mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-18 11:53:37 +00:00
Final fixes before going to staging
This commit is contained in:
@ -2,7 +2,7 @@
|
|||||||
title: Windows Hello for Business Features
|
title: Windows Hello for Business Features
|
||||||
description: Windows Hello for Business Features
|
description: Windows Hello for Business Features
|
||||||
ms.assetid: 5BF09642-8CF5-4FBC-AC9A-5CA51E19387E
|
ms.assetid: 5BF09642-8CF5-4FBC-AC9A-5CA51E19387E
|
||||||
keywords: identity, PIN, biometric, Hello, passport, WHFB, Windows Hello, PIN Reset, Dynamic Lock, Multifactor Unlock
|
keywords: identity, PIN, biometric, Hello, passport, WHFB, Windows Hello, PIN Reset, Dynamic Lock, Multifactor Unlock, Forgot PIN, Privileged Workstation
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
@ -19,6 +19,7 @@ Consider these additional features you can use after your organization deploys W
|
|||||||
* [Conditional access](#conditional-access)
|
* [Conditional access](#conditional-access)
|
||||||
* [Dynamic lock](#dynamic-lock)
|
* [Dynamic lock](#dynamic-lock)
|
||||||
* [PIN reset](#PIN-reset)
|
* [PIN reset](#PIN-reset)
|
||||||
|
* [Privileged workstation](#Priveleged-workstation)
|
||||||
* [Mulitfactor Unlock](#Multifactor-unlock)
|
* [Mulitfactor Unlock](#Multifactor-unlock)
|
||||||
|
|
||||||
|
|
||||||
@ -50,27 +51,27 @@ The Group Policy Editor, when the policy is enabled, creates a default signal ru
|
|||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
>Microsoft recommends using the default values for this policy settings. Measurements are relative based on the varying conditions of each environment. Therefore, the same values may produce different results. Test policy settings in each environment prior to broadly deploying the setting.
|
>Microsoft recommends using the default values for this policy settings. Measurements are relative based on the varying conditions of each environment. Therefore, the same values may produce different results. Test policy settings in each environment prior to broadly deploying the setting.
|
||||||
|
|
||||||
>```
|
```
|
||||||
><rule schemaVersion="1.0">
|
<rule schemaVersion="1.0">
|
||||||
> <signal type="bluetooth" scenario="Dynamic Lock" classOfDevice="512" rssiMin="-10" rssiMaxDelta="-10"/>
|
<signal type="bluetooth" scenario="Dynamic Lock" classOfDevice="512" rssiMin="-10" rssiMaxDelta="-10"/>
|
||||||
></rule>
|
</rule>
|
||||||
>```
|
```
|
||||||
|
|
||||||
For this policy setting, the **type** and **scenario** attribute values are static and cannot change. The **classofDevice** attribute defaults Phones and uses the values from the following table
|
For this policy setting, the **type** and **scenario** attribute values are static and cannot change. The **classofDevice** attribute defaults Phones and uses the values from the following table
|
||||||
|
|
||||||
|:Description:|:Value:|
|
|Description|Value|
|
||||||
|-------------|-------|
|
|:-------------|:-------:|
|
||||||
|:Miscellaneous|:0:|
|
|Miscellaneous|0|
|
||||||
|:Computer|:256:|
|
|Computer|256|
|
||||||
|:Phone|:512:|
|
|Phone|512|
|
||||||
|:LAN/Network Access Point|:768:|
|
|LAN/Network Access Point|768|
|
||||||
|:Audio/Video|:1024:|
|
|Audio/Video|1024|
|
||||||
|:Peripheral|:1280|
|
|Peripheral|1280|
|
||||||
|:Imaging|:1536:|
|
|Imaging|1536|
|
||||||
|:Wearable|:1792:|
|
|Wearable|1792|
|
||||||
|:Toy|:2048:|
|
|Toy|2048|
|
||||||
|:Health|:2304:|
|
|Health|2304|
|
||||||
|:Uncategorized|:7936:|
|
|Uncategorized|7936|
|
||||||
|
|
||||||
The **rssiMin** attribute value signal strength needed for the device to be considered "in-range". The default value of **-10** enables a user to move about an average size office or cubicle without triggering Windows to lock the device. The **rssiMaxDelta** has a default value of **-10**, which instruct Windows 10 to lock the device once the signal strength weakens by more than measurement of 10.
