diff --git a/windows/keep-secure/interactive-logon-display-user-information-when-the-session-is-locked.md b/windows/keep-secure/interactive-logon-display-user-information-when-the-session-is-locked.md
index 094e59fedf..998c7d3a6d 100644
--- a/windows/keep-secure/interactive-logon-display-user-information-when-the-session-is-locked.md
+++ b/windows/keep-secure/interactive-logon-display-user-information-when-the-session-is-locked.md
@@ -2,91 +2,98 @@
title: Interactive logon Display user information when the session is locked (Windows 10)
description: Describes the best practices, location, values, and security considerations for the Interactive logon Display user information when the session is locked security policy setting.
ms.assetid: 9146aa3d-9b2f-47ba-ac03-ff43efb10530
-ms.pagetype: security
ms.prod: W10
ms.mktglfcycl: deploy
ms.sitesec: library
+ms.pagetype: security
author: brianlic-msft
---
+
# Interactive logon: Display user information when the session is locked
+
**Applies to**
- Windows 10
+
Describes the best practices, location, values, and security considerations for the **Interactive logon: Display user information when the session is locked** security policy setting.
+
## Reference
When a session is locked in a Windows operating system (meaning the user at the computer pressed CTRL+ALT+DEL and the Secure Desktop is displayed), user information is displayed. By default, this information is in the form of **<user name> is logged on**. The displayed user name is the user’s full name as set on the Properties page for that user. These settings do not apply to the logon tiles, which are displayed on the desktop after using the **Switch User** feature. The information that is displayed can be changed to meet your security requirements using the following possible values.
+
### Possible values
+
- **User display name, domain and user names**
+
If this is a local logon, the user’s full name is displayed on the Secure Desktop. If it is a domain logon, the user’s domain and user’s account name is displayed.
+
- **User display name only**
+
The name of the user who locked the session is displayed on the Secure Desktop as the user’s full name.
+
- **Do not display user information**
+
No names are displayed on the Secure Desktop, but user’s full names will be displayed on the **Switch user** desktop.
+
- Blank.
+
Default setting. This translates to “Not defined,” but it will display the user’s full name in the same manner as the **User display name, domain and user names** option. When an option is set, you cannot reset this policy to blank, or not defined.
+
### Best practices
+
Your implementation of this policy depends on your security requirements for displayed logon information. If you have devices that store sensitive data, with monitors displayed in unsecured locations, or if you have computers with sensitive data that are remotely accessed, revealing logged on user’s full names or domain account names might contradict your overall security policy.
+
Depending on your security policy, you might also want to enable the [Interactive logon: Do not display last user name](interactive-logon-do-not-display-last-user-name.md) policy, which will prevent the Windows operating system from displaying the logon name and logon tile of the last user to logon.
+
### Location
+
Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options
+
### Default values
-
-
-
-
-
-
-
-
-
-
-Default domain policy |
-Not defined |
-
-
-Default domain controller policy |
-Not defined |
-
-
-Stand-alone server default settings |
-Not defined |
-
-
-Domain controller effective default settings |
-User display name, domain and user names |
-
-
-Member server effective default settings |
-User display name, domain and user names |
-
-
-Effective GPO default settings on client computers |
-User display name, domain and user names |
-
-
-
+
+| Server type or Group Policy object (GPO) | Default value |
+| - | - |
+| Default domain policy| Not defined|
+| Default domain controller policy | Not defined|
+| Stand-alone server default settings | Not defined|
+| Domain controller effective default settings | **User display name, domain and user names**|
+| Member server effective default settings | **User display name, domain and user names**|
+| Effective GPO default settings on client computers | **User display name, domain and user names**|
## Policy management
+
This section describes features and tools that are available to help you manage this policy.
+
### Restart requirement
+
None. Changes to this policy become effective without a device restart when they are saved locally or distributed through Group Policy.
+
### Policy conflict considerations
+
None
+
### Group Policy
+
This policy setting can be configured by using the Group Policy Management Console (GPMC) to be distributed through Group Policy Objects (GPOs). If this policy is not contained in a distributed GPO, this policy can be configured on the local computer by using the Local Security Policy snap-in.
+
## Security considerations
+
This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation.
+
### Vulnerability
+
When a computer displays the Secure Desktop in an unsecured area, certain user information can be readily available to anyone looking at the monitor, either physically or through a remote connection. The displayed user information could include the domain user account name or the full name of the user who locked the session or who had logged on last.
+
### Countermeasure
+
Enabling this policy setting allows the operating system to hide certain user information from being displayed on the Secure Desktop (after the device has been booted or when the session has been locked by using CTRL+ALT+DEL). However, user information is displayed if the **Switch user** feature is used so that the logon tiles are displayed for each logged on user.
+
You might also want to enable the [Interactive logon: Do not display last user name](interactive-logon-do-not-display-last-user-name.md) policy, which will prevent the Windows operating system from displaying the logon name and logon tile of the last user to logon.
+
### Potential impact
+
If you do not enable this policy, the effect will be the same as enabling the policy and selecting the **User display name, domain and user names** option.
+
If the policy is enabled and set to **Do not display user information**, an observer cannot see who is logged onto the Secure Desktop, but the logon tile is still present if the [Interactive logon: Do not display last user name](interactive-logon-do-not-display-last-user-name.md) policy is not enabled. Depending on how the logon tiles are configured, they could provide visual clues as to who is logged on. In addition, if the Interactive logon: Do not display last user name policy is not enabled, then the **Switch user** feature will show user information.
+
## Related topics
-[Security Options](security-options.md)
-
-
+
+- [Security Options](security-options.md)
diff --git a/windows/keep-secure/interactive-logon-do-not-display-last-user-name.md b/windows/keep-secure/interactive-logon-do-not-display-last-user-name.md
index 65a5067ae3..945989b859 100644
--- a/windows/keep-secure/interactive-logon-do-not-display-last-user-name.md
+++ b/windows/keep-secure/interactive-logon-do-not-display-last-user-name.md
@@ -2,86 +2,87 @@
title: Interactive logon Do not display last user name (Windows 10)
description: Describes the best practices, location, values, and security considerations for the Interactive logon Do not display last user name security policy setting.
ms.assetid: 98b24b03-95fe-4edc-8e97-cbdaa8e314fd
-ms.pagetype: security
ms.prod: W10
ms.mktglfcycl: deploy
ms.sitesec: library
+ms.pagetype: security
author: brianlic-msft
---
+
# Interactive logon: Do not display last user name
+
**Applies to**
- Windows 10
+
Describes the best practices, location, values, and security considerations for the **Interactive logon: Do not display last user name** security policy setting.
+
## Reference
+
This security policy setting determines whether the name of the last user to log on to the device is displayed on the Secure Desktop.
+
If this policy is enabled, the full name of the last user to successfully log on is not displayed on the Secure Desktop, nor is the user’s logon tile displayed. Additionally, if the **Switch user** feature is used, the full name and logon tile are not displayed. The logon screen requests a qualified domain account name (or local user name) and password.
+
If this policy is disabled, the full name of the last user to log on is displayed, and the user’s logon tile is displayed. This behavior is the same when the **Switch user** feature is used.
+
### Possible values
+
- Enabled
- Disabled
- Not defined
+
### Best practices
+
Your implementation of this policy depends on your security requirements for displayed logon information. If you have devices that store sensitive data, with monitors displayed in unsecured locations, or if you have devices with sensitive data that are remotely accessed, revealing logged on user’s full names or domain account names might contradict your overall security policy.
