Merge remote-tracking branch 'origin/master' into atp-datetime
@ -227,7 +227,12 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source_path": "windows/manage/set-up-a-device-for-anyone-to-use.md",
|
"source_path": "windows/manage/set-up-a-device-for-anyone-to-use.md",
|
||||||
"redirect_url": "/windows/configuration/set-up-a-device-for-anyone-to-use",
|
"redirect_url": "/windows/configuration/kiosk-shared-pc",
|
||||||
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/configuration/set-up-a-device-for-anyone-to-use.md",
|
||||||
|
"redirect_url": "/windows/configuration/kiosk-shared-pc",
|
||||||
"redirect_document_id": true
|
"redirect_document_id": true
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
@ -7647,7 +7652,7 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source_path": "windows/manage/manage-corporate-devices.md",
|
"source_path": "windows/manage/manage-corporate-devices.md",
|
||||||
"redirect_url": "/windows/client-management/manage-corporate-devices",
|
"redirect_url": "/windows/client-management/index",
|
||||||
"redirect_document_id": true
|
"redirect_document_id": true
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
144
bcs/index.md
@ -4,6 +4,7 @@ hide_bc: true
|
|||||||
author: CelesteDG
|
author: CelesteDG
|
||||||
ms.author: celested
|
ms.author: celested
|
||||||
ms.topic: hub-page
|
ms.topic: hub-page
|
||||||
|
ms.localizationpriority: high
|
||||||
audience: microsoft-business
|
audience: microsoft-business
|
||||||
title: Microsoft 365 Business documentation and resources
|
title: Microsoft 365 Business documentation and resources
|
||||||
description: Learn about the product documentation and resources available for Microsoft 365 Business partners, IT admins, information workers, and business owners.
|
description: Learn about the product documentation and resources available for Microsoft 365 Business partners, IT admins, information workers, and business owners.
|
||||||
@ -12,7 +13,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
<div class="container">
|
<div class="container">
|
||||||
<ul class="cardsY panelContent featuredContent">
|
<ul class="cardsY panelContent featuredContent">
|
||||||
<li>
|
<li>
|
||||||
<a href="http://www.microsoft.com/en-us/microsoft-365/business">
|
<a href="http://www.microsoft.com/en-us/microsoft-365/business" target="_blank">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
@ -30,7 +31,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</a>
|
</a>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
<a href="https://support.office.com/article/496e690b-b75d-4ff5-bf34-cc32905d0364">
|
<a href="https://support.office.com/article/496e690b-b75d-4ff5-bf34-cc32905d0364" target="_blank">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
@ -40,7 +41,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
<div class="cardText">
|
<div class="cardText">
|
||||||
<span class="likeAnH3">For Partners and IT admins:<br />Get Started with Microsoft 365 Business</span>
|
<span class="likeAnH3">For Partners and IT admins:<br />Get started with Microsoft 365 Business</span>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
@ -56,7 +57,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
<a href="#partner-it">Partner/IT admin</a>
|
<a href="#partner-it">Partner/IT admin</a>
|
||||||
<ul id="partner-it">
|
<ul id="partner-it">
|
||||||
<li>
|
<li>
|
||||||
<a data-default="true" href="#getstarted">Get Started</a>
|
<a data-default="true" href="#getstarted">Get started</a>
|
||||||
<ul id="getstarted" class="cardsC">
|
<ul id="getstarted" class="cardsC">
|
||||||
<li class="fullSpan">
|
<li class="fullSpan">
|
||||||
<div class="container intro">
|
<div class="container intro">
|
||||||
@ -64,7 +65,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</div>
|
</div>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
<a href="http://www.microsoft.com/en-us/microsoft-365/business">
|
<a href="http://www.microsoft.com/en-us/microsoft-365/business" target="_blank">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
@ -74,8 +75,8 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
<div class="cardText">
|
<div class="cardText">
|
||||||
<h3>Learn about Microsoft 365 Business</h3>
|
<h3>Why Microsoft 365 Business?</h3>
|
||||||
<p>Want to learn more about Microsoft 365 Business? Start here.</p>
|
<p>Learn how Microsoft 365 Business can empower your team, safeguard your business, and simplify IT management with a single solution.</p>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
@ -83,7 +84,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</a>
|
</a>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