|
The **rssiMin** attribute value signal strength needed for the device to be considered "in-range". The default value of **-10** enables a user to move about an average size office or cubicle without triggering Windows to lock the device. The **rssiMaxDelta** has a default value of **-10**, which instruct Windows 10 to lock the device once the signal strength weakens by more than measurement of 10.
|
||||||
|
|
||||||
@ -78,6 +79,8 @@ RSSI measurements are relative and lower as the bluetooth signals between the tw
|
|||||||
|
|
||||||
## PIN reset
|
## PIN reset
|
||||||
|
|
||||||
|
### Hybrid Deployments
|
||||||
|
|
||||||
**Requirements:**
|
**Requirements:**
|
||||||
* Azure Active Directory
|
* Azure Active Directory
|
||||||
* Hybrid Windows Hello for Business deployment
|
* Hybrid Windows Hello for Business deployment
|
||||||
@ -85,13 +88,13 @@ RSSI measurements are relative and lower as the bluetooth signals between the tw
|
|||||||
* Remote reset - Windows 10, version 1703
|
* Remote reset - Windows 10, version 1703
|
||||||
* Reset above Lock - Windows 10, version 1709
|
* Reset above Lock - Windows 10, version 1709
|
||||||
|
|
||||||
The Microsoft PIN reset services enables you to help users who have forgotten their PIN. Using Microsoft Intune or a compatible MDM, you can configure Windows 10 devices to securely use the Microsoft PIN reset service that enables you to remotely push a PIN reset or enables users to reset their forgotten PIN above the lock screen.
|
The Microsoft PIN reset services enables you to help users who have forgotten their PIN. Using Microsoft Intune or a compatible MDM, you can configure Windows 10 devices to securely use the Microsoft PIN reset service that enables you to remotely push a PIN reset or enables users to reset their forgotten PIN above the lock screen without requiring reenrollment.
|
||||||
|
|
||||||
## Onboarding the Microsoft PIN reset service to your Intune tenant
|
#### Onboarding the Microsoft PIN reset service to your Intune tenant
|
||||||
|
|
||||||
Before you can remotely reset PINs, you must onboard the Microsoft PIN reset service to your Intune or MDM tenant, and configure devices you manage. Follow these instructions to get that set up:
|
Before you can remotely reset PINs, you must onboard the Microsoft PIN reset service to your Intune or MDM tenant, and configure devices you manage. Follow these instructions to get that set up:
|
||||||
|
|
||||||
### Connect Intune with the PIN reset service
|
#### Connect Intune with the PIN reset service
|
||||||
|
|
||||||
1. Visit [Microsoft PIN Reset Service Integration website](https://login.windows.net/common/oauth2/authorize?response_type=code&client_id=b8456c59-1230-44c7-a4a2-99b085333e84&resource=https%3A%2F%2Fgraph.windows.net&redirect_uri=https%3A%2F%2Fcred.microsoft.com&state=e9191523-6c2f-4f1d-a4f9-c36f26f89df0&prompt=admin_consent), and sign in using the tenant administrator account you use to manage your Intune tenant.
|
1. Visit [Microsoft PIN Reset Service Integration website](https://login.windows.net/common/oauth2/authorize?response_type=code&client_id=b8456c59-1230-44c7-a4a2-99b085333e84&resource=https%3A%2F%2Fgraph.windows.net&redirect_uri=https%3A%2F%2Fcred.microsoft.com&state=e9191523-6c2f-4f1d-a4f9-c36f26f89df0&prompt=admin_consent), and sign in using the tenant administrator account you use to manage your Intune tenant.
