diff --git a/windows/keep-secure/TOC.md b/windows/keep-secure/TOC.md index d687114889..3a3d3bcda1 100644 --- a/windows/keep-secure/TOC.md +++ b/windows/keep-secure/TOC.md @@ -1,14 +1,15 @@ # [Keep Windows 10 secure](index.md) ## [Block untrusted fonts in an enterprise](block-untrusted-fonts-in-enterprise.md) -## [Manage identity verification using Windows Hello for Business](manage-identity-verification-using-microsoft-passport.md) -### [Implement Windows Hello for Business in your organization](implement-microsoft-passport-in-your-organization.md) -### [Enable phone sign-in to PC or VPN](enable-phone-signin-to-pc-and-vpn.md) -### [Why a PIN is better than a password](why-a-pin-is-better-than-a-password.md) -### [Prepare people to use Windows Hello](prepare-people-to-use-microsoft-passport.md) -### [Windows Hello and password changes](microsoft-passport-and-password-changes.md) -### [Windows Hello errors during PIN creation](microsoft-passport-errors-during-pin-creation.md) -### [Event ID 300 - Windows Hello successfully created](passport-event-300.md) -### [Windows Hello biometrics in the enterprise](windows-hello-in-enterprise.md) +## [Windows Hello for Business](hello-identity-verification.md) +### [How Windows Hello for Business works](hello-how-it-works.md) +### [Manage Windows Hello for Business in your organization](hello-manage-in-organization.md) +### [Enable phone sign-in to PC or VPN](hello-enable-phone-signin.md) +### [Why a PIN is better than a password](hello-why-pin-is-better-than-password.md) +### [Prepare people to use Windows Hello](hello-prepare-people-to-use.md) +### [Windows Hello and password changes](hello-and-password-changes.md) +### [Windows Hello errors during PIN creation](hello-errors-during-pin-creation.md) +### [Event ID 300 - Windows Hello successfully created](hello-event-300.md) +### [Windows Hello biometrics in the enterprise](hello-biometrics-in-enterprise.md) ## [Configure S/MIME for Windows 10 and Windows 10 Mobile](configure-s-mime.md) ## [Install digital certificates on Windows 10 Mobile](installing-digital-certificates-on-windows-10-mobile.md) ## [Device Guard deployment guide](device-guard-deployment-guide.md) @@ -873,7 +874,6 @@ ###### [Verify That Network Traffic Is Authenticated](verify-that-network-traffic-is-authenticated.md) ## [Enterprise security guides](windows-10-enterprise-security-guides.md) ### [Control the health of Windows 10-based devices](protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md) -### [Microsoft Passport guide](microsoft-passport-guide.md) ### [Windows 10 Mobile security guide](windows-10-mobile-security-guide.md) ### [Windows 10 security overview](windows-10-security-guide.md) ### [Windows 10 credential theft mitigation guide abstract](windows-credential-theft-mitigation-guide-abstract.md) diff --git a/windows/keep-secure/app-behavior-with-wip.md b/windows/keep-secure/app-behavior-with-wip.md index bf932d459d..1f83aad42f 100644 --- a/windows/keep-secure/app-behavior-with-wip.md +++ b/windows/keep-secure/app-behavior-with-wip.md @@ -38,8 +38,8 @@ This table includes info about how unenlightened apps might behave, based on you
/*AppCompat*/
string/*AppCompat*/
string or proxy-based policiesApp rule setting | -Networking policy configuration for name-based policies, possibly using the /*AppCompat*/ string, or proxy-based policies |
+ Networking policy configuration for name-based policies, possibly using the /*AppCompat*/ string, or proxy-based policies | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Not required. App connects to enterprise cloud resources, using an IP address or a hostname. | diff --git a/windows/keep-secure/change-history-for-keep-windows-10-secure.md b/windows/keep-secure/change-history-for-keep-windows-10-secure.md index e5a7805ddf..2e7879cd8b 100644 --- a/windows/keep-secure/change-history-for-keep-windows-10-secure.md +++ b/windows/keep-secure/change-history-for-keep-windows-10-secure.md @@ -12,6 +12,7 @@ author: brianlic-msft # Change history for Keep Windows 10 secure This topic lists new and updated topics in the [Keep Windows 10 secure](index.md) documentation for [Windows 10 and Windows 10 Mobile](../index.md). + ## January 2017 |New or changed topic |Description | |---------------------|------------| @@ -19,6 +20,7 @@ This topic lists new and updated topics in the [Keep Windows 10 secure](index.md |[Limitations while using Windows Information Protection (WIP)](limitations-with-wip.md) |Updated to include info about USB drives and Azure RMS (Windows Insider Program only) and to add more info about Work Folders and Offline files. | |[Recommended Enterprise Cloud Resources and Neutral Resources network settings with Windows Information Protection (WIP)](recommended-network-definitions-for-wip.md) |New | |[Using Outlook Web Access with Windows Information Protection (WIP)](using-owa-with-wip.md) |New | +| Microsoft Passport guide | Content merged into [Windows Hello for Business](hello-identity-verification.md) topics | ## December 2016 |New or changed topic |Description | @@ -26,6 +28,7 @@ This topic lists new and updated topics in the [Keep Windows 10 secure](index.md |[Create WMI Filters for the GPO](create-wmi-filters-for-the-gpo.md) |Added filter examples for Windows 10 and Windows Server 2016. | + ## November 2016 | New or changed topic | Description | | --- | --- | @@ -33,6 +36,7 @@ This topic lists new and updated topics in the [Keep Windows 10 secure](index.md |[Create and deploy a VPN policy for Windows Information Protection (WIP) using Microsoft Intune](create-vpn-and-wip-policy-using-intune.md) |Changed WIPModeID to EDPModeID, to match the CSP. | + ## October 2016 | New or changed topic | Description | @@ -44,6 +48,7 @@ This topic lists new and updated topics in the [Keep Windows 10 secure](index.md |[VPN technical guide](vpn-guide.md) | Multiple new topics, replacing previous **VPN profile options** topic | |[Windows security baselines](windows-security-baselines.md) | Added Windows 10, version 1607 and Windows Server 2016 baseline | + ## September 2016 | New or changed topic | Description | diff --git a/windows/keep-secure/enable-phone-signin-to-pc-and-vpn.md b/windows/keep-secure/enable-phone-signin-to-pc-and-vpn.md index e3c6cbddf6..b3077d445a 100644 --- a/windows/keep-secure/enable-phone-signin-to-pc-and-vpn.md +++ b/windows/keep-secure/enable-phone-signin-to-pc-and-vpn.md @@ -6,7 +6,7 @@ ms.prod: W10 ms.mktglfcycl: deploy ms.sitesec: library author: jdeckerMS -localizationpriority: high +redirect_url: https://technet.microsoft.com/en-us/itpro/windows/keep-secure/hello-enable-phone-signin --- # Enable phone sign-in to PC or VPN @@ -17,74 +17,3 @@ localizationpriority: high - Windows 10 - Windows 10 Mobile -In Windows 10, version 1607, your network users can use Windows Phone with Windows Hello to sign in to a PC, connect to VPN, and sign in to Office 365 in a browser. Phone sign-in uses Bluetooth, which means no need to wait for a phone call -- just unlock the phone and tap the app. - - - -> [!NOTE] -> Phone sign-in is currently limited to select Technology Adoption Program (TAP) participants. - -You can create a Group Policy or mobile device management (MDM) policy that will allow users to sign in to a work PC or their company's VPN using the credentials stored on their Windows 10 phone. - - ## Prerequisites - - - Both phone and PC must be running Windows 10, version 1607. - - The PC must be running Windows 10 Pro, Enterprise, or Education - - Both phone and PC must have Bluetooth. - - The **Microsoft Authenticator** app must be installed on the phone. - - The PC must be joined to an Active Directory domain that is connected to an Azure Active Directory (Azure AD) domain, or the PC must be joined to Azure AD. - - The phone must be joined to Azure AD or have a work account added. - - The VPN configuration profile must use certificate-based authentication. - -## Set policies - -To enable phone sign-in, you must enable the following policies using Group Policy or MDM. - -- Group Policy: **Computer Configuration** or **User Configuration** > **Policies** > **Administrative Templates** > **Windows Components** > **Windows Hello for Business** - - Enable **Use Windows Hello for Business** - - Enable **Phone Sign-in** -- MDM: - - Set **UsePassportForWork** to **True** - - Set **Remote\UseRemotePassport** to **True** - -## Configure VPN - -To enable phone sign-in to VPN, you must enable the [policy](#set-policies) for phone sign-in and ensure that VPN is configured as follows: - -- For inbox VPN, set up the VPN profile with Extensible Authentication Protocol (EAP) with the **Smart card or other certificate (TLS)** EAP type, also known as EAP-Transport Level Security (EAP-TLS). To exclusively access the VPN certificates on the phone, in the EAP filtering XML, add either **EKU** or **Issuer** (or both) filtering to make sure it picks only the Remote NGC certificate. -- For a Universal Windows Platform (UWP) VPN plug-in, add filtering criteria based on the 3rd party mechanism for the Remote NGC Certificate. - -## Get the app - -If you want to distribute the **Microsoft Authenticator** app, your organization must have set up Windows Store for Business, with Microsoft added as a [Line of Business (LOB) publisher](../manage/working-with-line-of-business-apps.md). - -[Tell people how to sign in using their phone.](prepare-people-to-use-microsoft-passport.md#bmk-remote) - - -## Related topics - -[Manage identity verification using Windows Hello for Business](manage-identity-verification-using-microsoft-passport.md) - -[Implement Windows Hello for Business in your organization](implement-microsoft-passport-in-your-organization.md) - -[Why a PIN is better than a password](why-a-pin-is-better-than-a-password.md) - -[Prepare people to use Windows