Merged PR 6581: Merge master to atp-rs4

This commit is contained in:
Joey Caparas 2018-03-22 21:37:24 +00:00
commit a570818ae6
4 changed files with 72 additions and 48 deletions

View File

@ -63,7 +63,7 @@ The following image shows the ClientCertificateInstall configuration service pro
<a href="" id="clientcertificateinstall-pfxcertinstall-uniqueid-containername"></a>**ClientCertificateInstall/PFXCertInstall/*UniqueID*/ContainerName** <a href="" id="clientcertificateinstall-pfxcertinstall-uniqueid-containername"></a>**ClientCertificateInstall/PFXCertInstall/*UniqueID*/ContainerName**
<p style="margin-left: 20px">ptional. Specifies the Windows Hello for Business (formerly known as Microsoft Passport for Work) container name (if Windows Hello for Business storage provider (KSP) is chosen for the KeyLocation). If this node is not specified when Windows Hello for Business KSP is chosen, enrollment will fail. <p style="margin-left: 20px">Optional. Specifies the Windows Hello for Business (formerly known as Microsoft Passport for Work) container name (if Windows Hello for Business storage provider (KSP) is chosen for the KeyLocation). If this node is not specified when Windows Hello for Business KSP is chosen, enrollment will fail.
<p style="margin-left: 20px">Date type is string. <p style="margin-left: 20px">Date type is string.