|
||||||
2. After you log in, click **Accept** to give consent for the PIN reset service to access your account.<br>
|
2. After you log in, click **Accept** to give consent for the PIN reset service to access your account.<br>
|
||||||
@ -100,7 +103,7 @@ Before you can remotely reset PINs, you must onboard the Microsoft PIN reset ser
|
|||||||

|

|
||||||
4. Log in to [this website](https://login.windows.net/common/oauth2/authorize?response_type=code&client_id=9115dd05-fad5-4f9c-acc7-305d08b1b04e&resource=https%3A%2F%2Fcred.microsoft.com%2F&redirect_uri=ms-appx-web%3A%2F%2FMicrosoft.AAD.BrokerPlugin%2F9115dd05-fad5-4f9c-acc7-305d08b1b04e&state=6765f8c5-f4a7-4029-b667-46a6776ad611&prompt=admin_consent) using your Intune tenant admin credentials and, again, choose **Accept** to give consent for the service to access your account.
|
4. Log in to [this website](https://login.windows.net/common/oauth2/authorize?response_type=code&client_id=9115dd05-fad5-4f9c-acc7-305d08b1b04e&resource=https%3A%2F%2Fcred.microsoft.com%2F&redirect_uri=ms-appx-web%3A%2F%2FMicrosoft.AAD.BrokerPlugin%2F9115dd05-fad5-4f9c-acc7-305d08b1b04e&state=6765f8c5-f4a7-4029-b667-46a6776ad611&prompt=admin_consent) using your Intune tenant admin credentials and, again, choose **Accept** to give consent for the service to access your account.
|
||||||
|
|
||||||
### Configure Windows devices to use PIN reset
|
#### Configure Windows devices to use PIN reset
|
||||||
|
|
||||||
To configure PIN reset on Windows devices you manage, use an [Intune Windows 10 custom device policy](https://docs.microsoft.com/en-us/intune/custom-settings-windows-10) to enable the feature. Configure the policy using the following Windows policy configuration service provider (CSP):
|
To configure PIN reset on Windows devices you manage, use an [Intune Windows 10 custom device policy](https://docs.microsoft.com/en-us/intune/custom-settings-windows-10) to enable the feature. Configure the policy using the following Windows policy configuration service provider (CSP):
|
||||||
|
|
||||||
@ -112,12 +115,54 @@ Set the value for this CSP to **True**.
|
|||||||
|
|
||||||
Read the [Steps to reset the passcode](https://docs.microsoft.com/en-us/intune/device-windows-pin-reset#steps-to-reset-the-passcode) section to removely reset a PIN on an Intune managed device.
|
Read the [Steps to reset the passcode](https://docs.microsoft.com/en-us/intune/device-windows-pin-reset#steps-to-reset-the-passcode) section to removely reset a PIN on an Intune managed device.
|
||||||
|
|
||||||
|
### On-premises Deployments
|
||||||
|
|
||||||
|
** Requirements**
|
||||||
|
* Active Directory
|
||||||
|
* On-premises Windows Hello for Business deployment
|
||||||
|
* Reset from settings - Windows 10, version 1703
|
||||||
|
* Reset above Lock - Windows 10, version 1709
|
||||||
|
|
||||||
|
On-premises deployments provide users with the ability to reset forgotton PINs either through the settings page or from above the user's lock screen. Users must know or be provider their password for authentication, must perform a second factor of authentication, and then reprovision Windows Hello for Business.
|
||||||
|
|
||||||
|
>[!IMPORTANT]
|
||||||
|
>Users must have corporate network connectivity to domain controllers and the AD FS server to reset their PINs.