+
Depending on your security policy, you might also want to enable the [Interactive logon: Display user information when the session is locked](interactive-logon-display-user-information-when-the-session-is-locked.md) policy, which will prevent the Windows operating system from displaying the logon name when the session is locked or started.
+
### Location
+
Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options
+
### Default values
-
-
-
-
-
-
-
-
-
-
-Default domain policy |
-Disabled |
-
-
-Default domain controller policy |
-Disabled |
-
-
-Stand-alone server default settings |
-Disabled |
-
-
-Domain controller effective default settings |
-Disabled |
-
-
-Member server effective default settings |
-Disabled |
-
-
-Effective GPO default settings on client computers |
-Disabled |
-
-
-
+
+| Server type or Group Policy object (GPO) | Default value|
+| - | - |
+| Default domain policy| Disabled|
+| Default domain controller policy| Disabled|
+| Stand-alone server default settings | Disabled|
+| Domain controller effective default settings | Disabled|
+| Member server effective default settings | Disabled|
+| Effective GPO default settings on client computers | Disabled|
## Policy management
+
This section describes features and tools that are available to help you manage this policy.
+
### Restart requirement
+
None. Changes to this policy become effective without a device restart when they are saved locally or distributed through Group Policy.
+
### Policy conflict considerations
+
None.
+
### Group Policy
+
This policy setting can be configured by using the Group Policy Management Console (GPMC) to be distributed through Group Policy Objects (GPOs). If this policy is not contained in a distributed GPO, this policy can be configured on the local computer by using the Local Security Policy snap-in.
+
## Security considerations
+
This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation.
+
### Vulnerability
+
An attacker with access to the console (for example, someone with physical access or someone who can connect to the device through Remote Desktop Session Host) could view the name of the last user who logged on. The attacker could then try to guess the password, use a dictionary, or use a brute-force attack to try to log on.
+
### Countermeasure
+
Enable the **Interactive logon: Do not display last user name** setting.
+
### Potential impact
+
Users must always type their user names and passwords when they log on locally or to the domain. The logon tiles of all logged on users are not displayed.
+
## Related topics
-[Security Options](security-options.md)
-
-
+
+- [Security Options](security-options.md)
diff --git a/windows/keep-secure/interactive-logon-do-not-require-ctrl-alt-del.md b/windows/keep-secure/interactive-logon-do-not-require-ctrl-alt-del.md
index 19bd4de7a1..34a748af68 100644
--- a/windows/keep-secure/interactive-logon-do-not-require-ctrl-alt-del.md
+++ b/windows/keep-secure/interactive-logon-do-not-require-ctrl-alt-del.md
@@ -2,89 +2,92 @@
title: Interactive logon Do not require CTRL+ALT+DEL (Windows 10)
description: Describes the best practices, location, values, and security considerations for the Interactive logon Do not require CTRL+ALT+DEL security policy setting.
ms.assetid: 04e2c000-2eb2-4d4b-8179-1e2cb4793e18
-ms.pagetype: security
ms.prod: W10
ms.mktglfcycl: deploy
ms.sitesec: library
+ms.pagetype: security
author: brianlic-msft
---
# Interactive logon: Do not require CTRL+ALT+DEL
+
**Applies to**
- Windows 10
+
Describes the best practices, location, values, and security considerations for the **Interactive logon: Do not require CTRL+ALT+DEL** security policy setting.
+
## Reference
+
This security setting determines whether pressing CTRL+ALT+DEL is required before a user can log on.
+
If this policy setting is enabled on a device, a user is not required to press CTRL+ALT+DEL to log on. Not having to press CTRL+ALT+DEL leaves users susceptible to attacks that attempt to intercept the users' passwords. Requiring CTRL+ALT+DEL before users log on ensures that users are communicating by means of a trusted path when entering their passwords.
+
If this policy is disabled, any user is required to press CTRL+ALT+DEL before logging on to the Windows operating system (unless they are using a smart card for logon).
+
Microsoft developed this feature to make it easier for users with certain types of physical impairments to log on to device running the Windows operating system; however, not having to press the CTRL+ALT+DELETE key combination leaves users susceptible to attacks that attempt to intercept their passwords. Requiring CTRL+ALT+DELETE before users log on ensures that users are communicating by means of a trusted path when entering their passwords.
+
A malicious user might install malware that looks like the standard logon dialog box for the Windows operating system, and capture a user's password. The attacker can then log on to the compromised account with whatever level of user rights that user has.
+
### Possible values
+
- Enabled
- Disabled
- Not defined
+
### Best practices
+
- It is advisable to set **Disable CTRL+ALT+DEL requirement for logon** to **Disabled**. Unless they are using a smart card to log on, users will have to simultaneously press three keys before the logon dialog box appears.
+
### Location
+
Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options
+
### Default values
+
The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page.
-
-
-
-
-
-
-
-
-
-
-Default Domain Policy |
-Not defined |
-
-
-Default Domain Controller Policy |
-Not defined |
-
-
-Stand-Alone Server Default Settings |
-Disabled |
-
-
-DC Effective Default Settings |
-Disabled |
-
-
-Member Server Effective Default Settings |
-Disabled |
-
-
-Client Computer Effective Default Settings |
-Disabled |
-
-
-
+
+| Server type or GPO | Default value |
+| - | - |
+| Default Domain Policy | Not defined|
+| Default Domain Controller Policy | Not defined|
+| Stand-Alone Server Default Settings | Disabled|
+| DC Effective Default Settings | Disabled|
+| Member Server Effective Default Settings | Disabled|
+| Client Computer Effective Default Settings | Disabled|
## Policy management
+
This section describes features and tools that are available to help you manage this policy.
+
### Restart requirement
+
None. Changes to this policy become effective without a device restart when they are saved locally or distributed through Group Policy.
+
### Policy conflict considerations
+
Beginning with Windows Server 2008 and Windows Vista, the CTRL+ALT+DELETE key combination is required to authenticate if this policy is disabled.
+
### Group Policy
+
This policy setting can be configured by using the Group Policy Management Console (GPMC) to be distributed through Group Policy Objects (GPOs). If this policy is not contained in a distributed GPO, this policy can be configured on the local computer by using the Local Security Policy snap-in.
+
## Security considerations
+
This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation.
+
### Vulnerability
+
This setting makes it easier for users with certain types of physical impairments to log on to devices that run the Windows operating system. However, if users are not required to press CTRL+ALT+DEL, they are susceptible to attacks that attempt to intercept their passwords. If CTRL+ALT+DEL is required before logon, user passwords are communicated by means of a trusted path.
+
If this setting is enabled, an attacker could install malware that looks like the standard logon dialog box in the Windows operating system, and capture the user's password. The attacker would then be able to log on to the compromised account with whatever level of privilege that user has.
+
### Countermeasure
+
Disable the **Interactive logon: Do not require CTRL+ALT+DEL** setting.
+
### Potential impact
+
Unless they use a smart card to log on, users must simultaneously press the three keys before the logon dialog box is displayed.