<a href="support/microsoft-365-business-faqs.md">
|
<a href="support/microsoft-365-business-faqs.md" target="_blank">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
@ -102,7 +103,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</a>
|
</a>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
<a href="https://support.office.com/article/496e690b-b75d-4ff5-bf34-cc32905d0364">
|
<a href="https://support.office.com/article/496e690b-b75d-4ff5-bf34-cc32905d0364" target="_blank">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
@ -131,7 +132,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</div>
|
</div>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
<a href="https://support.office.com/article/96153102-1db1-4df8-bca5-38cea80b65ce">
|
<a href="https://support.office.com/article/96153102-1db1-4df8-bca5-38cea80b65ce" target="_blank">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
@ -150,7 +151,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</a>
|
</a>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
<a href="https://support.office.com/article/d5155593-3bac-4d8d-9d8b-f4513a81479e">
|
<a href="https://support.office.com/article/d5155593-3bac-4d8d-9d8b-f4513a81479e" target="_blank">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
@ -179,7 +180,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</div>
|
</div>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
<a href="https://support.office.com/article/ed34fff3-2881-4ed4-9906-1ba6bb8dd804">
|
<a href="https://support.office.com/article/ed34fff3-2881-4ed4-9906-1ba6bb8dd804" target="_blank">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
@ -198,7 +199,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</a>
|
</a>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
<a href="https://support.office.com/article/cbc6bfe5-565a-4fb8-95f0-b06e7b74ac46">
|
<a href="https://support.office.com/article/cbc6bfe5-565a-4fb8-95f0-b06e7b74ac46" target="_blank">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
@ -217,7 +218,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</a>
|
</a>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
<a href="https://support.office.com/article/80bdae57-f8bc-4e40-a58c-956007117ecb">
|
<a href="https://support.office.com/article/80bdae57-f8bc-4e40-a58c-956007117ecb" target="_blank">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
@ -236,7 +237,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</a>
|
</a>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
<a href="https://support.office.com/article/c4db6caf-74df-4734-b1dd-53e371c7a3c3">
|
<a href="https://support.office.com/article/c4db6caf-74df-4734-b1dd-53e371c7a3c3" target="_blank">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
@ -265,7 +266,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</div>
|
</div>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
<a href="https://support.office.com/article/bd66c26c-73a4-45a8-8642-3ea4ee7cd89d">
|
<a href="https://support.office.com/article/bd66c26c-73a4-45a8-8642-3ea4ee7cd89d" target="_blank">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
@ -284,7 +285,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</a>
|
</a>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
<a href="https://support.office.com/article/6b70fa27-d171-4593-8ecf-f78bb4ed2e99">
|
<a href="https://support.office.com/article/6b70fa27-d171-4593-8ecf-f78bb4ed2e99" target="_blank">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
@ -332,7 +333,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</a>
|
</a>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
<a href="#">
|
<a href="https://support.office.com/article/365-1b3b5318-6977-42ed-b5c7-96fa74b08846" target="_blank">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
@ -342,8 +343,8 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
<div class="cardText">
|
<div class="cardText">
|
||||||
<h3>Identity migration</h3>
|
<h3>Identity migration with Azure AD Connect</h3>
|
||||||
<p>Got on-premises AD and plan to move your organization’s identity management to the cloud? Do a one-time sync using <a href="https://support.office.com/article/365-1b3b5318-6977-42ed-b5c7-96fa74b08846">Azure AD Connect</a>, or, if you have Exchange servers and plan to also migrate email to the cloud, do a one-time sync using <a href="https://support.office.com/article/FDECCEED-0702-4AF3-85BE-F2A0013937EF">Minimal hybrid migration</a>.</p>
|
<p>Got on-premises AD and plan to move your organization’s identity management to the cloud? Do a one-time sync using Azure AD Connect.<a href="https://support.office.com/article/FDECCEED-0702-4AF3-85BE-F2A0013937EF">Minimal hybrid migration</a>.</p>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
