Creating an MIP credential profile for agents and on-premises detection servers
The following procedure requires the Server Administrator role.
- In the Enforce Server administration console, navigate toSystem > Settings > MIP Credential Profiles.
- On the MIP Credential Profiles page, do one of the following:
- To authorizeSymantec Data Loss Preventionto classify documents that contain sensitive information and to synchronize labels with the MIP service, underMicrosoft Information Protection Classification Credential Profile, clickAdd profile.
- To authorizeSymantec Data Loss Preventionto inspect documents and emails that have been encrypted by MIP, underMicrosoft Information Protection Decryption Credential Profile, clickAdd profile.
Depending on your selection, either theAdd Classification Credential Profiledialog box or theAdd Decryption Credential Profiledialog box is displayed. - In the dialog box, type a name for the profile in theProfile Namefield.
- Fill theTenant ID,Application ID, andApplication Secret(client secret) fields using the information that you copied when you registered an application on the Azure portal.For more information, see Authorizing Symantec Data Loss Prevention on the Microsoft Azure portal.
- ClickSave.