+
## Related topics
-[Security Options](security-options.md)
-
-
+
+- [Security Options](security-options.md)
diff --git a/windows/keep-secure/interactive-logon-machine-account-lockout-threshold.md b/windows/keep-secure/interactive-logon-machine-account-lockout-threshold.md
index baa13fc5c0..3e7824eedb 100644
--- a/windows/keep-secure/interactive-logon-machine-account-lockout-threshold.md
+++ b/windows/keep-secure/interactive-logon-machine-account-lockout-threshold.md
@@ -2,84 +2,85 @@
title: Interactive logon Machine account lockout threshold (Windows 10)
description: Describes the best practices, location, values, management, and security considerations for the Interactive logon Machine account lockout threshold security policy setting.
ms.assetid: ebbd8e22-2611-4ebe-9db9-d49344e631e4
-ms.pagetype: security
ms.prod: W10
ms.mktglfcycl: deploy
ms.sitesec: library
+ms.pagetype: security
author: brianlic-msft
---
+
# Interactive logon: Machine account lockout threshold
+
**Applies to**
- Windows 10
+
Describes the best practices, location, values, management, and security considerations for the **Interactive logon: Machine account lockout threshold** security policy setting.
+
## Reference
+
Beginning with Windows Server 2012 and Windows 8, the **Interactive logon: Machine account threshold** security policy setting enforces the lockout policy on those computers that have BitLocker enabled to protect operating system volumes.
+
The security setting allows you to set a threshold for the number of failed logon attempts that causes the device to be locked by using BitLocker. This means, if the specified maximum number of failed logon attempts is exceeded, the device will invalidate the Trusted Platform Module (TPM) protector and any other protector except the 48-digit recovery password, and then reboot. During Device Lockout mode, the computer or device only boots into the touch-enabled Windows Recovery Environment (WinRE) until an authorized user enters the recovery password to restore full access.
+
Failed password attempts on workstations or member servers that have been locked by using either Ctrl+Alt+Delete or password-protected screen savers count as failed logon attempts.
+
### Possible values
+
You can set the **invalid logon attempts** value between 1 and 999. Values from 1 to 3 are interpreted as 4. If you set the value to 0, or leave blank, the computer or device will never be locked as a result of this policy setting.
-### Best practices
+
+### Best practices
+
Use this policy setting in conjunction with your other failed account logon attempts policy. For example, if the [Account lockout threshold](account-lockout-threshold.md) policy setting is set at 4, then setting **Interactive logon: Machine account lockout threshold** at 6 allows the user to restore access to resources without having to restore access to the device resulting from a BitLocker lock out.
+
### Location
+
Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options
+
### Default values
+
The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page.
-
-
-
-
-
-
-
-
-
-
-Default Domain Policy |
-Not defined |
-
-
-Default Domain Controller Policy |
-Not defined |
-
-
-Stand-Alone Server Default Settings |
-Disabled |
-
-
-DC Effective Default Settings |
-Disabled |
-
-
-Member Server Effective Default Settings |
-Disabled |
-
-
-Client Computer Effective Default Settings |
-Disabled |
-
-
-
+
+| Server type or GPO | Default value |
+| - | - |
+| Default Domain Policy| Not defined|
+| Default Domain Controller Policy | Not defined |
+| Stand-Alone Server Default Settings| Disabled|
+| DC Effective Default Settings | Disabled|
+| Member Server Effective Default Settings | Disabled |
+| Client Computer Effective Default Settings | Disabled|
## Policy management
+
This section describes features and tools that are available to help you manage this policy.
+
### Restart requirement
+
A restart is required for changes to this policy to become effective when they are saved locally or distributed through Group Policy.
+
### Group Policy
+
Because this policy setting was introduced in Windows Server 2012 and Windows 8, it can only be set locally on those devices that contain this policy setting, but it can be set and distributed through Group Policy to any computer running the Windows operating system that supports Group Policy and is BitLocker-enabled.
+
When setting this policy, consider the [Account lockout threshold](account-lockout-threshold.md) policy setting, which determines the number of failed logon attempts that will cause a user account to be locked out.
+
## Security considerations
+
This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation.
+
### Vulnerability
+
This policy setting helps protect a BitLocker-encrypted device from attackers attempting to brute-force guess the Windows sign-in password. If not set, then attackers can attempt innumerable passwords, if no other account protection mechanisms are in place.
+
### Countermeasure
+
Use this policy setting in conjunction with your other failed account logon attempts policy. For example, if the [Account lockout threshold](account-lockout-threshold.md) policy setting is set at 4, then setting **Interactive logon: Machine account lockout threshold** at 6 allows the user to restore access to resources without having to restore access to the device resulting from a BitLocker lock out.
+
### Potential impact
+
If not set, the device could be compromised by an attacker using brute-force password cracking software.
+
If set too low, productivity might be hindered because users who become locked out will be unable to access the device without providing the 48-digit BitLocker recovery password.
+
## Related topics
-[Security Options](security-options.md)
-
-
+
+- [Security Options](security-options.md)
diff --git a/windows/keep-secure/interactive-logon-machine-inactivity-limit.md b/windows/keep-secure/interactive-logon-machine-inactivity-limit.md
index 969511b2b4..9fb56662fb 100644
--- a/windows/keep-secure/interactive-logon-machine-inactivity-limit.md
+++ b/windows/keep-secure/interactive-logon-machine-inactivity-limit.md
@@ -2,81 +2,79 @@
title: Interactive logon Machine inactivity limit (Windows 10)
description: Describes the best practices, location, values, management, and security considerations for the Interactive logon Machine inactivity limit security policy setting.
ms.assetid: 7065b4a9-0d52-41d5-afc4-5aedfc4162b5
-ms.pagetype: security
ms.prod: W10
ms.mktglfcycl: deploy
ms.sitesec: library
+ms.pagetype: security
author: brianlic-msft
---
+
# Interactive logon: Machine inactivity limit
+
**Applies to**
- Windows 10
+
Describes the best practices, location, values, management, and security considerations for the **Interactive logon: Machine inactivity limit** security policy setting.
+
## Reference
+
Beginning with Windows Server 2012 and Windows 8, Windows detects user-input inactivity of a sign-in (logon) session by using the security policy setting **Interactive logon: Machine inactivity limit**. If the amount of inactive time exceeds the inactivity limit set by this policy, then the user’s session locks by invoking the screen saver. This policy setting allows you to control the locking time by using Group Policy.
+
### Possible values
+
The automatic lock of the device is set in elapsed seconds of inactivity, which can range from zero (0) to 599,940 seconds (166.65 hours).
+
If no value (blank) or zero (0) is present in the **Machine will be locked after** input field, then the policy setting is disabled and no action is taken on user-input inactivity for the session.
+
### Best practices
+
Set the time for elapsed user-input inactivity based on the device’s usage and location requirements. For example, if the device or device is in a public area, you might want to have the device automatically lock after a short period of inactivity to prevent unauthorized access. However, if the device is used by an individual or group of trusted individuals, such as in a restricted manufacturing area, automatically locking the device might hinder productivity.
+
### Location
+
Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options
+
### Default values
+
The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page.
-
-
-
-
-
-
-
-
-
-
-Default Domain Policy |
-Not defined |
-
-
-Default Domain Controller Policy |
-Not defined |
-
-
-Stand-Alone Server Default Settings |
-Disabled |
-
-
-DC Effective Default Settings |
-Disabled |
-
-
-Member Server Effective Default Settings |
-Disabled |
-
-
-Client Computer Effective Default Settings |
-Disabled |
-
-
-
+
+| Server type or GPO | Default value |
+| - | - |
+| Default Domain Policy| Not defined|
+| Default Domain Controller Policy | Not defined|
+| Stand-Alone Server Default Settings | Disabled|
+| DC Effective Default Settings | Disabled|
+| Member Server Effective Default Settings | Disabled|
+| Client Computer Effective Default Settings | Disabled|
## Policy management
+
This section describes features and tools that are available to help you manage this policy.