@ -351,7 +352,26 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</a>
|
</a>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
<a href="https://support.office.com/article/2d7ff45e-0da0-4caa-89a9-48cabf41f193">
|
<a href="https://support.office.com/article/FDECCEED-0702-4AF3-85BE-F2A0013937EF" target="_blank">
|
||||||
|
<div class="cardSize">
|
||||||
|
<div class="cardPadding">
|
||||||
|
<div class="card">
|
||||||
|
<div class="cardImageOuter">
|
||||||
|
<div class="cardImage bgdAccent1">
|
||||||
|
<img src="images/bcs-partner-identity-manager.svg" alt="Identity integration" />
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
<div class="cardText">
|
||||||
|
<h3>Identity migration with minimal hybrid migration</h3>
|
||||||
|
<p>Or, if you have Exchange servers and plan to also migrate email to the cloud, do a one-time sync using minimal hybrid migration.</p>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</a>
|
||||||
|
</li>
|
||||||
|
<li>
|
||||||
|
<a href="https://support.office.com/article/2d7ff45e-0da0-4caa-89a9-48cabf41f193" target="_blank">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
@ -380,7 +400,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</div>
|
</div>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
<a href="https://www.microsoft.com/solution-providers/search">
|
<a href="https://www.microsoft.com/solution-providers/search" target="_blank">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
@ -398,6 +418,25 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</div>
|
</div>
|
||||||
</a>
|
</a>
|
||||||
</li>
|
</li>
|
||||||
|
<li>
|
||||||
|
<a href="https://support.office.com/article/496e690b-b75d-4ff5-bf34-cc32905d0364#bkmk_support" target="_blank">
|
||||||
|
<div class="cardSize">
|
||||||
|
<div class="cardPadding">
|
||||||
|
<div class="card">
|
||||||
|
<div class="cardImageOuter">
|
||||||
|
<div class="cardImage bgdAccent1">
|
||||||
|
<img src="images/bcs-partner-advanced-management-technical-support-4.svg" alt="Submit a technical support request for Microsoft 365 Business" />
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
<div class="cardText">
|
||||||
|
<h3>Microsoft Technical Support</h3>
|
||||||
|
<p>Submit a technical support request for Microsoft 365 Business.</p>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</a>
|
||||||
|
</li>
|
||||||
<li>
|
<li>
|
||||||
<a href="#">
|
<a href="#">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
@ -416,26 +455,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
</a>
|
</a>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
|
||||||
<a href="#">
|
|
||||||
<div class="cardSize">
|
|
||||||
<div class="cardPadding">
|
|
||||||
<div class="card">
|
|
||||||
<div class="cardImageOuter">
|
|
||||||
<div class="cardImage bgdAccent1">
|
|
||||||
<img src="images/bcs-partner-advanced-management-technical-support-4.svg" alt="Submit a technical support request for Microsoft 365 Business" />
|
|
||||||
</div>
|
|
||||||
</div>
|
|
||||||
<div class="cardText">
|
|
||||||
<h3>Microsoft Technical Support - Coming soon</h3>
|
|
||||||
<p>Submit a technical support request for Microsoft 365 Business.</p>
|
|
||||||
</div>
|
|
||||||
</div>
|
|
||||||
</div>
|
|
||||||
</div>
|
|
||||||
</a>
|
|
||||||
</li>
|
|
||||||
</ul>
|
</ul>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
@ -468,7 +488,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</li>
|
</li>
|
||||||
-->
|
-->
|
||||||
<li>
|
<li>
|
||||||
<a href="https://docs.microsoft.com/windows">
|
<a href="https://docs.microsoft.com/en-us/windows/windows-10/" target="_blank">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
@ -479,7 +499,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</div>
|
</div>
|
||||||
<div class="cardText">
|
<div class="cardText">
|
||||||
<h3>Windows 10</h3>
|
<h3>Windows 10</h3>
|
||||||
<p>Learn more about Windows 10.</p>
|
<p>Find out what's new, how to apply custom configurations to devices, managing apps, deployment, and more.</p>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
@ -487,7 +507,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</a>
|
</a>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
<a href="https://msdn.microsoft.com/partner-center/autopilot">
|
<a href="https://msdn.microsoft.com/partner-center/autopilot" target="_blank">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
@ -516,7 +536,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</div>
|
</div>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
<a href="https://support.office.com/article/1970f7d6-03b5-442f-b385-5880b9c256ec">
