From 2959adeeb5707bd14b7b426ccf3091853a7ee61c Mon Sep 17 00:00:00 2001 From: Jesper Nielsen Date: Tue, 3 Jul 2018 16:16:37 +0200 Subject: [PATCH] I changes a small spelling error --- .../hello-for-business/feature-multifactor-unlock.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/feature-multifactor-unlock.md b/windows/security/identity-protection/hello-for-business/feature-multifactor-unlock.md index 0e9283f815..6e31a65447 100644 --- a/windows/security/identity-protection/hello-for-business/feature-multifactor-unlock.md +++ b/windows/security/identity-protection/hello-for-business/feature-multifactor-unlock.md @@ -24,10 +24,10 @@ Windows, today, natively only supports the use of a single credential (password, Windows 10 offers Multifactor device unlock by extending Windows Hello with trusted signals, administrators can configure Windows 10 to request a combination of factors and trusted signals to unlock their devices. -Which organizations can take advanage of Multifactor unlock? Those who: +Which organizations can take advantage of Multifactor unlock? Those who: * Have expressed that PINs alone do not meet their security needs. * Want to prevent Information Workers from sharing credentials. -* Want their orgs to comply with regulatory two-factor authentication policy. +* Want their organisations to comply with regulatory two-factor authentication policy. * Want to retain the familiar Windows logon UX and not settle for a custom solution. You enable multifactor unlock using Group Policy. The **Configure device unlock factors** policy setting is located under **Computer Configuration\Administrative Templates\Windows Components\Windows Hello for Business**.