+
### Restart requirement
+
Restart is required for changes to this policy to become effective when they are saved locally or distributed through Group Policy.
+
### Group Policy
+
Because this policy setting was introduced in Windows Server 2012 and Windows 8, it can only be set locally on those computers that contain this policy setting, but it can be set and distributed through Group Policy to any computer running the Windows operating system that supports Group Policy.
+
## Security considerations
+
This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation.
+
### Vulnerability
+
This policy setting helps you prevent unauthorized access to devices under your control when the currently signed-in user leaves without deliberately locking the desktop. In versions earlier than Windows Server 2012 and Windows 8, the desktop-locking mechanism was set on individual computers in Personalization in Control Panel.
+
### Countermeasure
+
Set the time for elapsed user-input inactivity time by using the security policy setting **Interactive logon: Machine inactivity limit** based on the device’s usage and location requirements.
+
### Potential impact
+
This security policy setting can limit unauthorized access to unsecured computers; however, that requirement must be balanced with the productivity requirements of the intended user.
+
## Related topics
-[Security Options](security-options.md)
-
-
+
+- [Security Options](security-options.md)
diff --git a/windows/keep-secure/interactive-logon-message-text-for-users-attempting-to-log-on.md b/windows/keep-secure/interactive-logon-message-text-for-users-attempting-to-log-on.md
index b8962d626a..2277884c62 100644
--- a/windows/keep-secure/interactive-logon-message-text-for-users-attempting-to-log-on.md
+++ b/windows/keep-secure/interactive-logon-message-text-for-users-attempting-to-log-on.md
@@ -2,94 +2,94 @@
title: Interactive logon Message text for users attempting to log on (Windows 10)
description: Describes the best practices, location, values, management, and security considerations for the Interactive logon Message text for users attempting to log on security policy setting.
ms.assetid: fcfe8a6d-ca65-4403-b9e6-2fa017a31c2e
-ms.pagetype: security
ms.prod: W10
ms.mktglfcycl: deploy
ms.sitesec: library
+ms.pagetype: security
author: brianlic-msft
---
+
# Interactive logon: Message text for users attempting to log on
+
**Applies to**
- Windows 10
+
Describes the best practices, location, values, management, and security considerations for the **Interactive logon: Message text for users attempting to log on** security policy setting.
+
## Reference
-The **Interactive logon: Message text for users attempting to log on** and [Interactive logon: Message title for users attempting to log on](interactive-logon-message-title-for-users-attempting-to-log-on.md) policy settings are closely related. **Interactive logon: Message text for users attempting to log on** specifies a text message to be displayed to users when they log on. Interactive logon: Message title for users attempting to log on specifies a title to appear in the title bar of the window that contains the text message. This text is often used for legal reasons—for example, to warn users about the ramifications of misusing company information, or to warn them that their actions might be audited.
+
+The **Interactive logon: Message text for users attempting to log on** and [Interactive logon: Message title for users attempting to log on](interactive-logon-message-title-for-users-attempting-to-log-on.md) policy settings are closely related. **Interactive logon: Message text for users attempting to log on** specifies a text message to be displayed to users when they log on. Interactive logon: Message title for users attempting to log on specifies a title to appear in the title bar of the window that contains the text message. This text is often used for legal reasons—for example, to warn
+users about the ramifications of misusing company information, or to warn them that their actions might be audited.
+
Not using this warning-message policy setting leaves your organization legally vulnerable to trespassers who unlawfully penetrate your network. Legal precedents have established that organizations that display warnings to users who connect to their servers over a network have a higher rate of successfully prosecuting trespassers.
+
When these policy settings are configured, users will see a dialog box before they can log on to the server console.
+
### Possible values
+
The possible values for this setting are:
+
- User-defined text
- Not defined
+
### Best practices
+
- It is advisable to set **Interactive logon: Message text for users attempting to log on** to a value similar to one of the following:
+
1. IT IS AN OFFENSE TO CONTINUE WITHOUT PROPER AUTHORIZATION.
2. This system is restricted to authorized users. Individuals who attempt unauthorized access will be prosecuted. If you are unauthorized, terminate access now. Click OK to indicate your acceptance of this information.
-**Important**
-Any warning that you display in the title or text should be approved by representatives from your organization's legal and human resources departments.
+>**Important:** Any warning that you display in the title or text should be approved by representatives from your organization's legal and human resources departments.
### Location
+
Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options
+
### Default values
+
The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page.
-
-
-
-
-
-
-
-
-
-
-Default Domain Policy |
-Not defined |
-
-
-Default Domain Controller Policy |
-Not defined |
-
-
-Stand-Alone Server Default Settings |
-Not defined |
-
-
-DC Effective Default Settings |
-Not defined |
-
-
-Member Server Effective Default Settings |
-Not defined |
-
-
-Client Computer Effective Default Settings |
-Not defined |
-
-
-
+
+| Server type or GPO | Default value |
+| - | - |
+| Default Domain Policy| Not defined|
+| Default Domain Controller Policy | Not defined|
+| Stand-Alone Server Default Settings | Not defined|
+| DC Effective Default Settings | Not defined|
+| Member Server Effective Default Settings | Not defined|
+| Client Computer Effective Default Settings | Not defined|
## Policy management
+
This section describes different requirements to help you manage this policy.
+
### Restart requirement
+
None. Changes to this policy become effective without a device restart when they are saved locally or distributed through Group Policy.
+
## Security considerations
+
This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation.
+
There are two policy settings that relate to logon displays:
+
- **Interactive logon: Message text for users attempting to log on**
- [Interactive logon: Message title for users attempting to log on](interactive-logon-message-title-for-users-attempting-to-log-on.md)
+
The first policy setting specifies a text message that displays to users when they log on, and the second policy setting specifies a title for the title bar of the text message window. Many organizations use this text for legal purposes; for example, to warn users about the ramifications of misuse of company information, or to warn them that their actions may be audited.
+
### Vulnerability
+
Users often do not understand the importance of security practices. However, the display of a warning message before logon may help prevent an attack by warning malicious or uninformed users about the consequences of their misconduct before it happens. It may also help reinforce corporate policies by notifying employees of appropriate policies during the logon process.
+
### Countermeasure
+
Configure the **Interactive logon: Message text for users attempting to log on** and [Interactive logon: Message title for users attempting to log on](interactive-logon-message-title-for-users-attempting-to-log-on.md) settings to an appropriate value for your organization.
-**Note**
-Any warning message that displays should be approved by your organization's legal and human resources representatives.
+
+>**Note:** Any warning message that displays should be approved by your organization's legal and human resources representatives.
### Potential impact
+
Users see a message in a dialog box before they can log on to the server console.
