Update Windows Hello for Business configuration with group policy

This commit is contained in:
Paolo Matarazzo 2023-12-29 09:35:15 -05:00
parent eea61a40e3
commit 3db0158ba3
3 changed files with 40 additions and 65 deletions

View File

@ -98,16 +98,23 @@ You may need to update your Group Policy definitions to be able to configure the
You can also create a Group Policy Central Store and copy them their respective language folder. For more information, see [How to create and manage the Central Store for Group Policy Administrative Templates in Windows][TS-1]. You can also create a Group Policy Central Store and copy them their respective language folder. For more information, see [How to create and manage the Central Store for Group Policy Administrative Templates in Windows][TS-1].
#### Create the Windows Hello for Business group policy object ### Configure the Windows Hello for Business with group policy
You can configure Windows Hello for Business cloud Kerberos trust using a Group Policy Object (GPO). [!INCLUDE [gpo-settings-1](../../../../../includes/configure/gpo-settings-1.md)]
1. Using the Group Policy Management Console (GPMC), scope a domain-based Group Policy to computer objects in Active Directory. | Group policy path | Group policy setting | Value |
1. Edit the Group Policy object from Step 1. | - | - | - |
1. Expand **Computer Configuration > Administrative Templates > Windows Components > Windows Hello for Business**. | **Computer Configuration\Administrative Templates\Windows Components\Windows Hello for Business** |Use Windows Hello for Business| **Enabled**|
1. Select **Use Windows Hello for Business** > **Enable** > **OK**. | **Computer Configuration\Administrative Templates\Windows Components\Windows Hello for Business** |Use cloud Kerberos trust for on-premises authentication| **Enabled**|
1. Select **Use cloud Kerberos trust for on-premises authentication** > **Enable** > **OK**. | **Computer Configuration\Administrative Templates\Windows Components\Windows Hello for Business** |Use a hardware security device| **Enabled**|
1. Optional, but recommended: select **Use a hardware security device** > **Enable** > **OK**.
> [!NOTE]
> The enablement of the *Use a hardware security device* policy setting is optional, but recommended.
[!INCLUDE [gpo-settings-2](../../../../../includes/configure/gpo-settings-2.md)]
> [!TIP]
> The best way to deploy the Windows Hello for Business GPO is to use security group filtering. Only members of the targeted security group will provision Windows Hello for Business, enabling a phased rollout. This solution allows linking the GPO to the domain, ensuring the GPO is scoped to all security principals. The security group filtering ensures that only the members of the global group receive and apply the GPO, which results in the provisioning of Windows Hello for Business.
--- ---
@ -138,9 +145,9 @@ Once a user completes enrollment with cloud Kerberos trust, the Windows Hello ge
If you deployed Windows Hello for Business using the key trust model, and want to migrate to the cloud Kerberos trust model, follow these steps: If you deployed Windows Hello for Business using the key trust model, and want to migrate to the cloud Kerberos trust model, follow these steps:
1. [Set up Microsoft Entra Kerberos in your hybrid environment](#deploy-microsoft-entra-kerberos). 1. [Set up Microsoft Entra Kerberos in your hybrid environment](#deploy-microsoft-entra-kerberos)
1. [Enable cloud Kerberos trust via Group Policy or Intune](#configure-windows-hello-for-business-policy). 1. [Enable cloud Kerberos trust via Group Policy or Intune](#configure-windows-hello-for-business-policy-settings)