View File

@ -312,211 +312,218 @@ The following tables provide descriptions of the default groups that are located
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
</tr> </tr>
<tr class="even"> <tr class="even">
<td><p>[Enterprise Key Admins](#bkmk-enterprise-key-admins)</p></td>
<td><p>Yes</p></td>
<td><p></p></td>
<td><p></p></td>
<td><p></p></td>
</tr>
<tr class="odd">
<td><p>[Enterprise Read-only Domain Controllers](#bkmk-entrodc)</p></td> <td><p>[Enterprise Read-only Domain Controllers](#bkmk-entrodc)</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
</tr> </tr>
<tr class="odd"> <tr class="even">
<td><p>[Event Log Readers](#bkmk-eventlogreaders)</p></td> <td><p>[Event Log Readers](#bkmk-eventlogreaders)</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
</tr> </tr>
<tr class="even"> <tr class="odd">
<td><p>[Group Policy Creator Owners](#bkmk-gpcreatorsowners)</p></td> <td><p>[Group Policy Creator Owners](#bkmk-gpcreatorsowners)</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
</tr> </tr>
<tr class="odd"> <tr class="even">
<td><p>[Guests](#bkmk-guests)</p></td> <td><p>[Guests](#bkmk-guests)</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
</tr> </tr>
<tr class="even"> <tr class="odd">
<td><p>[Hyper-V Administrators](#bkmk-hypervadministrators)</p></td> <td><p>[Hyper-V Administrators](#bkmk-hypervadministrators)</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p></p></td> <td><p></p></td>
</tr> </tr>
<tr class="odd"> <tr class="even">
<td><p>[IIS_IUSRS](#bkmk-iis-iusrs)</p></td> <td><p>[IIS_IUSRS](#bkmk-iis-iusrs)</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
</tr> </tr>
<tr class="even"> <tr class="odd">
<td><p>[Incoming Forest Trust Builders](#bkmk-inforesttrustbldrs)</p></td> <td><p>[Incoming Forest Trust Builders](#bkmk-inforesttrustbldrs)</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
</tr> </tr>
<tr class="odd"> <tr class="even">
<td><p>[Key Admins](#key-admins)</p></td> <td><p>[Key Admins](#key-admins)</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p></p></td> <td><p></p></td>
<td><p></p></td> <td><p></p></td>
<td><p></p></td> <td><p></p></td>
</tr> </tr>
<tr class="even"> <tr class="odd">
<td><p>[Network Configuration Operators](#bkmk-networkcfgoperators)</p></td> <td><p>[Network Configuration Operators](#bkmk-networkcfgoperators)</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
</tr> </tr>
<tr class="odd"> <tr class="even">
<td><p>[Performance Log Users](#bkmk-perflogusers)</p></td> <td><p>[Performance Log Users](#bkmk-perflogusers)</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
</tr> </tr>
<tr class="even"> <tr class="odd">
<td><p>[Performance Monitor Users](#bkmk-perfmonitorusers)</p></td> <td><p>[Performance Monitor Users](#bkmk-perfmonitorusers)</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
</tr> </tr>
<tr class="odd"> <tr class="even">
<td><p>[PreWindows 2000 Compatible Access](#bkmk-pre-ws2kcompataccess)</p></td> <td><p>[PreWindows 2000 Compatible Access](#bkmk-pre-ws2kcompataccess)</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
</tr> </tr>
<tr class="even"> <tr class="odd">
<td><p>[Print Operators](#bkmk-printoperators)</p></td> <td><p>[Print Operators](#bkmk-printoperators)</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
</tr> </tr>
<tr class="odd"> <tr class="even">
<td><p>[Protected Users](#bkmk-protectedusers)</p></td> <td><p>[Protected Users](#bkmk-protectedusers)</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p></p></td> <td><p></p></td>
<td><p></p></td> <td><p></p></td>
</tr> </tr>
<tr class="even"> <tr class="odd">
<td><p>[RAS and IAS Servers](#bkmk-rasandias)</p></td> <td><p>[RAS and IAS Servers](#bkmk-rasandias)</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
</tr> </tr>
<tr class="odd"> <tr class="even">
<td><p>[RDS Endpoint Servers](#bkmk-rdsendpointservers)</p></td> <td><p>[RDS Endpoint Servers](#bkmk-rdsendpointservers)</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p></p></td> <td><p></p></td>
</tr> </tr>
<tr class="even"> <tr class="odd">
<td><p>[RDS Management Servers](#bkmk-rdsmanagementservers)</p></td> <td><p>[RDS Management Servers](#bkmk-rdsmanagementservers)</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p></p></td> <td><p></p></td>
</tr> </tr>
<tr class="odd"> <tr class="even">
<td><p>[RDS Remote Access Servers](#bkmk-rdsremoteaccessservers)</p></td> <td><p>[RDS Remote Access Servers](#bkmk-rdsremoteaccessservers)</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p></p></td> <td><p></p></td>
</tr> </tr>
<tr class="even"> <tr class="odd">
<td><p>[Read-only Domain Controllers](#bkmk-rodc)</p></td> <td><p>[Read-only Domain Controllers](#bkmk-rodc)</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
</tr> </tr>
<tr class="odd"> <tr class="even">
<td><p>[Remote Desktop Users](#bkmk-remotedesktopusers)</p></td> <td><p>[Remote Desktop Users](#bkmk-remotedesktopusers)</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
</tr> </tr>
<tr class="even"> <tr class="odd">
<td><p>[Remote Management Users](#bkmk-remotemanagementusers)</p></td> <td><p>[Remote Management Users](#bkmk-remotemanagementusers)</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p></p></td> <td><p></p></td>
</tr> </tr>
<tr class="odd"> <tr class="even">
<td><p>[Replicator](#bkmk-replicator)</p></td> <td><p>[Replicator](#bkmk-replicator)</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
</tr> </tr>
<tr class="even"> <tr class="odd">
<td><p>[Schema Admins](#bkmk-schemaadmins)</p></td> <td><p>[Schema Admins](#bkmk-schemaadmins)</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
</tr> </tr>
<tr class="odd"> <tr class="even">
<td><p>[Server Operators](#bkmk-serveroperators)</p></td> <td><p>[Server Operators](#bkmk-serveroperators)</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
</tr> </tr>
<tr class="even"> <tr class="odd">
<td><p>[Storage Replica Administrators](#storage-replica-administrators)</p></td> <td><p>[Storage Replica Administrators](#storage-replica-administrators)</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p></p></td> <td><p></p></td>
<td><p></p></td> <td><p></p></td>
<td><p></p></td> <td><p></p></td>
</tr> </tr>
<tr class="odd"> <tr class="even">
<td><p>[System Managed Accounts Group](#system-managed-accounts-group)</p></td> <td><p>[System Managed Accounts Group](#system-managed-accounts-group)</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p></p></td> <td><p></p></td>
<td><p></p></td> <td><p></p></td>
<td><p></p></td> <td><p></p></td>
</tr> </tr>
<tr class="even"> <tr class="odd">
<td><p>[Terminal Server License Servers](#bkmk-terminalserverlic)</p></td> <td><p>[Terminal Server License Servers](#bkmk-terminalserverlic)</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
</tr> </tr>
<tr class="odd"> <tr class="even">
<td><p>[Users](#bkmk-users)</p></td> <td><p>[Users](#bkmk-users)</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
</tr> </tr>
<tr class="even"> <tr class="odd">
<td><p>[Windows Authorization Access Group](#bkmk-winauthaccess)</p></td> <td><p>[Windows Authorization Access Group](#bkmk-winauthaccess)</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
</tr> </tr>
<tr class="odd"> <tr class="even">
<td><p>[WinRMRemoteWMIUsers_](#bkmk-winrmremotewmiusers-)</p></td> <td><p>[WinRMRemoteWMIUsers_](#bkmk-winrmremotewmiusers-)</p></td>
<td><p></p></td> <td><p></p></td>
<td><p>Yes</p></td> <td><p>Yes</p></td>
@ -1756,8 +1763,25 @@ This security group has not changed since Windows Server 2008.
</tbody> </tbody>
</table> </table>
  ### Enterprise Key Admins
Members of this group can perform administrative actions on key objects within the forest.
The Enterprise Key Admins group was introduced in Windows Server 2016.
| Attribute | Value |
|-----------|-------|
| Well-Known SID/RID | S-1-5-21-&lt;domain&gt;-527 |
| Type | Global |
| Default container | CN=Users, DC=&lt;domain&gt;, DC= |
| Default members | None |
| Default member of | None |
| Protected by ADMINSDHOLDER? | No |
| Safe to move out of default container? | Yes |
| Safe to delegate management of this group to non-Service admins? | No |
| Default User Rights | None |
 