+
## Related topics
-[Security Options](security-options.md)
-
-
+
+- [Security Options](security-options.md)
diff --git a/windows/keep-secure/interactive-logon-message-title-for-users-attempting-to-log-on.md b/windows/keep-secure/interactive-logon-message-title-for-users-attempting-to-log-on.md
index dcc618ac81..7e5719c49b 100644
--- a/windows/keep-secure/interactive-logon-message-title-for-users-attempting-to-log-on.md
+++ b/windows/keep-secure/interactive-logon-message-title-for-users-attempting-to-log-on.md
@@ -2,93 +2,97 @@
title: Interactive logon Message title for users attempting to log on (Windows 10)
description: Describes the best practices, location, values, policy management and security considerations for the Interactive logon Message title for users attempting to log on security policy setting.
ms.assetid: f2596470-4cc0-4ef1-849c-bef9dc3533c6
-ms.pagetype: security
ms.prod: W10
ms.mktglfcycl: deploy
ms.sitesec: library
+ms.pagetype: security
author: brianlic-msft
---
+
# Interactive logon: Message title for users attempting to log on
+
**Applies to**
- Windows 10
+
Describes the best practices, location, values, policy management and security considerations for the **Interactive logon: Message title for users attempting to log on** security policy setting.
+
## Reference
+
This security setting allows you to specify a title that appears in the title bar of the window that contains the **Interactive logon: Message title for users attempting to log on**. This text is often used for legal reasons—for example, to warn users about the ramifications of misusing company information, or to warn them that their actions might be audited.
+
The **Interactive logon: Message title for users attempting to log on** and [Interactive logon: Message text for users attempting to log on](interactive-logon-message-text-for-users-attempting-to-log-on.md) policy settings are closely related. **Interactive logon: Message title for users attempting to log on** specifies a message title to be displayed to users when they log on.
+
Not using this warning-message policy setting leaves your organization legally vulnerable to trespassers who unlawfully penetrate your network. Legal precedents have established that organizations that display warnings to users who connect to their servers over a network have a higher rate of successfully prosecuting trespassers.
+
When these policy settings are configured, users will see a dialog box before they can log on to the server console.
+
### Possible values
+
- *User-defined title*
- Not defined
+
### Best practices
+
1. It is advisable to set **Interactive logon: Message title for users attempting to log on** to a value similar to one the following:
+
- RESTRICTED SYSTEM
+
or
+
- WARNING: This system is restricted to authorized users.
+
2. Set the policy [Interactive logon: Message text for users attempting to log on](interactive-logon-message-text-for-users-attempting-to-log-on.md) to reinforce the meaning of the message’s title.
+
### Location
+
Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options
+
### Default values
+
The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page.
-
-
-
-
-
-
-
-
-
-
-Default Domain Policy |
-Not defined |
-
-
-Default Domain Controller Policy |
-Not defined |
-
-
-Stand-Alone Server Default Settings |
-Not defined |
-
-
-DC Effective Default Settings |
-Not defined |
-
-
-Member Server Effective Default Settings |
-Not defined |
-
-
-Client Computer Effective Default Settings |
-Not defined |
-
-
-
+
+|Server type or GPO | Default value|
+| - | - |
+| Default Domain Policy| Not defined|
+| Default Domain Controller Policy | Not defined|
+| Stand-Alone Server Default Settings | Not defined|
+| DC Effective Default Settings | Not defined|
+| Member Server Effective Default Settings | Not defined|
+| Client Computer Effective Default Settings | Not defined|
## Policy management
+
This section describes features and tools that are available to help you manage this policy.
+
### Restart requirement
+
None. Changes to this policy become effective without a device restart when they are saved locally or distributed through Group Policy.
+
## Security considerations
+
This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation.
+
There are two policy settings that relate to logon displays:
+
- [Interactive logon: Message text for users attempting to log on](interactive-logon-message-text-for-users-attempting-to-log-on.md)
- **Interactive logon: Message title for users attempting to log on**
+
The first policy setting specifies a text message that displays to users when they log on, and the second policy setting specifies a title for the title bar of the text message window. Many organizations use this text for legal purposes; for example, to warn users about the ramifications of misuse of company information, or to warn them that their actions may be audited.
+
### Vulnerability
+
Users often do not understand the importance of security practices. However, the display of a warning message with an appropriate title before logon may help prevent an attack by warning malicious or uninformed users about the consequences of their misconduct before it happens. It may also help reinforce corporate policies by notifying employees of appropriate policies during the logon process.
+
### Countermeasure
+
Configure the [Interactive logon: Message text for users attempting to log on](interactive-logon-message-text-for-users-attempting-to-log-on.md) and **Interactive logon: Message title for users attempting to log on** settings to an appropriate value for your organization.
-**Note**
-Any warning message that displays should be approved by your organization's legal and human resources representatives.
+
+>**Note:** Any warning message that displays should be approved by your organization's legal and human resources representatives.
### Potential impact
+
Users see a message in a dialog box before they can log on to the server console.
+
## Related topics
-[Security Options](security-options.md)
-
-
+
+- [Security Options](security-options.md)
diff --git a/windows/keep-secure/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md b/windows/keep-secure/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md
index 14605564d2..651f08183b 100644
--- a/windows/keep-secure/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md
+++ b/windows/keep-secure/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md
@@ -2,91 +2,100 @@
title: Interactive logon Number of previous logons to cache (in case domain controller is not available) (Windows 10)
description: Describes the best practices, location, values, policy management and security considerations for the Interactive logon Number of previous logons to cache (in case domain controller is not available) security policy setting.
ms.assetid: 660e925e-cc3e-4098-a41e-eb8db8062d8d
-ms.pagetype: security
ms.prod: W10
ms.mktglfcycl: deploy
ms.sitesec: library
+ms.pagetype: security
author: brianlic-msft
---
+
# Interactive logon: Number of previous logons to cache (in case domain controller is not available)
+
**Applies to**
- Windows 10
+
Describes the best practices, location, values, policy management and security considerations for the **Interactive logon: Number of previous logons to cache (in case domain controller is not available)** security policy setting.
+
## Reference
+
The **Interactive logon: Number of previous logons to cache (in case domain controller is not available**) policy setting determines whether a user can log on to a Windows domain by using cached account information. Logon information for domain accounts can be cached locally so that, if a domain controller cannot be contacted on subsequent logons, a user can still log on. This policy setting determines the number of unique users whose logon information is cached locally.
+
If a domain controller is unavailable and a user's logon information is cached, the user is prompted with the following message:
+
A domain controller for your domain could not be contacted. You have been logged on using cached account information. Changes to your profile since you last logged on might not be available.
+
If a domain controller is unavailable and a user's logon information is not cached, the user is prompted with this message:
+
The system cannot log you on now because the domain *DOMAIN NAME* is not available.
+
The value of this policy setting indicates the number of users whose logon information the server caches locally. If the value is 10, the server caches logon information for 10 users. When an eleventh user logs on to the device, the server overwrites the oldest cached logon session.
-Users who access the server console will have their logon credentials cached on that server. A malicious user who is able to access the file system of the server can locate this cached information and use a brute-force attack to determine user passwords. Windows mitigates this type of attack by encrypting the information and keeping the cached credentials in the system's registries, which are spread across numerous physical locations.
+
+Users who access the server console will have their logon credentials cached on that server. A malicious user who is able to access the file system of the server can locate this cached information and use a brute-force attack to determine user passwords. Windows mitigates this type of attack by
+encrypting the information and keeping the cached credentials in the system's registries, which are spread across numerous physical locations.