Hello](prepare-people-to-use-microsoft-passport.md) - -[Windows Hello and password changes](microsoft-passport-and-password-changes.md) - -[Windows Hello errors during PIN creation](microsoft-passport-errors-during-pin-creation.md) - -[Event ID 300 - Windows Hello successfully created](passport-event-300.md) - -[Windows Hello biometrics in the enterprise](windows-hello-in-enterprise.md) - - - - - - - - - - diff --git a/windows/keep-secure/hello-and-password-changes.md b/windows/keep-secure/hello-and-password-changes.md new file mode 100644 index 0000000000..b9937eeaa8 --- /dev/null +++ b/windows/keep-secure/hello-and-password-changes.md @@ -0,0 +1,49 @@ +--- +title: Windows Hello and password changes (Windows 10) +description: When you change your password on a device, you may need to sign in with a password on other devices to reset Hello. +ms.assetid: 83005FE4-8899-47A6-BEA9-C17CCA0B6B55 +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +author: jdeckerMS +localizationpriority: high +--- +# Windows Hello and password changes + +**Applies to** +- Windows 10 +- Windows 10 Mobile + +When you set up Windows Hello, the PIN or biometric gesture that you use is specific to that device. You can set up Hello for the same account on multiple devices. If the PIN or biometric is configured as part of Windows Hello for Business, changing the account password will not impact sign-in or unlock with these gestures since it uses a key or certificate. However, if Windows Hello for Business is not deployed and the password for that account changes, you must provide the new password on each device to continue to use Hello. + +## Example + +Let's suppose that you have set up a PIN for your Microsoft account on **Device A**. You use your PIN to sign in on **Device A** and then change the password for your Microsoft account. +Because you were using **Device A** when you changed your password, the PIN on **Device A** will continue to work with no other action on your part. + +Suppose instead that you sign in on **Device B** and change your password for your Microsoft account. The next time that you try to sign in on **Device A** using your PIN, sign-in will fail because the account credentials that Hello on **Device A** knows will be outdated. + +>[!NOTE] +>This example also applies to an Active Directory account when [Windows Hello for Business is not implemented](implement-microsoft-passport-in-your-organization.md). + +## How to update Hello after you change your password on another device + +1. When you try to sign in using your PIN or biometric, you will see the following message: **Your password was changed on a different device. You must sign in to this device once with your new password, and then you can sign in with your PIN.** +2. Click **OK.** +3. Click **Sign-in options**. +4. Click the **Password** button. +5. Sign in with new password. +6. The next time that you sign in, you can select **Sign-in options** and then select **PIN** to resume using your PIN. + +## Related topics + +- [Windows Hello for Business](hello-identity-verification.md) +- [How Windows Hello for Business works](hello-how-it-works.md) +- [Manage Windows Hello for Business in your organization](hello-manage-in-organization.md) +- [Enable phone sign-in to PC or VPN](hello-enable-phone-signin.md) +- [Why a PIN is better than a password](hello-why-pin-is-better-than-password.md) +- [Prepare people to use Windows Hello](hello-prepare-people-to-use.md) +- [Windows Hello errors during PIN creation](hello-errors-during-pin-creation.md) +- [Event ID 300 - Windows Hello successfully created](hello-event-300.md) +- [Windows Hello biometrics in the enterprise](hello-biometrics-in-enterprise.md) \ No newline at end of file diff --git a/windows/keep-secure/hello-biometrics-in-enterprise.md b/windows/keep-secure/hello-biometrics-in-enterprise.md new file mode 100644 index 0000000000..162ff7d762 --- /dev/null +++ b/windows/keep-secure/hello-biometrics-in-enterprise.md @@ -0,0 +1,97 @@ +--- +title: Windows Hello biometrics in the enterprise (Windows 10) +description: Windows Hello is the biometric authentication feature that helps strengthen authentication and helps to guard against potential spoofing through fingerprint matching and facial recognition. +ms.assetid: d3f27d94-2226-4547-86c0-65c84d6df8Bc +keywords: Windows Hello, enterprise biometrics +ms.prod: w10 +ms.mktglfcycl: explore +ms.sitesec: library +ms.pagetype: security +author: jdeckerMS +localizationpriority: high +--- + +# Windows Hello biometrics in the enterprise +**Applies to:** + +- Windows 10 + +Windows Hello is the biometric authentication feature that helps strengthen authentication and helps to guard against potential spoofing through fingerprint matching and facial recognition. + +>[!NOTE] +>When Windows 10 first shipped, it included Microsoft Passport and Windows Hello, which worked together to provide multi-factor authentication. To