1. For Microsoft Entra joined devices, sign out and sign in to the device using Windows Hello for Business. 1. For Microsoft Entra joined devices, sign out and sign in to the device using Windows Hello for Business
> [!NOTE] > [!NOTE]
> For Microsoft Entra hybrid joined devices, users must perform the first sign in with new credentials while having line of sight to a DC. > For Microsoft Entra hybrid joined devices, users must perform the first sign in with new credentials while having line of sight to a DC.
@ -152,11 +159,11 @@ If you deployed Windows Hello for Business using the key trust model, and want t
If you deployed Windows Hello for Business using the certificate trust model, and want to use the cloud Kerberos trust model, you must redeploy Windows Hello for Business by following these steps: If you deployed Windows Hello for Business using the certificate trust model, and want to use the cloud Kerberos trust model, you must redeploy Windows Hello for Business by following these steps:
1. Disable the certificate trust policy. 1. Disable the certificate trust policy
1. [Enable cloud Kerberos trust via Group Policy or Intune](#configure-windows-hello-for-business-policy). 1. [Enable cloud Kerberos trust via Group Policy or Intune](#configure-windows-hello-for-business-policy-settings)
1. Remove the certificate trust credential using the command `certutil -deletehellocontainer` from the user context. 1. Remove the certificate trust credential using the command `certutil.exe -deletehellocontainer` from the user context
1. Sign out and sign back in. 1. Sign out and sign back in
1. Provision Windows Hello for Business using a method of your choice. 1. Provision Windows Hello for Business using a method of your choice
> [!NOTE] > [!NOTE]
> For Microsoft Entra hybrid joined devices, users must perform the first sign-in with new credentials while having line of sight to a DC. > For Microsoft Entra hybrid joined devices, users must perform the first sign-in with new credentials while having line of sight to a DC.
@ -175,18 +182,9 @@ The following scenarios aren't supported using Windows Hello for Business cloud
<!--Links--> <!--Links-->
[ENTRA-1]: /entra/identity/authentication/howto-authentication-passwordless-security-key-on-premises#install-the-azureadhybridauthenticationmanagement-module
[AZ-3]: /azure/active-directory/fundamentals/how-to-find-tenant
[AZ-4]: /azure/active-directory/devices/troubleshoot-device-dsregcmd [AZ-4]: /azure/active-directory/devices/troubleshoot-device-dsregcmd
[SERV-1]: /windows-server/administration/performance-tuning/role/active-directory-server/capacity-planning-for-active-directory-domain-services
[TS-1]: /troubleshoot/windows-client/group-policy/create-and-manage-central-store
[MEM-1]: /mem/intune/protect/identity-protection-windows-settings
[MEM-3]: /mem/intune/configuration/custom-settings-configure
[MEM-4]: /windows/client-management/mdm/passportforwork-csp
[MEM-5]: /mem/intune/protect/endpoint-security-account-protection-policy
[MEM-6]: /mem/intune/protect/identity-protection-configure
[CSP-1]: /windows/client-management/mdm/passportforwork-csp [CSP-1]: /windows/client-management/mdm/passportforwork-csp
[ENTRA-1]: /entra/identity/authentication/howto-authentication-passwordless-security-key-on-premises#install-the-azureadhybridauthenticationmanagement-module
[MEM-3]: /mem/intune/configuration/custom-settings-configure
[SERV-1]: /windows-server/administration/performance-tuning/role/active-directory-server/capacity-planning-for-active-directory-domain-services
[TS-1]: /troubleshoot/windows-client/group-policy/create-and-manage-central-store

