From 95b73426102dcfe235c9a131090330fdd3fff9f6 Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Wed, 4 Jan 2023 13:30:41 -0500 Subject: [PATCH] updates --- .../hello-hybrid-key-trust-provision.md | 60 ++++--------------- 1 file changed, 13 insertions(+), 47 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-provision.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-provision.md index e6744156b2..767415dbd9 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-provision.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-provision.md @@ -15,6 +15,9 @@ After the prerequisites are met and the PKI configuration is validated, Windows ### [:::image type="icon" source="../../images/icons/intune.svg"::: **Intune**](#tab/intune) + +## Configure Windows Hello for Business using Microsoft Intune + For Azure AD joined devices and hybrid Azure AD joined devices enrolled in Intune, you can use Intune policies to manage Windows Hello for Business. There are different ways to enable and configure Windows Hello for Business in Intune: @@ -54,7 +57,7 @@ To configure Windows Hello for Business using an *account protection* policy: 1. Specify a **Name** and, optionally, a **Description** > **Next** 1. Under *Block Windows Hello for Business*, select **Disabled** and multiple policies become available - These policies are optional to configure, but it's recommended to configure *Enable to use a Trusted Platform Module (TPM)* to **Yes** - - For more information about these policies, see [TBD](tbd) + - For more information about these policies, see [Manage Windows Hello for Business in your organization](hello-manage-in-organization.md) 1. Select **Next** 1. Optionally, add *scope tags* > **Next** 1. Assign the policy to a security group that contains as members the devices or users that you want to configure > **Next** @@ -64,17 +67,17 @@ To configure Windows Hello for Business using an *account protection* policy: ### [:::image type="icon" source="../../images/icons/group-policy.svg"::: **GPO**](#tab/gpo) +## Configure Windows Hello for Business using group policies + For hybrid Azure AD joined devices, you can use group policies to configure Windows Hello for Business. It is suggested to create a security group (for example, *Windows Hello for Business Users*) to make it easy to deploy Windows Hello for Business in phases. You assign Group Policy permissions to this group to simplify the deployment by adding the users to the group. -### Windows Hello for Business Group Policy - The Windows Hello for Business Group Policy object delivers the correct Group Policy settings to the user, which enables them to enroll and use Windows Hello for Business to authenticate to Azure and Active Directory > [!NOTE] > If you deployed Windows Hello for Business configuration using both Group Policy and Intune, Group Policy settings will take precedence and Intune settings will be ignored. For more details about policy conflicts, see [Policy conflicts from multiple policy sources](./hello-manage-in-organization.md#policy-conflicts-from-multiple-policy-sources) -The *Enable Windows Hello for Business* group policy setting is the configuration needed for Windows to determine if a user should attempt to enroll for Windows Hello for Business. A user will only attempt enrollment if this policy setting is configured to enabled.\ +The *Enable Windows Hello for Business* group policy setting is the configuration needed for Windows to determine if a user should attempt to enroll for Windows Hello for Business. A user will only attempt enrollment if this policy setting is configured to **enabled**.\ You can configure the *Enable Windows Hello for Business* setting for computer or users: - Deploying this policy setting to computers (or group of computers) results in all users that sign-in that computer to attempt a Windows Hello for Business enrollment @@ -96,6 +99,11 @@ Sign-in a domain controller or management workstations with *Domain Admin* equiv 1. In the content pane, open **Use Windows Hello for Business**. Select **Enable > OK** 1. Close the **Group Policy Management Editor** +> [!NOTE] +> Windows Hello for Business can be configured using different policies. These policies are optional to configure, but it's recommended to enable *Use a hardware security device*. +> +> For more information about these policies, see [Manage Windows Hello for Business in your organization](hello-manage-in-organization.md). + ### Configure security for GPO The best way to deploy the Windows Hello for Business GPO is to use security group filtering. Only members of the targeted security group will provision Windows Hello for Business, enabling a phased rollout. @@ -148,46 +156,4 @@ This is the process that occurs after a user signs in, to enroll in Windows Hell [AZ-4]: /azure/active-directory/devices/troubleshoot-device-dsregcmd -[AZ-5]: /azure/active-directory/connect/active-directory-aadconnectsync-feature-scheduler - - - \ No newline at end of file +[AZ-5]: /azure/active-directory/connect/active-directory-aadconnectsync-feature-scheduler \ No newline at end of file