simplify deployment and improve supportability, Microsoft has combined these technologies into a single solution under the Windows Hello name. Customers who have already deployed these technologies will not experience any change in functionality. Customers who have yet to evaluate Windows Hello will find it easier to deploy due to simplified policies, documentation, and semantics. + +Because we realize your employees are going to want to use this new technology in your enterprise, we’ve been actively working with the device manufacturers to create strict design and performance recommendations that help to ensure that you can more confidently introduce Windows Hello biometrics into your organization. + +##How does Windows Hello work? +Windows Hello lets your employees use fingerprint or facial recognition as an alternative method to unlocking a device. With Windows Hello, authentication happens when the employee provides his or her unique biometric identifier while accessing the device-specific Windows Hello credentials. + +The Windows Hello authenticator works to authenticate and allow employees onto your enterprise network. Authentication doesn’t roam among devices, isn’t shared with a server, and can’t easily be extracted from a device. If multiple employees share a device, each employee will use his or her own biometric data on the device. + +## Why should I let my employees use Windows Hello? +Windows Hello provides many benefits, including: + +- It helps to strengthen your protections against credential theft. Because an attacker must have both the device and the biometric info or PIN, it’s much more difficult to gain access without the employee’s knowledge. + +- Employees get a simple authentication method (backed up with a PIN) that’s always with them, so there’s nothing to lose. No more forgetting passwords! + +- Support for Windows Hello is built into the operating system so you can add additional biometric devices and polices as part of a coordinated rollout or to individual employees or groups using Group Policy or Mobile Device Management (MDM) configurations service provider (CSP) policies.
Hex | +Cause | +Mitigation | +
---|---|---|
0x801C044D | +Authorization token does not contain device ID | +Unjoin the device from Azure AD and rejoin | +
0x80090036 | +User cancelled an interactive dialog | +User will be asked to try again | +
0x80090011 | +The container or key was not found | +Unjoin the device from Azure AD and rejoin | +
0x8009000F | +The container or key already exists | +Unjoin the device from Azure AD and rejoin | +
0x8009002A | +NTE_NO_MEMORY | +Close programs which are taking up memory and try again. | +
0x80090005 | +NTE_BAD_DATA | +Unjoin the device from Azure AD and rejoin | +
0x80090029 | +TPM is not set up. | +Sign on with an administrator account. Click **Start**, type "tpm.msc", and select **tpm.msc Microsoft Common Console Document**. In the **Actions** pane, select **Prepare the TPM**. | +
0x80090031 | +NTE_AUTHENTICATION_IGNORED | +Reboot the device. If the error occurs again after rebooting, [reset the TPM]( https://go.microsoft.com/fwlink/p/?LinkId=619969) or run [Clear-TPM](https://go.microsoft.com/fwlink/p/?LinkId=629650) | +
0x80090035 | +Policy requires TPM and the device does not have TPM. | +Change the Passport policy to not require a TPM. | +
0x801C0003 | +User is not authorized to enroll | +Check if the user has permission to perform the operation. | +
0x801C000E | +Registration quota reached | +Unjoin some other device that is currently joined using the same account or [increase the maximum number of devices per user](https://go.microsoft.com/fwlink/p/?LinkId=626933). |
+
0x801C000F | +Operation successful but the device requires a reboot | +Reboot the device. | +
0x801C0010 | +The AIK certificate is not valid or trusted | +Sign out and then sign in again. | +
0x801C0011 | +The attestation statement of the transport key is invalid | +Sign out and then sign in again. | +
0x801C0012 | +Discovery request is not in a valid format | +Sign out and then sign in again. | +
0x801C0015 | +The device is required to be joined to an Active Directory domain | +Join the device to an Active Directory domain. | +
0x801C0016 | +The federation provider configuration is empty | +Go to [http://clientconfig.microsoftonline-p.net/FPURL.xml](http://clientconfig.microsoftonline-p.net/FPURL.xml) and verify that the file is not empty. | +
0x801C0017 | +The federation provider domain is empty | +Go to [http://clientconfig.microsoftonline-p.net/FPURL.xml](http://clientconfig.microsoftonline-p.net/FPURL.xml) and verify that the FPDOMAINNAME element is not empty. | +
0x801C0018 | +The federation provider client configuration URL is empty | +Go to [http://clientconfig.microsoftonline-p.net/FPURL.xml](http://clientconfig.microsoftonline-p.net/FPURL.xml) and verify that the CLIENTCONFIG element contains a valid URL. | +