|
<a href="https://support.office.com/article/1970f7d6-03b5-442f-b385-5880b9c256ec" target="_blank">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
@ -535,7 +555,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</a>
|
</a>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
<a href="https://support.office.com/article/365-2d2fa996-b760-411d-a5cc-190d63f13207">
|
<a href="https://support.office.com/article/365-2d2fa996-b760-411d-a5cc-190d63f13207" target="_blank">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
@ -575,7 +595,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</li>
|
</li>
|
||||||
-->
|
-->
|
||||||
<li>
|
<li>
|
||||||
<a href="https://support.office.com/article/74a1ef8b-3844-4d08-9980-9f8f7a36000f">
|
<a href="https://support.office.com/article/74a1ef8b-3844-4d08-9980-9f8f7a36000f" target="_blank">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
@ -594,7 +614,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</a>
|
</a>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
<a href="https://support.office.com/article/7a5d073b-7fae-4aa5-8f96-9ecd041aba9c">
|
<a href="https://support.office.com/article/7a5d073b-7fae-4aa5-8f96-9ecd041aba9c" target="_blank">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
@ -613,7 +633,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</a>
|
</a>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
<a href="https://support.office.com/article/ea7bf1b2-1c2f-477f-a813-313e3ce0d896">
|
<a href="https://support.office.com/article/ea7bf1b2-1c2f-477f-a813-313e3ce0d896" target="_blank">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
@ -632,7 +652,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</a>
|
</a>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
<a href="https://support.office.com/article/a27f1a99-3557-4f85-9560-a28e3d822a40">
|
<a href="https://support.office.com/article/a27f1a99-3557-4f85-9560-a28e3d822a40" target="_blank">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
@ -651,7 +671,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</a>
|
</a>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
<a href="https://support.office.com/article/46c667f7-5073-47b9-a75f-05a60cf77d91">
|
<a href="https://support.office.com/article/46c667f7-5073-47b9-a75f-05a60cf77d91" target="_blank">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
@ -690,7 +710,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</div>
|
</div>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
<a href="https://support.office.com/article/d868561b-d340-4c04-a973-e2575d7f09bc">
|
<a href="https://support.office.com/article/d868561b-d340-4c04-a973-e2575d7f09bc" target="_blank">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
@ -709,9 +729,9 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</a>
|
</a>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
<a href="https://support.office.com/article/eb8244aa-a302-481a-b2b5-d34e88b18ec7">
|
<a href="https://support.office.com/article/eb8244aa-a302-481a-b2b5-d34e88b18ec7" target="_blank">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
<div class="cardImageOuter">
|
<div class="cardImageOuter">
|
||||||
<div class="cardImage bgdAccent1">
|
<div class="cardImage bgdAccent1">
|
||||||
@ -728,7 +748,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</a>
|
</a>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
<a href="https://support.office.com/article/2d7ff45e-0da0-4caa-89a9-48cabf41f193">
|
<a href="https://support.office.com/article/2d7ff45e-0da0-4caa-89a9-48cabf41f193" target="_blank">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
@ -747,7 +767,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</a>
|
</a>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
<a href="https://support.office.com/article/c654bd23-d256-4ac7-8fba-0c993bf5a771">
|
<a href="https://support.office.com/article/2d7ff45e-0da0-4caa-89a9-48cabf41f193" target="_blank">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
@ -776,7 +796,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</div>
|
</div>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
<a href="http://support.office.com">
|
<a href="http://support.office.com" target="_blank">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
@ -795,7 +815,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</a>
|
</a>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
<a href="http://support.microsoft.com/products/windows">
|
<a href="http://support.microsoft.com/products/windows" target="_blank">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
@ -829,7 +849,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</div>