+
### Possible values
+
- A user-defined number from 0 through 50
- Not defined
+
### Best practices
+
It is advisable to set **Interactive logon: Number of previous logons to cache (in case domain controller is not available)** to 0. Setting this value to 0 disables the local caching of logon information. Additional countermeasures include enforcing strong password policies and physically securing the computers. If the value is set to 0, users will be unable to log on to any computers if there is no domain controller available to authenticate them. Organizations might want to set **Interactive logon: Number of previous logons to cache (in case domain controller is not available)** to 2 for end-user systems, especially for mobile users. Setting this value to 2 means that the user's logon information will still be in the cache even if a member of the IT department has recently logged on to their device to perform system maintenance. This way, those users will be able to log on to their devices when they are not connected to the corporate network.
+
### Location
+
Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options
+
### Default values
+
The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page.
-
-
-
-
-
-
-
-
-
-
-Default Domain Policy |
-Not defined |
-
-
-Default Domain Controller Policy |
-Not defined |
-
-
-Stand-Alone Server Default Settings |
-10 logons |
-
-
-DC Effective Default Settings |
-10 logons |
-
-
-Member Server Effective Default Settings |
-10 logons |
-
-
-Client Computer Effective Default Settings |
-10 logons |
-
-
-
+
+| Server type or GPO | Default value |
+| - | - |
+| Default Domain Policy| Not defined|
+| Default Domain Controller Policy | Not defined|
+| Stand-Alone Server Default Settings | 10 logons|
+| DC Effective Default Settings | 10 logons|
+| Member Server Effective Default Settings | 10 logons|
+| Client Computer Effective Default Settings| 10 logons|
## Policy management
+
This section describes features and tools that are available to help you manage this policy.
+
### Restart requirement
+
None. Changes to this policy become effective without a computer restart when they are saved locally or distributed through Group Policy.
+
### Policy conflict considerations
+
None
+
### Group Policy
+
This policy setting can be configured by using the Group Policy Management Console (GPMC) to be distributed through Group Policy Objects (GPOs). If this policy is not contained in a distributed GPO, this policy can be configured on the local computer by using the Local Security Policy snap-in.
+
## Security considerations
+
This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation.
+
### Vulnerability
+
The number that is assigned to this policy setting indicates the number of users whose logon information is cache locally by the servers. If the number is set to 10, the server caches logon information for 10 users. When an eleventh user logs on to the device, the server overwrites the oldest cached logon session.
+
Users who access the server console have their logon credentials cached on that server. An attacker who is able to access the file system of the server could locate this cached information and use a brute force attack to attempt to determine user passwords.
+
To mitigate this type of attack, Windows encrypts the information and obscures its physical location.
+
### Countermeasure
+
Configure the **Interactive logon: Number of previous logons to cache (in case domain controller is not available)** setting to 0, which disables the local caching of logon information. Additional countermeasures include enforcement of strong password policies and physically secure locations for the computers.
+
### Potential impact
-Users cannot log on to any devices if there is no domain controller available to authenticate them. Organizations can configure this value to 2 for end-user computers, especially for mobile users. A configuration value of 2 means that the user's logon information is still in the cache, even if a member of the IT department has recently logged on to the device to perform system maintenance. This method allows users to log on to their computers when they are not connected to the organization's network.
+
+Users cannot log on to any devices if there is no domain controller available to authenticate them. Organizations can configure this value to 2 for end-user computers, especially for mobile users. A configuration value of 2 means that the user's logon information is still in the cache, even if a
+member of the IT department has recently logged on to the device to perform system maintenance. This method allows users to log on to their computers when they are not connected to the organization's network.
+
## Related topics
-[Security Options](security-options.md)
-
-
+
+- [Security Options](security-options.md)
diff --git a/windows/keep-secure/interactive-logon-prompt-user-to-change-password-before-expiration.md b/windows/keep-secure/interactive-logon-prompt-user-to-change-password-before-expiration.md
index f499d1b051..6e08f688d8 100644
--- a/windows/keep-secure/interactive-logon-prompt-user-to-change-password-before-expiration.md
+++ b/windows/keep-secure/interactive-logon-prompt-user-to-change-password-before-expiration.md
@@ -2,85 +2,84 @@
title: Interactive logon Prompt user to change password before expiration (Windows 10)
description: Describes the best practices, location, values, policy management and security considerations for the Interactive logon Prompt user to change password before expiration security policy setting.
ms.assetid: 8fe94781-40f7-4fbe-8cfd-5e116e6833e9
-ms.pagetype: security
ms.prod: W10
ms.mktglfcycl: deploy
ms.sitesec: library
+ms.pagetype: security
author: brianlic-msft
---
+
# Interactive logon: Prompt user to change password before expiration
+
**Applies to**
- Windows 10
+
Describes the best practices, location, values, policy management and security considerations for the **Interactive logon: Prompt user to change password before expiration** security policy setting.
+
## Reference
+
The **Interactive logon: Prompt user to change password before expiration** policy setting determines how many days in advance users are warned that their passwords are about to expire. With this advance warning, the user has time to construct a password that is sufficiently strong.
+
### Possible values
+
- A user-defined number of days from 0 through 999.
- Not defined.
+
### Best practices
+
1. Configure user passwords to expire periodically. Users will need warning that their passwords are going to expire, or they might inadvertently get locked out of the system. This could lead to confusion for users who access the network locally, or make it impossible for users who access the network through dial-up or virtual private network (VPN) connections to log on.
2. Set **Interactive logon: Prompt user to change password before expiration** to 5 days. When their password expiration date is 5 or fewer days away, users will see a dialog box each time they log on to the domain.
3. Do not set the value to 0, which results in displaying the password expiration warning every time the user logs on.
+
### Location
+
Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options
+
### Default values
+
The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page.
-
-
-
-
-
-
-
-
-
-
-Default Domain Policy |
-Not defined |
-
-
-Default Domain Controller Policy |
-Not defined |
-
-
-Stand-Alone Server Default Settings |
-14 days * |
-
-
-DC Effective Default Settings |
-14 days * |
-
-
-Member Server Effective Default Settings |
-14 days * |
-
-
-Client Computer Effective Default Settings |
-14 days * |
-
-
-
+
+| Server type or GPO | Default value |
+| - | - |
+| Default Domain Policy| Not defined|
+| Default Domain Controller Policy | Not defined|
+| Stand-Alone Server Default Settings | 14 days|
+| DC Effective Default Settings | 14 days |
+| Member Server Effective Default Settings| 14 days |
+| Client Computer Effective Default Settings | 14 days|
## Policy management
+
This section describes features and tools that are available to help you manage this policy.
+
### Restart requirement
+
None. Changes to this policy become effective without a device restart when they are saved locally or distributed through Group Policy.
+
### Policy conflict considerations
+
None.
+
### Group Policy
+
This policy setting can be configured by using the Group Policy Management Console (GPMC) to be distributed through Group Policy Objects (GPOs). If this policy is not contained in a distributed GPO, this policy can be configured on the local computer by using the Local Security Policy snap-in.
+
## Security considerations
+
This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation.
+
### Vulnerability
+
If user passwords are configured to expire periodically in your organization, users need to be warned when this is about to happen, or they may be locked out of the device inadvertently when their passwords expire. This condition could lead to confusion for users who access the network locally, or make it impossible for users to access your organization's network through dial-up or virtual private network (VPN) connections.
+
### Countermeasure
+
Configure the **Interactive logon: Prompt user to change password before expiration** setting to 14 days.
+
### Potential impact
+
Users see a dialog-box prompt to change their password each time that they log on to the domain when their password is configured to expire in 14 or fewer days.
