MIP Step 2: Profile 2 (Enabling MIP on the Azure portal for detection servers ( Enabling Detection Servers to decrypt MIP encrypted files ))
searchcancel
MIP Step 2: Profile 2 (Enabling MIP on the Azure portal for detection servers ( Enabling Detection Servers to decrypt MIP encrypted files ))
book
Article ID: 276043
calendar_today
Updated On: 02-19-2025
Products
Data Loss PreventionData Loss Prevention API Detection for Developer Apps Virtual ApplianceData Loss Prevention API Detection Virtual ApplianceData Loss Prevention Cloud Detection ServiceData Loss Prevention Cloud Detection Service for ICAPData Loss Prevention Cloud Detection Service for RESTData Loss Prevention Cloud PackageData Loss Prevention Cloud Prevent for Microsoft Office 365Data Loss Prevention Cloud Service for Discovery/ConnectorData Loss Prevention Cloud Service for EmailData Loss Prevention Cloud StorageData Loss Prevention Core PackageData Loss Prevention Data Access GovernanceData Loss Prevention Discover SuiteData Loss Prevention Endpoint DiscoverData Loss Prevention Endpoint PreventData Loss Prevention Endpoint SuiteData Loss Prevention EnforceData Loss Prevention Enterprise SuiteData Loss Prevention for MobileData Loss Prevention for Office 365 Email and Gmail with Email SafeguardData Loss Prevention Form RecognitionData Loss Prevention Network DiscoverData Loss Prevention Network EmailData Loss Prevention Network MonitorData Loss Prevention Network Monitor and Prevent for EmailData Loss Prevention Network Monitor and Prevent for Email and WebData Loss Prevention Network Monitor and Prevent for WebData Loss Prevention Network Prevent for EmailData Loss Prevention Network Prevent for Email Virtual ApplianceData Loss Prevention Network Prevent for Web Virtual ApplianceData Loss Prevention Network ProtectData Loss Prevention Network WebData Loss Prevention Oracle Standard Edition 2Data Loss Prevention Plus SuiteData Loss Prevention Sensitive Image Recognition
Issue/Introduction
Enabling MIP on the Azure portal for detection servers
Go to Azure Active Directory > App Registrations > New Registration
Under Supported account types choose the Single tenant account type option.
Provide a display name.
Leave the Redirect URI field empty
Click Register.
Select API Permissions and Select “Add a Permission”
Select Azure Rights Management Services from the Microsoft APIs tab.
Choose Application Permissions scope.
Select the Content.SuperUser permission, then click Add a permission.
Click Grant Admin Consent and then click Yes.
Go to Certificates & secrets.
Click New Client secret under Client secrets.
Add a description.
Choose a validity period and click Add.
Copy the Client secret. Copy this immediately; it will not be visible later. You will use this client secret in Configuring detection servers with Azure access credentials.
Go to the Overview page and copy the Application (client) ID and Directory (tenant) ID.
In the navigation pane, select Overview, and copy the Application (client) ID and Directory (tenant) ID values. You use these details later to configure MIP credential profiles that Symantec Data Loss Prevention uses to authenticate with the MIP service.