|
</div>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
<a href="http://www.microsoft.com/en-us/microsoft-365/business">
|
<a href="http://www.microsoft.com/en-us/microsoft-365/business" target="_blank">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
@ -848,7 +868,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</a>
|
</a>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
<a href="support/microsoft-365-business-faqs.md">
|
<a href="support/microsoft-365-business-faqs.md" target="_blank">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
@ -867,7 +887,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</a>
|
</a>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
<a href="https://www.microsoft.com/solution-providers/search">
|
<a href="https://www.microsoft.com/solution-providers/search" target="_blank">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
|
@ -5,9 +5,10 @@ author: CelesteDG
|
|||||||
ms.author: celested
|
ms.author: celested
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.prod: microsoft-365-business
|
ms.prod: microsoft-365-business
|
||||||
|
ms.localizationpriority: high
|
||||||
audience: microsoft-business
|
audience: microsoft-business
|
||||||
keywords: Microsoft 365 Business, Microsoft 365, SMB, FAQ, frequently asked questions, answers
|
keywords: Microsoft 365 Business, Microsoft 365, SMB, FAQ, frequently asked questions, answers
|
||||||
ms.date: 07/10/2017
|
ms.date: 08/04/2017
|
||||||
---
|
---
|
||||||
|
|
||||||
# Microsoft 365 Business Frequently Asked Questions
|
# Microsoft 365 Business Frequently Asked Questions
|
||||||
@ -147,7 +148,7 @@ Who has access to the Microsoft 365 Business preview?
|
|||||||
The Microsoft 365 Business preview is available to new customers as well as existing Office 365 subscribers in all [markets where Office 365 is currently available](https://products.office.com/en-us/business/international-availability).
|
The Microsoft 365 Business preview is available to new customers as well as existing Office 365 subscribers in all [markets where Office 365 is currently available](https://products.office.com/en-us/business/international-availability).
|
||||||
|
|
||||||
I’m an existing Office 365 customer. Can I access the Microsoft 365 Business preview?
|
I’m an existing Office 365 customer. Can I access the Microsoft 365 Business preview?
|
||||||
--------------------------------------------------------------------------------------
|
-------------------------------------------------------------------------------------
|
||||||
|
|
||||||
Microsoft 365 Business can be used with existing Office 365 Business Premium subscriptions. Office 365 Business Premium subscribers that move to Microsoft 365 Business would not experience any end-user impacts (re-install Office, lose functionality, etc) upon assignment of the license. Customers running Office 365 Enterprise E3/E5 may experience end user impacts if they move to Microsoft 365 Business, it is not a recommended transition path at this time.
|
Microsoft 365 Business can be used with existing Office 365 Business Premium subscriptions. Office 365 Business Premium subscribers that move to Microsoft 365 Business would not experience any end-user impacts (re-install Office, lose functionality, etc) upon assignment of the license. Customers running Office 365 Enterprise E3/E5 may experience end user impacts if they move to Microsoft 365 Business, it is not a recommended transition path at this time.
|
||||||
|
|
||||||
@ -185,8 +186,9 @@ Is there any charge for the Microsoft 365 Business preview?
|
|||||||
No, Microsoft will not charge for the preview. If you work with an outside [IT partner](https://partnercenter.microsoft.com/en-us/pcv/search) and require assistance to deploy Microsoft 365 Business preview, they may charge you for their deployment services and assistance. At the end of the preview customers may convert to a paid subscription to continue using Microsoft 365 Business.
|
No, Microsoft will not charge for the preview. If you work with an outside [IT partner](https://partnercenter.microsoft.com/en-us/pcv/search) and require assistance to deploy Microsoft 365 Business preview, they may charge you for their deployment services and assistance. At the end of the preview customers may convert to a paid subscription to continue using Microsoft 365 Business.
|
||||||
|
|
||||||
I’m an existing Office 365 customer. Will I be charged for an Office 365 subscription while I am using the Microsoft 365 Business preview?
|
I’m an existing Office 365 customer. Will I be charged for an Office 365 subscription while I am using the Microsoft 365 Business preview?