### <a href="" id="bkmk-entrodc"></a>Enterprise Read-Only Domain Controllers ### <a href="" id="bkmk-entrodc"></a>Enterprise Read-Only Domain Controllers
Members of this group are Read-Only Domain Controllers in the enterprise. Except for account passwords, a Read-only domain controller holds all the Active Directory objects and attributes that a writable domain controller holds. However, changes cannot be made to the database that is stored on the Read-only domain controller. Changes must be made on a writable domain controller and then replicated to the Read-only domain controller. Members of this group are Read-Only Domain Controllers in the enterprise. Except for account passwords, a Read-only domain controller holds all the Active Directory objects and attributes that a writable domain controller holds. However, changes cannot be made to the database that is stored on the Read-only domain controller. Changes must be made on a writable domain controller and then replicated to the Read-only domain controller.
@ -2226,7 +2250,7 @@ The Key Admins group applies to versions of the Windows Server operating system
| Attribute | Value | | Attribute | Value |
|-----------|-------| |-----------|-------|
| Well-Known SID/RID | S-1-5-21-4195037842-338827918-94892514-526 | | Well-Known SID/RID | S-1-5-21-&lt;domain&gt;-526 |
| Type | Global | | Type | Global |
| Default container | CN=Users, DC=&lt;domain&gt;, DC= | | Default container | CN=Users, DC=&lt;domain&gt;, DC= |
| Default members | None | | Default members | None |