0x801C03E9 | +Server response message is invalid | +Sign out and then sign in again. | +
0x801C03EA | +Server failed to authorize user or device. | +Check if the token is valid and user has permission to register Passport keys. | +
0x801C03EB | +Server response http status is not valid | +Sign out and then sign in again. | +
0x801C03EC | +Unhandled exception from server. | +sign out and then sign in again. | +
0x801C03ED | +Multi-factor authentication is required for a 'ProvisionKey' operation, but was not performed +-or- +Token was not found in the Authorization header +-or- +Failed to read one or more objects +-or- The request sent to the server was invalid. |
+Sign out and then sign in again. If that doesn't resolve the issue, unjoin the device from Azure Active Directory (Azure AD) and rejoin. | +
0x801C03EE | +Attestation failed | +Sign out and then sign in again. | +
0x801C03EF | +The AIK certificate is no longer valid | +Sign out and then sign in again. | +
0x801C044D | +Unable to obtain user token | +Sign out and then sign in again. Check network and credentials. | +
0x801C044E | +Failed to receive user creds input | +Sign out and then sign in again. | +
Policy | +Options | +|
---|---|---|
Use Windows Hello for Business | ++ |
+ Not configured: Users can provision Windows Hello for Business, which encrypts their domain password. +Enabled: Device provisions Windows Hello for Business using keys or certificates for all users. +Disabled: Device does not provision Windows Hello for Business for any user. + |
+
Use a hardware security device | ++ |
+ Not configured: Windows Hello for Business will be provisioned using TPM if available, and will be provisioned using software if TPM is not available. +Enabled: Windows Hello for Business will only be provisioned using TPM. +Disabled: Windows Hello for Business will be provisioned using TPM if available, and will be provisioned using software if TPM is not available. + |
+
Use biometrics | ++ |
+ Not configured: Biometrics can be used as a gesture in place of a PIN. +Enabled: Biometrics can be used as a gesture in place of a PIN. +Disabled: Only a PIN can be used as a gesture. + |
+
PIN Complexity | +Require digits | +
+ Not configured: Users must include a digit in their PIN. +Enabled: Users must include a digit in their PIN. +Disabled: Users cannot use digits in their PIN. + |
+
Require lowercase letters | +
+ Not configured: Users cannot use lowercase letters in their PIN. +Enabled: Users must include at least one lowercase letter in their PIN. +Disabled: Users cannot use lowercase letters in their PIN. + |
+|
Maximum PIN length | +
+ Not configured: PIN length must be less than or equal to 127. +Enabled: PIN length must be less than or equal to the number you specify. +Disabled: PIN length must be less than or equal to 127. + |
+|
Minimum PIN length | +
+ Not configured: PIN length must be greater than or equal to 4. +Enabled: PIN length must be greater than or equal to the number you specify. +Disabled: PIN length must be greater than or equal to 4. + |
+|
Expiration | +
+ Not configured: PIN does not expire. +Enabled: PIN can be set to expire after any number of days between 1 and 730, or PIN can be set to never expire by setting policy to 0. +Disabled: PIN does not expire. + |
+|
History | +
+ Not configured: Previous PINs are not stored. +Enabled: Specify the number of previous PINs that can be associated to a user account that can't be reused. +Disabled: Previous PINs are not stored. +Note Current PIN is included in PIN history.
+ |
+|
Require special characters | +
+ Not configured: Users cannot include a special character in their PIN. +Enabled: Users must include at least one special character in their PIN. +Disabled: Users cannot include a special character in their PIN. + |
+|
Require uppercase letters | +
+ Not configured: Users cannot include an uppercase letter in their PIN. +Enabled: Users must include at least one uppercase letter in their PIN. +Disabled: Users cannot include an uppercase letter in their PIN. + |
+|
Phone Sign-in | +
+ Use Phone Sign-in +Note Applies to desktop only. Phone sign-in is currently limited to select Technology Adoption Program (TAP) participants.
+ |
+
+ Not configured: Phone sign-in is disabled. +Enabled: Users can use a portable, registered device as a companion device for desktop authentication. +Disabled: Phone sign-in is disabled. + |
+
Policy | +Scope | +Default | +Options | +|
---|---|---|---|---|
UsePassportForWork | ++ | Device | +True | +
+ True: Windows Hello for Business will be provisioned for all users on the device. +False: Users will not be able to provision Windows Hello for Business. +Note If Windows Hello for Business is enabled, and then the policy is changed to False, users who previously set up Windows Hello for Business can continue to use it, but will not be able to set up Windows Hello for Business on other devices.