|
||||||
|
------------------------------------------------------------------------------------------------------------------------------------------
|
||||||
|
|
||||||
Customers will continue to be charged for any active Office 365 plan to which they are subscribed.
|
The Microsoft 365 Business preview is free and does not require an existing Office 365 Business Premium subscription. Current Office 365 customers will continue to be billed for active Office 365 subscriptions that are not associated with the Microsoft 365 Business preview.
|
||||||
|
|
||||||
What is the best way to deploy Microsoft 365 Business in my organization?
|
What is the best way to deploy Microsoft 365 Business in my organization?
|
||||||
--------------------------------------------------------------------------
|
--------------------------------------------------------------------------
|
||||||
|
@ -37,6 +37,7 @@ Microsoft Edge lets you stay up-to-date through the Windows Store and to manage
|
|||||||
| [Available policies for Microsoft Edge](available-policies.md) |Microsoft Edge works with Group Policy and Microsoft Intune to help you manage your organization's computer settings.<br><br>Group Policy objects (GPO's) can include registry-based Administrative Template policy settings, security settings, software deployment information, scripts, folder redirection, and preferences. By using Group Policy and Intune, you can set up a policy setting once, and then copy that setting onto many computers. For example, you can set up multiple security settings in a GPO that's linked to a domain, and then apply all of those settings to every computer in the domain. |
|
| [Available policies for Microsoft Edge](available-policies.md) |Microsoft Edge works with Group Policy and Microsoft Intune to help you manage your organization's computer settings.<br><br>Group Policy objects (GPO's) can include registry-based Administrative Template policy settings, security settings, software deployment information, scripts, folder redirection, and preferences. By using Group Policy and Intune, you can set up a policy setting once, and then copy that setting onto many computers. For example, you can set up multiple security settings in a GPO that's linked to a domain, and then apply all of those settings to every computer in the domain. |
|
||||||
| [Use Enterprise Mode to improve compatibility](emie-to-improve-compatibility.md) |If you have specific web sites and apps that you know have compatibility problems with Microsoft Edge, you can use the Enterprise Mode site list so that the web sites will automatically open using Internet Explorer 11. Additionally, if you know that your intranet sites aren't going to work properly with Microsoft Edge, you can set all intranet sites to automatically open using IE11.<br><br>Using Enterprise Mode means that you can continue to use Microsoft Edge as your default browser, while also ensuring that your apps continue working on IE11. |
|
| [Use Enterprise Mode to improve compatibility](emie-to-improve-compatibility.md) |If you have specific web sites and apps that you know have compatibility problems with Microsoft Edge, you can use the Enterprise Mode site list so that the web sites will automatically open using Internet Explorer 11. Additionally, if you know that your intranet sites aren't going to work properly with Microsoft Edge, you can set all intranet sites to automatically open using IE11.<br><br>Using Enterprise Mode means that you can continue to use Microsoft Edge as your default browser, while also ensuring that your apps continue working on IE11. |
|
||||||
| [Security enhancements for Microsoft Edge](security-enhancements-microsoft-edge.md) |Microsoft Edge is designed with significant security improvements over existing browsers, helping to defend people from increasingly sophisticated and prevalent web-based attacks against Windows. |
|
| [Security enhancements for Microsoft Edge](security-enhancements-microsoft-edge.md) |Microsoft Edge is designed with significant security improvements over existing browsers, helping to defend people from increasingly sophisticated and prevalent web-based attacks against Windows. |
|
||||||
|
|[Microsoft Edge Frequently Asked Questions (FAQs)](microsoft-edge-faq.md)|Answering frequently asked questions about Microsoft Edge features, integration, support, and potential problems.