View File

@ -70,7 +70,7 @@ Its fundamentally important to understand which deployment model to use for a
#### Trust types #### Trust types
A deployments trust type defines how each Windows Hello for Business client authenticates to the on-premises Active Directory. There are two trusts types, key trust and certificate trust. A deployment's trust type defines how each Windows Hello for Business client authenticates to the on-premises Active Directory. There are two trust types: key trust and certificate trust.
The key trust type does not require issuing authentication certificates to end users. Users authenticate using a hardware-bound key created during an in-box provisioning experience, which requires an adequate distribution of Windows Server 2016 domain controllers relative to your existing authentication and the number of users included in your Windows Hello for Business deployment. Read the [Planning an adequate number of Windows Server 2016 Domain Controllers for Windows Hello for Business deployments](hello-adequate-domain-controllers.md) to learn more. The key trust type does not require issuing authentication certificates to end users. Users authenticate using a hardware-bound key created during an in-box provisioning experience, which requires an adequate distribution of Windows Server 2016 domain controllers relative to your existing authentication and the number of users included in your Windows Hello for Business deployment. Read the [Planning an adequate number of Windows Server 2016 Domain Controllers for Windows Hello for Business deployments](hello-adequate-domain-controllers.md) to learn more.
@ -86,9 +86,9 @@ The in-box Windows Hello for Business provisioning experience creates a hardware
#### Multifactor authentication #### Multifactor authentication
The goal of Windows Hello for Business is to move organizations away from passwords by providing them a strong credential that providers easy two-factor authentication. The inbox provisioning experience accepts the users weak credentials (username and password) as the first factor authentication; however, the user must provide a second factor of authentication before Windows provisions a strong credential. The goal of Windows Hello for Business is to move organizations away from passwords by providing them a strong credential that provides easy two-factor authentication. The inbox provisioning experience accepts the users weak credentials (username and password) as the first factor authentication; however, the user must provide a second factor of authentication before Windows provisions a strong credential.
Cloud only and hybrid deployments provide many choices for multifactor authentication. On-premises deployments must use a multifactor authentication that provides an AD FS multifactor adapter to be used in conjunction with the on-premises Windows Server 2016 AD FS server role. Organizations can use from the on-premises Azure Multifactor Authentication server, or choose from several third parties (Read [Microsoft and third-party additional authentication methods](https://docs.microsoft.com/windows-server/identity/ad-fs/operations/configure-additional-authentication-methods-for-ad-fs#microsoft-and-third-party-additional-authentication-methods) for more information). Cloud only and hybrid deployments provide many choices for multifactor authentication. On-premises deployments must use a multifactor authentication that provides an AD FS multifactor adapter to be used in conjunction with the on-premises Windows Server 2016 AD FS server role. Organizations can use the on-premises Azure Multifactor Authentication server, or choose from several third parties (Read [Microsoft and third-party additional authentication methods](https://docs.microsoft.com/windows-server/identity/ad-fs/operations/configure-additional-authentication-methods-for-ad-fs#microsoft-and-third-party-additional-authentication-methods) for more information).
>[!NOTE] >[!NOTE]
> Azure Multi-Factor Authentication is available through: > Azure Multi-Factor Authentication is available through:
>* Microsoft Enterprise Agreement >* Microsoft Enterprise Agreement
@ -102,11 +102,11 @@ Cloud only and hybrid deployments provide many choices for multifactor authentic
#### Directory synchronization #### Directory synchronization
Hybrid and on-premises deployments use directory synchronization, however, each for a different purpose. Hybrid deployments use Azure Active Directory Connect to synchronization Active Directory identities or credentials between itself and Azure Active Directory. This helps enable single sign-on to Azure Active Directory and its federated components. Hybrid and on-premises deployments use directory synchronization, however, each for a different purpose. Hybrid deployments use Azure Active Directory Connect to synchronize Active Directory identities or credentials between itself and Azure Active Directory. This helps enable single sign-on to Azure Active Directory and its federated components.
### Management ### Management
Windows Hello for Business provides organizations with a rich set of granular policy setting with which they can use to manage their devices and users. There are three ways in which you can manage Windows Hello for Business: Group Policy, Modern Management, and Mixed. Windows Hello for Business provides organizations with a rich set of granular policy settings with which they can use to manage their devices and users. There are three ways in which you can manage Windows Hello for Business: Group Policy, Modern Management, and Mixed.
#### Group Policy #### Group Policy
@ -129,11 +129,11 @@ Hybrid and on-premises deployments include Active Directory as part of their inf
### Public Key Infrastructure ### Public Key Infrastructure
The Windows Hello for Business deployment depends on an enterprise public key infrastructure a trust anchor for authentication. Domain controllers for hybrid and on-prem deployments need a certificate in order for Windows 10 devices to trust the domain controller as legitimate. Deployments using the certificate trust type need an enterprise public key infrastructure and a certificate registration authority to issue authentication certificates to users. Hybrid deployments may need to issue VPN certificates to users to enable connectivity on-premises resources. The Windows Hello for Business deployment depends on an enterprise public key infrastructure as a trust anchor for authentication. Domain controllers for hybrid and on-prem deployments need a certificate in order for Windows 10 devices to trust the domain controller as legitimate. Deployments using the certificate trust type need an enterprise public key infrastructure and a certificate registration authority to issue authentication certificates to users. Hybrid deployments may need to issue VPN certificates to users to enable connectivity on-premises resources.
### Cloud ### Cloud
Some deployment combinations require an Azure account and some require Azure Active Directory for user identities. These cloud requirements may only need an Azure account while other features need an Azure Active Directory Premium subscription. The planning process identifies and differentiate the components that are needed from the those that are optional. Some deployment combinations require an Azure account and some require Azure Active Directory for user identities. These cloud requirements may only need an Azure account while other features need an Azure Active Directory Premium subscription. The planning process identifies and differentiates the components that are needed from the those that are optional.