+ |
+
RequireSecurityDevice | ++ | Device | +False | +
+ True: Windows Hello for Business will only be provisioned using TPM. +False: Windows Hello for Business will be provisioned using TPM if available, and will be provisioned using software if TPM is not available. + |
+
Biometrics | +
+ UseBiometrics + |
+Device | +False | +
+ True: Biometrics can be used as a gesture in place of a PIN for domain sign-in. +False: Only a PIN can be used as a gesture for domain sign-in. + |
+
+ FacialFeaturesUser +EnhancedAntiSpoofing + |
+Device | +Not configured | +
+ Not configured: users can choose whether to turn on enhanced anti-spoofing. +True: Enhanced anti-spoofing is required on devices which support it. +False: Users cannot turn on enhanced anti-spoofing. + |
+|
PINComplexity | +||||
Digits | +Device or user | +2 | +
+ 1: Numbers are not allowed. +2: At least one number is required. + |
+|
Lowercase letters | +Device or user | +1 | +
+ 1: Lowercase letters are not allowed. +2: At least one lowercase letter is required. + |
+|
Maximum PIN length | +Device or user | +127 | +
+ Maximum length that can be set is 127. Maximum length cannot be less than minimum setting. + |
+|
Minimum PIN length | +Device or user | +4 | +
+ Minimum length that can be set is 4. Minimum length cannot be greater than maximum setting. + |
+|
Expiration | +Device or user | +0 | +
+ Integer value specifies the period of time (in days) that a PIN can be used before the system requires the user to change it. The largest number you can configure for this policy setting is 730. The lowest number you can configure for this policy setting is 0. If this policy is set to 0, then the user’s PIN will never expire. + + |
+|
History | +Device or user | +0 | +
+ Integer value that specifies the number of past PINs that can be associated to a user account that can’t be reused. The largest number you can configure for this policy setting is 50. The lowest number you can configure for this policy setting is 0. If this policy is set to 0, then storage of previous PINs is not required. + + |
+|
Special characters | +Device or user | +1 | +
+ 1: Special characters are not allowed. +2: At least one special character is required. + |
+|
Uppercase letters | +Device or user | +1 | +
+ 1: Uppercase letters are not allowed +2: At least one uppercase letter is required + |
+|
Remote | +
+ UseRemotePassport +Note Applies to desktop only. Phone sign-in is currently limited to select Technology Adoption Program (TAP) participants.
+ |
+Device or user | +False | +
+ True: Phone sign-in is enabled. +False: Phone sign-in is disabled. + |
+
Windows Hello for Business mode | +Azure AD | +Active Directory (AD) on-premises (available with production release of Windows Server 2016) | +Azure AD/AD hybrid (available with production release of Windows Server 2016) | +
---|---|---|---|
Key-based authentication | +Azure AD subscription | +
|
+
|
+
Certificate-based authentication | +
|
+
|
+
|
+
Policy | -Options | -|
---|---|---|
Use Windows Hello for Business | -- |
- Not configured: Users can provision Windows Hello for Business, which encrypts their domain password. -Enabled: Device provisions Windows Hello for Business using keys or certificates for all users. -Disabled: Device does not provision Windows Hello for Business for any user. - |
-
Use a hardware security device | -- |
- Not configured: Windows Hello for Business will be provisioned using TPM if available, and will be provisioned using software if TPM is not available. -Enabled: Windows Hello for Business will only be provisioned using TPM. -Disabled: Windows Hello for Business will be provisioned using TPM if available, and will be provisioned using software if TPM is not available. - |
-
Use biometrics | -- |
- Not configured: Biometrics can be used as a gesture in place of a PIN. -Enabled: Biometrics can be used as a gesture in place of a PIN. -Disabled: Only a PIN can be used as a gesture. - |
-
PIN Complexity | -Require digits | -
- Not configured: Users must include a digit in their PIN. -Enabled: Users must include a digit in their PIN. -Disabled: Users cannot use digits in their PIN. - |
-
Require lowercase letters | -
- Not configured: Users cannot use lowercase letters in their PIN. -Enabled: Users must include at least one lowercase letter in their PIN. -Disabled: Users cannot use lowercase letters in their PIN. - |
-|
Maximum PIN length | -
- Not configured: PIN length must be less than or equal to 127. -Enabled: PIN length must be less than or equal to the number you specify. -Disabled: PIN length must be less than or equal to 127. - |
-|
Minimum PIN length | -
- Not configured: PIN length must be greater than or equal to 4. -Enabled: PIN length must be greater than or equal to the number you specify. -Disabled: PIN length must be greater than or equal to 4. - |
-|
Expiration | -
- Not configured: PIN does not expire. -Enabled: PIN can be set to expire after any number of days between 1 and 730, or PIN can be set to never expire by setting policy to 0. -Disabled: PIN does not expire. - |
-|
History | -
- Not configured: Previous PINs are not stored. -Enabled: Specify the number of previous PINs that can be associated to a user account that can't be reused. -Disabled: Previous PINs are not stored. -Note Current PIN is included in PIN history.