View File

@ -23,50 +23,27 @@ If the Intune tenant-wide policy is enabled and configured to your needs, you ca
[!INCLUDE [gpo-enable-whfb](includes/gpo-enable-whfb.md)] [!INCLUDE [gpo-enable-whfb](includes/gpo-enable-whfb.md)]
### Enable and configure Windows Hello for Business ### Configure the Windows Hello for Business with group policy
Sign-in a domain controller or management workstations with *Domain Admin* equivalent credentials. [!INCLUDE [gpo-settings-1](../../../../../includes/configure/gpo-settings-1.md)]
1. Start the **Group Policy Management Console** (gpmc.msc) | Group policy path | Group policy setting | Value |
1. Expand the domain and select the **Group Policy Object** node in the navigation pane | - | - | - |
1. Right-click **Group Policy object** and select **New** | **Computer Configuration\Administrative Templates\Windows Components\Windows Hello for Business** |Use Windows Hello for Business| **Enabled**|
1. Type *Enable Windows Hello for Business* in the name box and select **OK** | **Computer Configuration\Administrative Templates\Windows Components\Windows Hello for Business** |Use a hardware security device| **Enabled**|
1. In the content pane, right-click the **Enable Windows Hello for Business** group policy object and select **Edit**
1. In the navigation pane, expand **Policies** under **User Configuration**
1. Expand **Administrative Templates > Windows Component**, and select **Windows Hello for Business**
1. In the content pane, open **Use Windows Hello for Business**. Select **Enable > OK**
1. Close the **Group Policy Management Editor**
> [!NOTE] > [!NOTE]
> Windows Hello for Business can be configured using different policies. These policies are optional to configure, but it's recommended to enable *Use a hardware security device*. > The enablement of the *Use a hardware security device* policy setting is optional, but recommended.
>
> For more information about these policies, see [Configure Windows Hello for Business](../configure.md).
### Configure security for GPO [!INCLUDE [gpo-settings-2](../../../../../includes/configure/gpo-settings-2.md)]
The best way to deploy the Windows Hello for Business GPO is to use security group filtering. Only members of the targeted security group will provision Windows Hello for Business, enabling a phased rollout. > [!TIP]
> The best way to deploy the Windows Hello for Business GPO is to use security group filtering. Only members of the targeted security group will provision Windows Hello for Business, enabling a phased rollout. This solution allows linking the GPO to the domain, ensuring the GPO is scoped to all security principals. The security group filtering ensures that only the members of the global group receive and apply the GPO, which results in the provisioning of Windows Hello for Business.
1. Start the **Group Policy Management Console** (gpmc.msc)
1. Expand the domain and select the **Group Policy Object** node in the navigation pane
1. Open the **Enable Windows Hello for Business** GPO
1. In the **Security Filtering** section of the content pane, select **Add**. Type the name of the security group you previously created (for example, *Windows Hello for Business Users*) and select **OK**
1. Select the **Delegation** tab. Select **Authenticated Users > Advanced**
1. In the **Group or User names** list, select **Authenticated Users**. In the **Permissions for Authenticated Users** list, clear the **Allow** check box for the **Apply Group Policy** permission. Select **OK**
### Deploy the Windows Hello for Business Group Policy object
The application of Group Policy object uses security group filtering. This solution allows linking the GPO to the domain, ensuring the GPO is scoped to all users. The security group filtering ensures that only the members of the *Windows Hello for Business Users* global group receive and apply the GPO, which results in the provisioning of Windows Hello for Business.
1. Start the **Group Policy Management Console** (gpmc.msc)
1. In the navigation pane, expand the domain and right-click the node that has your Active Directory domain name and select **Link an existing GPO**
1. In the **Select GPO** dialog box, select *Enable Windows Hello for Business* or the name of the Windows Hello for Business Group Policy object you previously created and select **OK**
### Add members to the targeted group
Users (or devices) must receive the Windows Hello for Business group policy settings and have the proper permission to provision Windows Hello for Business. You can provide users with these settings and permissions by adding members to the *Windows Hello for Business Users* group. Users and groups who aren't members of this group won't attempt to enroll for Windows Hello for Business.
--- ---
Additional policy settings can be configured to control the behavior of Windows Hello for Business. For more information, see [Windows Hello for Business policy settings](../policy-settings.md).
## Enroll in Windows Hello for Business ## Enroll in Windows Hello for Business
The Windows Hello for Business provisioning process begins immediately after the user profile is loaded and before the user receives their desktop. For the provisioning process to begin, all prerequisite checks must pass. The Windows Hello for Business provisioning process begins immediately after the user profile is loaded and before the user receives their desktop. For the provisioning process to begin, all prerequisite checks must pass.

View File

@ -8,7 +8,7 @@ For Microsoft Entra hybrid joined devices, you can use group policies to configu
> [!TIP] > [!TIP]
> Create a security group (for example, *Windows Hello for Business users* or *Windows Hello for Business devices*) to make it easy to deploy Windows Hello for Business in phases. You assign **Group Policy permissions** to this group to simplify the deployment by adding the users or devices to the groups. > Create a security group (for example, *Windows Hello for Business users* or *Windows Hello for Business devices*) to make it easy to deploy Windows Hello for Business in phases. You assign **Group Policy permissions** to this group to simplify the deployment by adding the users or devices to the groups.
The *Enable Windows Hello for Business* policy setting is the configuration needed for Windows to determine if a user should attempt to enroll for Windows Hello for Business. A user will only attempt enrollment if this policy setting is configured to **enabled**.\ The *Enable Windows Hello for Business* policy setting is the configuration needed for Windows to determine if a user should attempt to enroll for Windows Hello for Business. A user will only attempt enrollment if this policy setting is **enabled**.\
You can configure the *Enable Windows Hello for Business* setting for computer or users: You can configure the *Enable Windows Hello for Business* setting for computer or users:
- Deploying this policy setting to computers (or group of computers) results in all users that sign-in that computer to attempt a Windows Hello for Business enrollment - Deploying this policy setting to computers (or group of computers) results in all users that sign-in that computer to attempt a Windows Hello for Business enrollment