+
## Related topics
-[Security Options](security-options.md)
-
-
+
+- [Security Options](security-options.md)
diff --git a/windows/keep-secure/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md b/windows/keep-secure/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md
index 97aa85187c..9660b5770a 100644
--- a/windows/keep-secure/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md
+++ b/windows/keep-secure/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md
@@ -2,87 +2,89 @@
title: Interactive logon Require Domain Controller authentication to unlock workstation (Windows 10)
description: Describes the best practices, location, values, policy management, and security considerations for the Interactive logon Require Domain Controller authentication to unlock workstation security policy setting.
ms.assetid: 97618ed3-e946-47db-a212-b5e7a4fc6ffc
-ms.pagetype: security
ms.prod: W10
ms.mktglfcycl: deploy
ms.sitesec: library
+ms.pagetype: security
author: brianlic-msft
---
+
# Interactive logon: Require Domain Controller authentication to unlock workstation
+
**Applies to**
- Windows 10
+
Describes the best practices, location, values, policy management, and security considerations for the **Interactive logon: Require Domain Controller authentication to unlock workstation** security policy setting.
+
## Reference
+
Unlocking a locked device requires logon information. For domain accounts, the **Interactive logon: Require Domain Controller authentication to unlock workstation** policy setting determines whether it is necessary to contact a domain controller to unlock a device. Enabling this policy setting requires a domain controller to authenticate the domain account that is being used to unlock the device. Disabling this policy setting allows a user to unlock the device without the computer verifying the logon information with a domain controller. However, if [Interactive logon: Number of previous logons to cache (in case domain controller is not available)](interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md) is set to a value greater than zero, the user's cached credentials will be used to unlock the system.
+
The device caches (locally in memory) the credentials of any users who have been authenticated. The device uses these cached credentials to authenticate anyone who attempts to unlock the console.
+
When cached credentials are used, any changes that have recently been made to the account (such as user rights assignments, account lockout, or the account being disabled) are not considered or applied after this authentication process. This means not only that user rights are not updated, but more importantly that disabled accounts are still able to unlock the console of the system.
+
It is advisable to set **Interactive logon: Require Domain Controller authentication to unlock workstation** to Enabled and set [Interactive logon: Number of previous logons to cache (in case domain controller is not available)](interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md) to 0. When the console of a device is locked by a user or automatically by a screen saver time-out, the console can only be unlocked if the user is able to re-authenticate to the domain controller. If no domain controller is available, users cannot unlock their devices.
+
### Possible values
+
- Enabled
- Disabled
- Not defined
+
### Best practices
+
- Set **Interactive logon: Require Domain Controller authentication to unlock workstation** to Enabled and set [Interactive logon: Number of previous logons to cache (in case domain controller is not available)](interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md) to 0. When the console of a device is locked by a user or automatically by a screen saver time-out, the console can only be unlocked if the user is able to re-authenticate to the domain controller. If no domain controller is available, users cannot unlock their devices.
+
### Location
+
Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options
+
### Default values
+
The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page.
-
-
-
-
-
-
-
-
-
-
-Default Domain Policy |
-Not defined |
-
-
-Default Domain Controller Policy |
-Not defined |
-
-
-Stand-Alone Server Default Settings |
-Disabled |
-
-
-DC Effective Default Settings |
-Disabled |
-
-
-Member Server Effective Default Settings |
-Disabled |
-
-
-Client Computer Effective Default Settings |
-Disabled |
-
-
-
+
+| Server type or GPO | Default value |
+| - | - |
+| Default Domain Policy| Not defined|
+| Default Domain Controller Policy | Not defined|
+| Stand-Alone Server Default Settings | Disabled|
+| DC Effective Default Settings | Disabled|
+| Member Server Effective Default Settings | Disabled|
+| Client Computer Effective Default Settings | Disabled|
## Policy management
+
This section describes features and tools that are available to help you manage this policy.
+
### Restart requirement
+
None. Changes to this policy become effective without a device restart when they are saved locally or distributed through Group Policy.
+
### Policy conflict considerations
+
None
+
### Group Policy
+
This policy setting can be configured by using the Group Policy Management Console (GPMC) to be distributed through Group Policy Objects (GPOs). If this policy is not contained in a distributed GPO, this policy can be configured on the local computer by using the Local Security Policy snap-in.
+
## Security considerations
+
This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation.
+
### Vulnerability
+
By default, the device caches locally in memory the credentials of any users who are authenticated. The device uses these cached credentials to authenticate anyone who attempts to unlock the console. When cached credentials are used, any changes that have recently been made to the account—such as user rights assignments, account lockout, or the account being disabled—are not considered or applied after the account is authenticated. User privileges are not updated, and disabled accounts are still able to unlock the console of the device
+
### Countermeasure
+
Configure the **Interactive logon: Require Domain Controller authentication to unlock workstation** setting to Enabled and configure the [Interactive logon: Number of previous logons to cache (in case domain controller is not available)](interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md) setting to 0.
+
### Potential impact
+
When the console on a device is locked by a user or automatically by a screen-saver timeout, the console can be unlocked only if the user can re-authenticate to the domain controller. If no domain controller is available, users cannot unlock their workstations. If you configure the [Interactive logon: Number of previous logons to cache (in case domain controller is not available)](interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md) setting to 0, users whose domain controllers are unavailable (such as mobile or remote users) cannot log on.
+
## Related topics
-[Security Options](security-options.md)
-
-
+
+- [Security Options](security-options.md)
diff --git a/windows/keep-secure/interactive-logon-require-smart-card.md b/windows/keep-secure/interactive-logon-require-smart-card.md
index 417a99a5a3..faf1834204 100644
--- a/windows/keep-secure/interactive-logon-require-smart-card.md
+++ b/windows/keep-secure/interactive-logon-require-smart-card.md
@@ -2,85 +2,86 @@
title: Interactive logon Require smart card (Windows 10)
description: Describes the best practices, location, values, policy management and security considerations for the Interactive logon Require smart card security policy setting.
ms.assetid: c6a8c040-cbc7-472d-8bc5-579ddf3cbd6c
-ms.pagetype: security
ms.prod: W10
ms.mktglfcycl: deploy
ms.sitesec: library
+ms.pagetype: security
author: brianlic-msft
---
+
# Interactive logon: Require smart card
+
**Applies to**
- Windows 10
+
Describes the best practices, location, values, policy management and security considerations for the **Interactive logon: Require smart card** security policy setting.
+
## Reference
+
The **Interactive logon: Require smart card** policy setting requires users to log on to a device by using a smart card.
+
Requiring users to use long, complex passwords for authentication enhances network security, especially if the users must change their passwords regularly. This reduces the chance that a malicious user will be able to guess a user's password through a brute-force attack. Using smart cards rather than passwords for authentication dramatically increases security because, with today's technology, it is nearly impossible for a malicious user to impersonate another user. Smart cards that require personal identification numbers (PINs) provide two-factor authentication: the user who attempts to log on must possess the smart card and know its PIN. A malicious user who captures the authentication traffic between the user's device and the domain controller will find it extremely difficult to decrypt the traffic: even if they do, the next time the user logs on to the network, a new session key will be generated for encrypting traffic between the user and the domain controller.
+
### Possible values
+
- Enabled
- Disabled
- Not defined
+
### Best practices
+
- Set **Interactive logon: Require smart card** to Enabled. All users will have to use smart cards to log on to the network. This means that the organization must have a reliable public key infrastructure (PKI) in place, and provide smart cards and smart card readers for all users.