|
||||||
|
|
||||||
|
#### Reset PIN from Settings
|
||||||
|
1. Sign-in to Windows 10, version 1703 or later using an alternate credential.
|
||||||
|
2. Open **Settings**, click **Accounts**, click **Sign-in options**.
|
||||||
|
3. Under **PIN**, click **I forgot my PIN** and follow the instructions.
|
||||||
|
|
||||||
|
#### Reset PIN above the Lock Screen
|
||||||
|
1. On Windows 10, version 1709, click **I forgot my PIN** from the Windows Sign-in
|
||||||
|
2. Enter your password and press enter.
|
||||||
|
3. Follow the instructions provided by the provisioning process
|
||||||
|
4. When finished, unlock your desktop using your newly creeated PIN.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
> Visit the [Frequently Asked Questions](https://docs.microsoft.com/en-us/windows/access-protection/hello-for-business/hello-identity-verification#frequently-asked-questions) section of the Windows Hello for Business page and watch the **What happens when the user forgets their PIN?** video.
|
||||||
|
|
||||||
|
## Privileged Workstation
|
||||||
|
|
||||||
|
**Requirements**
|
||||||
|
* Hybrid and On-premises Windows Hello for Business deployments
|
||||||
|
* Domain Joined or Hybird Azure joined devices
|
||||||
|
* Windows 10, version 1709
|
||||||
|
|
||||||
|
The privileged workstation scenario enables administrators to perform elevated, admistrative funcions by enrolling both their non-privileged and privileged credentials on their device.
|
||||||
|
|
||||||
|
By design, Windows 10 does not enumerate all Windows Hello for Business users from within a user's session. Using the computer Group Policy setting, Allow enumeration of emulated smartd card for all users, you can configure a device to all this enumeration on selected devices.
|
||||||
|
|
||||||
|
With this setting, administrative users can sign-in to Windows 10, version 1709 using their non-privileged Windows Hello for Business credentials for normal workflow such as email, but can launch Microsoft Managment Consoles (MMCs), Remote Desktop Services clients, and other applications by selecting **Run as different user** or **Run as administrator**, selecting the privileged user account, and providing their PIN. Administrators can also take advantage of this feature with command line applications by using **runas.exe** combined with the **/smartcard** argument. This enables administrators to perform their day-to-day operations without needing to sign-in and out, or use fast user switching when alternativing between privileged and non-privileged workloads.
|
||||||
|
|
||||||
## Multifactor Unlock
|
## Multifactor Unlock
|
||||||
|
|
||||||
**Requirements:**
|
**Requirements:**
|
||||||
* Windows Hello for Business deployment (Hybrid or On-premises)
|
* Windows Hello for Business deployment (Hybrid or On-premises)
|
||||||
* Hybird Azure AD joined or Domain Joined (on-premises deploymentd)
|
* Hybird Azure AD joined (Hybrid deployments)
|
||||||
|
* Domain Joined (on-premises deployments)
|
||||||
* Windows 10, version 1709
|
* Windows 10, version 1709
|
||||||
|
* Bluetooth, Bluetooth capable smartphone - optional
|
||||||
|
|
||||||
Windows, today, natively only supports the use of a single credential (password, PIN, fingerprint, face, etc.) for unlocking a device. Therefore, if any of those credentials are compromised (shoulder surfed), an attacker could gain access to the system.
|
Windows, today, natively only supports the use of a single credential (password, PIN, fingerprint, face, etc.) for unlocking a device. Therefore, if any of those credentials are compromised (shoulder surfed), an attacker could gain access to the system.
|
||||||
|
|
||||||
@ -131,3 +176,54 @@ Which organizations can take advanage of Multifactor unlock? Those who:
|
|||||||
|
|
||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
>Once the you deploy multifactor unlock policies, users are not be able to unlock their devices if they do not have the required factors. The fall back options are to use passwords or smart cards (both of which could be disabled as needed).
|
>Once the you deploy multifactor unlock policies, users are not be able to unlock their devices if they do not have the required factors. The fall back options are to use passwords or smart cards (both of which could be disabled as needed).
|
||||||
|
|
||||||
|
You enable multifactor unlock using Group Policy. The **Configure device unlock factors** policy setting is located under **Computer Configuration\Administrative Templates\Windows Components\Windows Hello for Business**.
