more complex to configure (exclusions) but IMO more secure as only certain processes can write to known folders.

    Reply
  4. Hopefully there will be a way to remove those unsightly yellow padlock badges from the icons. They could serve a purpose if the files are *unavailable* due to PDE, but when they are unlocked and available they are just noise.

    Reply
  5. I configured the feature and everything works as advertised except that I can still access the files when logging in with the password instead of Windows Hello even though I see the message on the lock screen to use Hello.

    When logging in as admin, trying to open the files in the user profile it fails, so they are encrypted it seems

    Reply
      • Hi Peter,

        yes indeed, I can restart and login with the password and open the files. I don’t really get it!

        Regards
        Sebastian

        Reply
          • I did exactly the same test and same result as AlphaSeb.
            I connect after a reboot and after a lock with my Username/password and I was still access to my files.

            I try to connect then with an admin account to test the access and the admin account has no access to my personal lock files.

            So for me it’s better like that. Secured but we can use what we want to connect.

  6. And in my opinion I think the intereset is limited if only this directories are protected when we use Onedrive.
    Personally, I use Onedrive with a clean tree structure and admins have access to it. Even I use PDE.

    Reply
  7. Hello Peter,
    Thank you for your post – the information you provided is very useful.

    Could you please assist me in understanding the issue? The same policy works correctly on Autopilot devices (using the same account), but it fails to be applied and does not function as expected on Microsoft Entra hybrid-joined devices.

    I would appreciate your guidance on this matter.

    Reply

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.