- |
-|
Require special characters | -
- Not configured: Users cannot include a special character in their PIN. -Enabled: Users must include at least one special character in their PIN. -Disabled: Users cannot include a special character in their PIN. - |
-|
Require uppercase letters | -
- Not configured: Users cannot include an uppercase letter in their PIN. -Enabled: Users must include at least one uppercase letter in their PIN. -Disabled: Users cannot include an uppercase letter in their PIN. - |
-|
Phone Sign-in | -
- Use Phone Sign-in -Note Applies to desktop only. Phone sign-in is currently limited to select Technology Adoption Program (TAP) participants.
- |
-
- Not configured: Phone sign-in is disabled. -Enabled: Users can use a portable, registered device as a companion device for desktop authentication. -Disabled: Phone sign-in is disabled. - |
-
Policy | -Scope | -Default | -Options | -|
---|---|---|---|---|
UsePassportForWork | -- | Device | -True | -
- True: Windows Hello for Business will be provisioned for all users on the device. -False: Users will not be able to provision Windows Hello for Business. -Note If Windows Hello for Business is enabled, and then the policy is changed to False, users who previously set up Windows Hello for Business can continue to use it, but will not be able to set up Windows Hello for Business on other devices.
- |
-
RequireSecurityDevice | -- | Device | -False | -
- True: Windows Hello for Business will only be provisioned using TPM. -False: Windows Hello for Business will be provisioned using TPM if available, and will be provisioned using software if TPM is not available. - |
-
Biometrics | -
- UseBiometrics - |
-Device | -False | -
- True: Biometrics can be used as a gesture in place of a PIN for domain sign-in. -False: Only a PIN can be used as a gesture for domain sign-in. - |
-
- FacialFeaturesUser -EnhancedAntiSpoofing - |
-Device | -Not configured | -
- Not configured: users can choose whether to turn on enhanced anti-spoofing. -True: Enhanced anti-spoofing is required on devices which support it. -False: Users cannot turn on enhanced anti-spoofing. - |
-|
PINComplexity | -||||
Digits | -Device or user | -2 | -
- 1: Numbers are not allowed. -2: At least one number is required. - |
-|
Lowercase letters | -Device or user | -1 | -
- 1: Lowercase letters are not allowed. -2: At least one lowercase letter is required. - |
-|
Maximum PIN length | -Device or user | -127 | -
- Maximum length that can be set is 127. Maximum length cannot be less than minimum setting. - |
-|
Minimum PIN length | -Device or user | -4 | -
- Minimum length that can be set is 4. Minimum length cannot be greater than maximum setting. - |
-|
Expiration | -Device or user | -0 | -
- Integer value specifies the period of time (in days) that a PIN can be used before the system requires the user to change it. The largest number you can configure for this policy setting is 730. The lowest number you can configure for this policy setting is 0. If this policy is set to 0, then the user’s PIN will never expire. - - |
-|
History | -Device or user | -0 | -
- Integer value that specifies the number of past PINs that can be associated to a user account that can’t be reused. The largest number you can configure for this policy setting is 50. The lowest number you can configure for this policy setting is 0. If this policy is set to 0, then storage of previous PINs is not required. - - |
-|
Special characters | -Device or user | -1 | -
- 1: Special characters are not allowed. -2: At least one special character is required. - |
-|
Uppercase letters | -Device or user | -1 | -
- 1: Uppercase letters are not allowed. -2: At least one uppercase letter is required - |
-|
Remote | -
- UseRemotePassport -Note Applies to desktop only. Phone sign-in is currently limited to select Technology Adoption Program (TAP) participants.