|
||||||
|
|
||||||
|
The policy setting has three components:
|
||||||
|
* First unlock factor credential provider
|
||||||
|
* Second unlock factor credential provider
|
||||||
|
* Signal rules for device unlock
|
||||||
|
|
||||||
|
### The Basics: How it works
|
||||||
|
|
||||||
|
First unlock factor credential provider and Second unlock credential provider are repsonsible for the bulk of the configuration. Each of these components contains a globally unqiue identifier (GUID) that represents a different Windows credential provider. With the policy setting enabled, users unlock the device using at least one credenital provider from each category before Windows allows the user to proceed to their desktop.
|
||||||
|
|
||||||
|
The credenital providers included in the default policy settings are:
|
||||||
|
|
||||||
|
|Credential Provider| GUID|
|
||||||
|
|:------------------|:----:|
|
||||||
|
|PIN | \{D6886603-9D2F-4EB2-B667-1971041FA96B}|
|
||||||
|
|Fingerprint | \{BEC09223-B018-416D-A0AC-523971B639F5}|
|
||||||
|
|Facial Recognition | \{8AF662BF-65A0-4D0A-A540-A338A999D36F}|
|
||||||
|
|Trusted Signal | \{27FBDB57-B613-4AF2-9D7E-4FA7A66C21AD}|
|
||||||
|
|
||||||
|
The default credential providers for the **First unlock factor credential provider** include:
|
||||||
|
* PIN
|
||||||
|
* Fingerprint
|
||||||
|
* Facial Recongition
|
||||||
|
|
||||||
|
The default credential providers for the **Second unlock factor credential provider** include:
|
||||||
|
* Trusted Signal
|
||||||
|
* PIN
|
||||||
|
|
||||||
|
The **Signal rules for device unlock** setting contains the rules the Trusted Signal credential provider uses to satisfy unlocking the device.
|
||||||
|
|
||||||
|
The default signal rules for the policy setting include the proximity of any paired bluetooth smartphone.
|
||||||
|
|
||||||
|
To successfully reach their desktop, the user must satisfy one credential provider from each category. The order in which the user satisfies each credential provider does not matter. Therefore, using the default policy setting a user can provide:
|
||||||
|
* PIN and Fingerprint
|
||||||
|
* PIN and Facial Recognition
|
||||||
|
* Fingerprint and PIN
|
||||||
|
* Facial Recognition and Trusted Signal (bluetooth paired smartphone)
|
||||||
|
|
||||||
|
>[!IMPORTANT]
|
||||||
|
> * PIN **must** be in at least one of the groups
|
||||||
|
> * Trusted signals **must** be combined with another credential provider
|
||||||
|
> * You cannot use the same unlock factor to satisfy both categories. Therefore, if you include any credential provider in both categories, it means it can be used to satisfy either category, but not both.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -71,6 +71,12 @@ The table shows the minimum requirements for each deployment.
|
|||||||
|
|
||||||
## Frequently Asked Questions
|
## Frequently Asked Questions
|
||||||
|
|
||||||
|
### What is the password-less strategy?
|
||||||
|
|
||||||
|
Watch Senior Program Manager Karanbir Singh's Ignite 2017 presentation **Microsoft's guide for going password-less**
|
||||||
|
|
||||||
|
> [!VIDEO https://www.youtube.com/embed/mXJS615IGLM]
|
||||||
|
|
||||||
### What is the user experience for Windows Hello for Business?
|
### What is the user experience for Windows Hello for Business?
|
||||||
The user experience for Windows Hello for Business occurs after user sign-in, after you deploy Windows Hello for Business policy settings to your environment.
|
The user experience for Windows Hello for Business occurs after user sign-in, after you deploy Windows Hello for Business policy settings to your environment.