+
### Location
+
Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options
+
### Default values
+
The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page.
-
-
-
-
-
-
-
-
-
-
-Default Domain Policy |
-Not defined |
-
-
-Default Domain Controller Policy |
-Not defined |
-
-
-Stand-Alone Server Default Settings |
-Disabled |
-
-
-DC Effective Default Settings |
-Disabled |
-
-
-Member Server Effective Default Settings |
-Disabled |
-
-
-Client Computer Effective Default Settings |
-Disabled |
-
-
-
+
+| Server type or GPO | Default value |
+| - | - |
+| Default Domain Policy| Not defined|
+| Default Domain Controller Policy | Not defined|
+| Stand-Alone Server Default Settings | Disabled|
+| DC Effective Default Settings | Disabled|
+| Member Server Effective Default Settings | Disabled|
+| Client Computer Effective Default Settings | Disabled|
## Policy management
+
This section describes features and tools that are available to help you manage this policy.
+
### Restart requirement
+
None. Changes to this policy become effective without a device restart when they are saved locally or distributed through Group Policy.
+
### Policy conflict considerations
+
None.
+
### Group Policy
+
This policy setting can be configured by using the Group Policy Management Console (GPMC) to be distributed through Group Policy Objects (GPOs). If this policy is not contained in a distributed GPO, this policy can be configured on the local computer by using the Local Security Policy snap-in.
+
## Security considerations
+
This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation.
+
### Vulnerability
+
It can be difficult to make users choose strong passwords, and even strong passwords are vulnerable to brute-force attacks if an attacker has sufficient time and computing resources.
+
### Countermeasure
+
For users with access to computers that contain sensitive data, issue smart cards to users and configure the **Interactive logon: Require smart card** setting to Enabled.
+
### Potential impact
-All users of a device with this setting enabled must use smart cards to log on locally. This means that the organization must have a reliable public key infrastructure (PKI) as well as smart cards and smart card readers for these users. These requirements are significant challenges because expertise and resources are required to plan for and deploy these technologies. Active Directory Certificate Services (AD CS) can be used to implement and manage certificates. You can use automatic user and device enrollment and renewal on the client.
+
+All users of a device with this setting enabled must use smart cards to log on locally. This means that the organization must have a reliable public key infrastructure (PKI) as well as smart cards and smart card readers for these users. These requirements are significant challenges because
+expertise and resources are required to plan for and deploy these technologies. Active Directory Certificate Services (AD CS) can be used to implement and manage certificates. You can use automatic user and device enrollment and renewal on the client.
+
## Related topics
-[Security Options](security-options.md)
-
-
+
+- [Security Options](security-options.md)
diff --git a/windows/keep-secure/interactive-logon-smart-card-removal-behavior.md b/windows/keep-secure/interactive-logon-smart-card-removal-behavior.md
index e7daf35333..29eba6fd2b 100644
--- a/windows/keep-secure/interactive-logon-smart-card-removal-behavior.md
+++ b/windows/keep-secure/interactive-logon-smart-card-removal-behavior.md
@@ -2,93 +2,102 @@
title: Interactive logon Smart card removal behavior (Windows 10)
description: Describes the best practices, location, values, policy management and security considerations for the Interactive logon Smart card removal behavior security policy setting.
ms.assetid: 61487820-9d49-4979-b15d-c7e735999460
-ms.pagetype: security
ms.prod: W10
ms.mktglfcycl: deploy
ms.sitesec: library
+ms.pagetype: security
author: brianlic-msft
---
+
# Interactive logon: Smart card removal behavior
+
**Applies to**
- Windows 10
+
Describes the best practices, location, values, policy management and security considerations for the **Interactive logon: Smart card removal behavior** security policy setting.
+
## Reference
+
This policy setting determines what happens when the smart card for a logged-on user is removed from the smart card reader.
+
If smart cards are used for authentication, the device should automatically lock itself when the card is removed—that way, if users forget to manually lock their devices when they are away from them, malicious users cannot gain access.
+
If you select **Force Logoff** in the property sheet for this policy setting, the user is automatically logged off when the smart card is removed. Users will have to reinsert their smart cards and reenter their PINs when they return to their workstations.
+
### Possible values
+
- No Action
- Lock Workstation
+
If you select this, the workstation is locked when the smart card is removed, allowing users to leave the area, take their smart card with them, and still maintain a protected session.
+
- Force Logoff
+
If you select this, the user is automatically logged off when the smart card is removed.
+
- Disconnect if a remote Remote Desktop Services session
+
If you select this, removal of the smart card disconnects the session without logging the user off. This allows the user to insert the smart card and resume the session later, or at another smart card reader-equipped computer, without having to log on again. If the session is local, this policy functions identically to Lock Workstation.
+
- Not Defined
+
### Best practices
+
- Set **Interactive logon: Smart card removal behavior** to **Lock Workstation**. If you select **Lock Workstation** in the property sheet for this policy setting, the workstation is locked when the smart card is removed. This allows users to leave the area, take their smart card with them, and still maintain a protected session.
+
### Location
+
Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options
+
### Default values
+
The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page.
-
-
-
-
-
-
-
-
-
-
-Default Domain Policy |
-Not defined |
-
-
-Default Domain Controller Policy |
-Not defined |
-
-
-Stand-Alone Server Default Settings |
-No Action |
-
-
-DC Effective Default Settings |
-No Action |
-
-
-Member Server Effective Default Settings |
-No Action |
-
-
-Client Computer Effective Default Settings |
-No Action |
-
-
-
+
+| Server type or GPO | Default value |
+| - | - |
+| Default Domain Policy| Not defined|
+| Default Domain Controller Policy | Not defined|
+| Stand-Alone Server Default Settings | No Action|
+| DC Effective Default Settings | No Action|
+| Member Server Effective Default Settings | No Action|
+| Client Computer Effective Default Settings | No Action|
## Policy management
+
This section describes features and tools that are available to help you manage this policy.
+
### Restart requirement
+
None. Changes to this policy become effective without a device restart when they are saved locally or distributed through Group Policy.
+
### Policy conflict considerations
+
None
+
### Group Policy
+
This policy setting can be configured by using the Group Policy Management Console (GPMC) to be distributed through Group Policy Objects (GPOs). If this policy is not contained in a distributed GPO, this policy can be configured on the local computer by using the Local Security Policy snap-in.
+
## Security considerations
+
This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation.
+
### Vulnerability
+
Users sometimes forget to lock their workstations when they are away from them, allowing the possibility for malicious users to access their devices. If smart cards are used for authentication, the device should automatically lock itself when the card is removed to ensure that only the user with the smart card is accessing resources by using those credentials.
+
### Countermeasure
+
Configure the **Interactive logon: Smart card removal behavior** setting to **Lock Workstation**.
+
If you select **Lock Workstation** for this policy setting, the device locks when the smart card is removed. Users can leave the area, take their smart card with them, and still maintain a protected session. This behavior is similar to the setting that requires users to log on when resuming work on the device after the screen saver has started.
+
If you select **Force Logoff** for this policy setting, the user is automatically logged off when the smart card is removed. This setting is useful when a device is deployed as a public access point, such as a kiosk or other type of shared device
+
### Potential impact
+
If you select **Force Logoff**, users must insert their smart cards and enter their PINs when they return to their workstations.
+
## Related topics
-[Security Options](security-options.md)
-
-
+
+- [Security Options](security-options.md)