## Planning a Deployment ## Planning a Deployment
@ -147,13 +147,13 @@ Choose the deployment model based on the resources your users access. Use the f
If your organization does not have on-premises resources, write **Cloud Only** in box **1a** on your planning worksheet. If your organization does not have on-premises resources, write **Cloud Only** in box **1a** on your planning worksheet.
If your organization is federated with Azure or uses any online service, such as Office365 or OneDrive, or your users access cloud and on-premises resources, write **Hyrbid** in box **1a** on your planning worksheet. If your organization is federated with Azure or uses any online service, such as Office365 or OneDrive, or your users access cloud and on-premises resources, write **Hybrid** in box **1a** on your planning worksheet.
If your organization does not have cloud resources, write **On-Premises** in box **1a** on your planning worksheet. If your organization does not have cloud resources, write **On-Premises** in box **1a** on your planning worksheet.
>[!NOTE] >[!NOTE]
>If youre unsure if your organization is federated, run the following Active Directory Windows PowerShell command from and elevated Windows PowerShell prompt and evaluate the results. >If youre unsure if your organization is federated, run the following Active Directory Windows PowerShell command from an elevated Windows PowerShell prompt and evaluate the results.
>```Get-AdObject “CN=62a0ff2e-97b9-4513-943f-0d221bd30080,CN=Device Registration Configuration,CN=Services,CN=Configuration,DC=corp,DC=[forest_root_CN_name],DC=com -Properties keywords``` >```Get-AdObject “CN=62a0ff2e-97b9-4513-943f-0d221bd30080,CN=Device Registration Configuration,CN=Services,CN=Configuration,DC=corp,DC=[forest_root_CN_name],DC=com" -Properties keywords```
>* If the command returns an error stating it could not find the object, then you have yet to configured AAD Connect or on-premises Device Registration Services using AD FS. Ensure the name is accurate and validate the object does not exist with another Active Directory Management tool such as **ADSIEdit.msc**. If the object truly does not exists, then you environment does not bind you to a specific deployment or require changes to accommodate the desired deployment type. >* If the command returns an error stating it could not find the object, then you have yet to configured AAD Connect or on-premises Device Registration Services using AD FS. Ensure the name is accurate and validate the object does not exist with another Active Directory Management tool such as **ADSIEdit.msc**. If the object truly does not exist, then you environment does not bind you to a specific deployment or require changes to accommodate the desired deployment type.
>* If the command returns a value, compare that value with the values below. The value indicates the deployment model you should implement >* If the command returns a value, compare that value with the values below. The value indicates the deployment model you should implement
> * If the value begins with **azureADName:** write **Hybrid** in box **1a**on your planning worksheet. > * If the value begins with **azureADName:** write **Hybrid** in box **1a**on your planning worksheet.
> * If the value begins with **enterpriseDrsName:** write **On-Premises** in box **1a** on your planning worksheet. > * If the value begins with **enterpriseDrsName:** write **On-Premises** in box **1a** on your planning worksheet.
@ -235,7 +235,7 @@ If box **1a** on your planning worksheet reads **on-prem**, write **GP** in box
Managing hybrid deployments includes two categories of devices to consider for your Windows Hello for Business deployment—domain joined and non-domain joined. All devices are registered, however, not all devices are domain joined. You have the option of using Group Policy for domain joined devices and modern management for non-domain joined devices. Or, you can use modern management for both domain and non-domain joined devices. Managing hybrid deployments includes two categories of devices to consider for your Windows Hello for Business deployment—domain joined and non-domain joined. All devices are registered, however, not all devices are domain joined. You have the option of using Group Policy for domain joined devices and modern management for non-domain joined devices. Or, you can use modern management for both domain and non-domain joined devices.
If you use Group Policy to manage your domain joined devices, write **GP** in box **2a** on your planning worksheet, Write **modern management** in box **2b** if you decide to manage non-domain joined devices; otherwise, write **N/A**. If you use Group Policy to manage your domain joined devices, write **GP** in box **2a** on your planning worksheet. Write **modern management** in box **2b** if you decide to manage non-domain joined devices; otherwise, write **N/A**.
If you use modern management for both domain and non-domain joined devices, write **modern management** in box **2a** and **2b** on your planning worksheet. If you use modern management for both domain and non-domain joined devices, write **modern management** in box **2a** and **2b** on your planning worksheet.
@ -261,7 +261,7 @@ Write **1703 or later** in box **3a** on your planning worksheet if any of the f
### Active Directory ### Active Directory
The Active Directory portion of the planning guide should be complete. Most of conditions are baseline prerequisites except for your domain controllers. The domain controllers used in your deployment are decided by the chosen trust type. The Active Directory portion of the planning guide should be complete. Most of the conditions are baseline prerequisites except for your domain controllers. The domain controllers used in your deployment are decided by the chosen trust type.
Review the trust type portion of this section if box **4d** on your planning worksheet remains empty. Review the trust type portion of this section if box **4d** on your planning worksheet remains empty.
@ -306,7 +306,7 @@ Nearly all deployments of Windows Hello for Business require an Azure account.
If box **1a** on your planning worksheet reads **cloud only** or **hybrid**, write **Yes** in boxes **6a** and **6b** on your planning worksheet. If box **1a** on your planning worksheet reads **cloud only** or **hybrid**, write **Yes** in boxes **6a** and **6b** on your planning worksheet.
If box **1a** on your planning worksheet reads **on-premises**, and box **1f** reads **AD FS with third party**, write **No** in box **6a** on your planning worksheet. Otherwise, write **Yes** in box **1f** as you need an Azure account for per-consumption MFA billing. Write **No** in box **6b** on your planning worksheet—on-premises deployments do not use the cloud directory. If box **1a** on your planning worksheet reads **on-premises**, and box **1f** reads **AD FS with third party**, write **No** in box **6a** on your planning worksheet. Otherwise, write **Yes** in box **6a** as you need an Azure account for per-consumption MFA billing. Write **No** in box **6b** on your planning worksheet—on-premises deployments do not use the cloud directory.
Windows Hello for Business does not require an Azure AD premium subscription. However, some dependencies do. Windows Hello for Business does not require an Azure AD premium subscription. However, some dependencies do.