|
||||||
|
|
||||||
@ -80,6 +86,9 @@ The user experience for Windows Hello for Business occurs after user sign-in, af
|
|||||||
|
|
||||||
> [!VIDEO https://www.youtube.com/embed/etXJsZb8Fso]
|
> [!VIDEO https://www.youtube.com/embed/etXJsZb8Fso]
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
### What happens when my user forgets their PIN?
|
### What happens when my user forgets their PIN?
|
||||||
|
|
||||||
If the user can sign-in with a password, they can reset their PIN by clicking the "I forgot my PIN" link in settings. Beginning with the Fall Creators Update, users can reset their PIN above the lock screen by clicking the "I forgot my PIN" link on the PIN credential provider.
|
If the user can sign-in with a password, they can reset their PIN by clicking the "I forgot my PIN" link in settings. Beginning with the Fall Creators Update, users can reset their PIN above the lock screen by clicking the "I forgot my PIN" link on the PIN credential provider.
|
||||||
|
@ -66,33 +66,6 @@ You can provide additional protection for laptops that don't have TPM by enablin
|
|||||||
|
|
||||||
2. Set the number of invalid logon attempts to allow, and then click OK.
|
2. Set the number of invalid logon attempts to allow, and then click OK.
|
||||||
|
|
||||||
<span id="what-if-i-forget-my-pin"/>
|
|
||||||
## What if I forget my PIN?
|
|
||||||
|
|
||||||
Starting with Windows 10, version 1703, devices managed by [Microsoft Intune](https://www.microsoft.com/cloud-platform/microsoft-intune), are be able to reset a forgotten PIN without deleting company managed data or apps.
|
|
||||||
|
|
||||||
### Reset forgotten PIN on Windows Phone
|
|
||||||
|
|
||||||
To reset a forgotten pin on a Windows Phone, you will need to locate the device in the Intune portal. Once you've selected the device, click on **More > New passcode** to generate a new PIN.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
Once you've done that, the device will receive a notification to unlock the device and you will have to provide them with the generated PIN in order to unlock the device. With the device unlocked, they user can now reset the PIN.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
### Reset forgotten PIN on desktop
|
|
||||||
|
|
||||||
Users can reset a forgotten PIN from any Intune managed desktop device. They will need to unlock the device by other means (Password \ Smart Card \ Biometric).
|
|
||||||
|
|
||||||
Once the device is unlocked, go to **Settings > Accounts > Sign-in options** and under **PIN** select **I forgot my PIN**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
After signing-in, you will be prompted to change your PIN.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
## Why do you need a PIN to use biometrics?
|
## Why do you need a PIN to use biometrics?
|
||||||
Windows Hello enables biometric sign-in for Windows 10: fingerprint, iris, or facial recognition. When you set up Windows Hello, you're asked to create a PIN first. This PIN enables you to sign in using the PIN when you can’t use your preferred biometric because of an injury or because the sensor is unavailable or not working properly.
|
Windows Hello enables biometric sign-in for Windows 10: fingerprint, iris, or facial recognition. When you set up Windows Hello, you're asked to create a PIN first. This PIN enables you to sign in using the PIN when you can’t use your preferred biometric because of an injury or because the sensor is unavailable or not working properly.
|
||||||
|
|
||||||
|
@ -42,3 +42,5 @@
|
|||||||
#### [Validate and Deploy Multifactor Authentication Services (MFA)](hello-cert-trust-validate-deploy-mfa.md)
|
#### [Validate and Deploy Multifactor Authentication Services (MFA)](hello-cert-trust-validate-deploy-mfa.md)
|
||||||
##### [Configure or Deploy Multifactor Authentication Services](hello-cert-trust-deploy-mfa.md)
|
##### [Configure or Deploy Multifactor Authentication Services](hello-cert-trust-deploy-mfa.md)
|
||||||
#### [Configure Windows Hello for Business Policy settings](hello-cert-trust-policy-settings.md)
|
#### [Configure Windows Hello for Business Policy settings](hello-cert-trust-policy-settings.md)
|
||||||
|
|
||||||
|
## [Windows Hello for Businesss Feature](hello-features.md)
|
Reference in New Issue
Block a user