From 2e5ef159d545c697055ea244d571a85b0896625f Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Wed, 4 Jan 2023 11:52:40 -0500 Subject: [PATCH] updates --- .../hello-for-business/hello-hybrid-cert-whfb-provision.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-provision.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-provision.md index 65f8ec21a4..642dd2b6aa 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-provision.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-provision.md @@ -63,7 +63,8 @@ Windows Hello for Business settings are also available in the settings catalog. ### [:::image type="icon" source="../../images/icons/group-policy.svg"::: **GPO**](#tab/gpo) -For hybrid Azure AD joined devices, you can use GPOs to manage Windows Hello for Business. +For hybrid Azure AD joined devices, you can use group policies to configure Windows Hello for Business. +It is suggested to create a security group (for example, *Windows Hello for Business Users*) to make it easy to deploy Windows Hello for Business in phases. You assign the **Group Policy** and **Certificate template** permissions to this group to simplify the deployment by adding the users to the group. This provides users with the proper permissions to provision Windows Hello for Business and to enroll in the Windows Hello for Business authentication certificate. #### Create the Windows Hello for Business Users Security Group