View File

@ -100,7 +100,7 @@ Before you create a thorough BitLocker recovery process, we recommend that you t
2. At the command prompt, type the following command and then press ENTER: 2. At the command prompt, type the following command and then press ENTER:
`manage-bde. -ComputerName <RemoteComputerName> -forcerecovery <BitLockerVolume>` `manage-bde. -ComputerName <RemoteComputerName> -forcerecovery <BitLockerVolume>`
> **Note:**  Recovery triggered by `-forcerecovery` persists for multiple restarts until a TPM protector is added or protection is suspended by the user. When using Modern Standby devices (such as Surface devices), the `-forcerecovery` option is not recommended because the OS will not boot after the recovery key is entered. Instead, the BitLocker recovery screen reappears until BitLocker protection is suspended or the OS drive is decrypted. > **Note:**  Recovery triggered by `-forcerecovery` persists for multiple restarts until a TPM protector is added or protection is suspended by the user. When using Modern Standby devices (such as Surface devices), the `-forcerecovery` option is not recommended because BitLocker will have to be unlocked and disabled manually from the WinRE environment before the OS can boot up again. For more information, see [BitLocker Troubleshooting: Continuous reboot loop with BitLocker recovery on a slate device](https://social.technet.microsoft.com/wiki/contents/articles/18671.bitlocker-troubleshooting-continuous-reboot-loop-with-bitlocker-recovery-on-a-slate-device.aspx).
   
## <a href="" id="bkmk-planningrecovery"></a>Planning your recovery process ## <a href="" id="bkmk-planningrecovery"></a>Planning your recovery process