- |
-Device or user | -False | -
- True: Phone sign-in is enabled. -False: Phone sign-in is disabled. - |
-
Windows Hello for Business mode | -Azure AD | -Azure AD/AD hybrid (available with production release of Windows Server 2016) | -
---|---|---|
Key-based authentication | -[Azure AD subscription](https://docs.microsoft.com/azure/active-directory/active-directory-howto-tenant) | -
|
-
Certificate-based authentication | -
|
-
|
-
Hex | -Cause | -Mitigation | -
---|---|---|
0x801C044D | -Authorization token does not contain device ID | -Unjoin the device from Azure AD and rejoin | -
0x80090036 | -User cancelled an interactive dialog | -User will be asked to try again | -
0x80090011 | -The container or key was not found | -Unjoin the device from Azure AD and rejoin | -
0x8009000F | -The container or key already exists | -Unjoin the device from Azure AD and rejoin | -
0x8009002A | -NTE_NO_MEMORY | -Close programs which are taking up memory and try again. | -
0x80090005 | -NTE_BAD_DATA | -Unjoin the device from Azure AD and rejoin | -
0x80090029 | -TPM is not set up. | -Sign on with an administrator account. Click **Start**, type "tpm.msc", and select **tpm.msc Microsoft Common Console Document**. In the **Actions** pane, select **Prepare the TPM**. | -
0x80090031 | -NTE_AUTHENTICATION_IGNORED | -Reboot the device. If the error occurs again after rebooting, [reset the TPM]( https://go.microsoft.com/fwlink/p/?LinkId=619969) or run [Clear-TPM](https://go.microsoft.com/fwlink/p/?LinkId=629650) | -
0x80090035 | -Policy requires TPM and the device does not have TPM. | -Change the Passport policy to not require a TPM. | -
0x801C0003 | -User is not authorized to enroll | -Check if the user has permission to perform the operation. | -
0x801C000E | -Registration quota reached | -Unjoin some other device that is currently joined using the same account or [increase the maximum number of devices per user](https://go.microsoft.com/fwlink/p/?LinkId=626933). |
-
0x801C000F | -Operation successful but the device requires a reboot | -Reboot the device. | -
0x801C0010 | -The AIK certificate is not valid or trusted | -Sign out and then sign in again. | -
0x801C0011 | -The attestation statement of the transport key is invalid | -Sign out and then sign in again. | -
0x801C0012 | -Discovery request is not in a valid format | -Sign out and then sign in again. | -
0x801C0015 | -The device is required to be joined to an Active Directory domain | -Join the device to an Active Directory domain. | -
0x801C0016 | -The federation provider configuration is empty | -Go to [http://clientconfig.microsoftonline-p.net/FPURL.xml](http://clientconfig.microsoftonline-p.net/FPURL.xml) and verify that the file is not empty. | -
0x801C0017 | -The federation provider domain is empty | -Go to [http://clientconfig.microsoftonline-p.net/FPURL.xml](http://clientconfig.microsoftonline-p.net/FPURL.xml) and verify that the FPDOMAINNAME element is not empty. | -
0x801C0018 | -The federation provider client configuration URL is empty | -Go to [http://clientconfig.microsoftonline-p.net/FPURL.xml](http://clientconfig.microsoftonline-p.net/FPURL.xml) and verify that the CLIENTCONFIG element contains a valid URL. | -
0x801C03E9 | -Server response message is invalid | -Sign out and then sign in again. | -
0x801C03EA | -Server failed to authorize user or device. | -Check if the token is valid and user has permission to register Passport keys. | -
0x801C03EB | -Server response http status is not valid | -Sign out and then sign in again. | -
0x801C03EC | -Unhandled exception from server. | -sign out and then sign in again. | -
0x801C03ED | -Multi-factor authentication is required for a 'ProvisionKey' operation, but was not performed --or- -Token was not found in the Authorization header --or- -Failed to read one or more objects --or- The request sent to the server was invalid. |
-Sign out and then sign in again. If that doesn't resolve the issue, unjoin the device from Azure Active Directory (Azure AD) and rejoin. | -
0x801C03EE | -Attestation failed | -Sign out and then sign in again. | -
0x801C03EF | -The AIK certificate is no longer valid | -Sign out and then sign in again. | -
0x801C044D | -Unable to obtain user token | -Sign out and then sign in again. Check network and credentials. | -
0x801C044E | -Failed to receive user creds input | -Sign out and then sign in again. | -
Microsoft Passport method | -Azure AD | -Hybrid Active Directory | -
---|---|---|
Key-based | -Azure AD subscription |
-
|
-
Certificate-based | -Azure AD subscription -PKI infrastructure -Intune |
-
|
-
[Control the health of Windows 10-based devices](protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md)
This article details an end-to-end solution that helps you protect high-value assets by enforcing, controlling, and reporting the health of Windows 10-based devices.
[Microsoft Passport guide](microsoft-passport-guide.md)
This guide describes the new Windows Hello and Microsoft Passport technologies that are part of the Windows 10 operating system. It highlights specific capabilities of these technologies that help mitigate threats from conventional credentials and provides guidance about how to design and deploy these technologies as part of your Windows 10 rollout.
[Windows 10 Mobile security guide](windows-10-mobile-security-guide.md)
This guide provides a detailed description of the most important security features in the Windows 10 Mobile operating system—identity access and control, data protection, malware resistance, and app platform security.