anti-hammering introduction final changes

hopefully
This commit is contained in:
Dani Halfin 2017-04-25 14:08:31 -07:00
parent 42ddbc6dbc
commit abdf1314bb
2 changed files with 2 additions and 2 deletions

View File

@ -48,7 +48,7 @@ The Windows Hello for Business PIN is subject to the same set of IT management p
## What if someone steals the laptop or phone?
To compromise a Windows Hello credential that TPM protects, an attacker must have access to the physical device, and then must find a way to spoof the users biometrics or guess his or her PIN—and all of this must be done before TPM anti-hammer capabilities lock the device.
To compromise a Windows Hello credential that TPM protects, an attacker must have access to the physical device, and then must find a way to spoof the users biometrics or guess his or her PIN—and all of this must be done before [TPM anti-hammering](/windows/device-security/tpm/tpm-fundamentals#anti-hammering) protection locks the device.
You can provide additional protection for laptops that don't have TPM by enablng BitLocker and setting a policy to limit failed sign-ins.
**Configure BitLocker without TPM**

View File

@ -47,7 +47,7 @@ The following sections provide an overview of the technologies that support the
- [TPM Key Attestation](#key-attestation)
- [How the TPM mitigates dictionary attacks](#how-the-tpm-mitigates-dictionary-attacks)
- [Anti-hammering](#anti-hammering)
The following topic describes the TPM Services that can be controlled centrally by using Group Policy settings:
[TPM Group Policy Settings](trusted-platform-module-services-group-policy-settings.md).