Creating an MIP credential profile for agents and on-premises detection servers

The following procedure requires the Server Administrator role.
  1. In the Enforce Server administration console, navigate to
    System > Settings > MIP Credential Profiles
    .
  2. On the MIP Credential Profiles page, do one of the following:
    • To authorize
      Symantec Data Loss Prevention
      to classify documents that contain sensitive information and to synchronize labels with the MIP service, under
      Microsoft Information Protection Classification Credential Profile
      , click
      Add profile
      .
    • To authorize
      Symantec Data Loss Prevention
      to inspect documents and emails that have been encrypted by MIP, under
      Microsoft Information Protection Decryption Credential Profile
      , click
      Add profile
      .
    Depending on your selection, either the
    Add Classification Credential Profile
    dialog box or the
    Add Decryption Credential Profile
    dialog box is displayed.
  3. In the dialog box, type a name for the profile in the
    Profile Name
    field.
  4. Fill the
    Tenant ID
    ,
    Application ID
    , and
    Application Secret
    (client secret) fields using the information that you copied when you registered an application on the Azure portal.
  5. Click
    Save
    .