|
||||||
|
|
||||||
## Interoperability goals and enterprise guidance
|
## Interoperability goals and enterprise guidance
|
||||||
|
|
||||||
|
@ -5,4 +5,5 @@
|
|||||||
##[Available policies for Microsoft Edge](available-policies.md)
|
##[Available policies for Microsoft Edge](available-policies.md)
|
||||||
##[Use Enterprise Mode to improve compatibility](emie-to-improve-compatibility.md)
|
##[Use Enterprise Mode to improve compatibility](emie-to-improve-compatibility.md)
|
||||||
##[Security enhancements for Microsoft Edge](security-enhancements-microsoft-edge.md)
|
##[Security enhancements for Microsoft Edge](security-enhancements-microsoft-edge.md)
|
||||||
|
##[Microsoft Edge Frequently Asked Questions (FAQs)](microsoft-edge-faq.md)
|
||||||
|
|
||||||
|
83
browsers/edge/microsoft-edge-faq.md
Normal file
@ -0,0 +1,83 @@
|
|||||||
|
---
|
||||||
|
title: Microsoft Edge - Frequently Asked Questions (FAQs) for IT Pros (Microsoft Edge for IT Pros)
|
||||||
|
description: Answering frequently asked questions about Microsoft Edge features, integration, support, and potential problems.
|
||||||
|
author: eross-msft
|
||||||
|
ms.author: lizross
|
||||||
|
ms.prod: edge
|
||||||
|
ms.mktglfcycl: general
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.localizationpriority: high
|
||||||
|
---
|
||||||
|
|
||||||
|
# Microsoft Edge - Frequently Asked Questions (FAQs) for IT Pros
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
|
|
||||||
|
- Windows 10
|
||||||
|
- Windows 10 Mobile
|
||||||
|
|
||||||
|
**Q: What is the difference between Microsoft Edge and Internet Explorer 11? How do I know which one to use?**
|
||||||
|
|
||||||
|
**A:** Microsoft Edge is the default browser for all Windows 10 devices. It is built to be highly compatible with the modern web. For some enterprise web apps and a small set of sites on the web that were built to work with older technologies like ActiveX, [you can use Enterprise Mode](https://docs.microsoft.com/en-us/microsoft-edge/deploy/emie-to-improve-compatibility) to automatically send users to Internet Explorer 11 for those sites.
|
||||||
|
|
||||||
|
For more information on how Internet Explorer and Microsoft Edge can work together to support your legacy web apps, while still defaulting to the higher bar for security and modern experiences enabled by Microsoft Edge, see [Legacy apps in the enterprise](https://blogs.windows.com/msedgedev/2017/04/07/legacy-web-apps-enterprise/#RAbtRvJSYFaKu2BI.97).
|
||||||
|
|
||||||
|
**Q: Does Microsoft Edge work with Enterprise Mode?**
|
||||||
|
|
||||||
|
**A:** [Enterprise Mode](https://docs.microsoft.com/en-us/internet-explorer/ie11-deploy-guide/enterprise-mode-overview-for-ie11) offers better backward compatibility and enables customers to run many legacy web applications. Microsoft Edge and Internet Explorer can be configured to use the same Enterprise Mode Site List, switching seamlessly between browsers to support both modern and legacy web apps. For guidance and additional resources, please visit the [Microsoft Edge IT Center](https://technet.microsoft.com/en-us/microsoft-edge).
|
||||||
|
|
||||||
|
|
||||||
|
**Q: I have Windows 10, but I don’t seem to have Microsoft Edge. Why?**
|
||||||
|
|
||||||
|
**A:** Long-Term Servicing Branch (LTSB) versions of Windows, including Windows Server 2016, don't include Microsoft Edge or many other Universal Windows Platform (UWP) apps. These apps and their services are frequently updated with new functionality and can't be supported on systems running LTSB operating systems. For customers who require the LTSB for specialized devices, we recommend using Internet Explorer 11.
|
||||||
|
|
||||||
|
**Q: How do I get the latest Canary/Beta/Preview version of Microsoft Edge?**
|
||||||
|
|
||||||
|
**A:** You can access the latest preview version of Microsoft Edge by updating to the latest Windows 10 preview via the [Windows Insider Program](https://insider.windows.com/). To run the preview version of Microsoft Edge on a stable version of Windows 10 (or any other OS), you can download a [Virtual Machine](https://developer.microsoft.com/en-us/microsoft-edge/tools/vms/windows/) that we provide or use the upcoming RemoteEdge service.
|
||||||
|
|
||||||
|
**Q: How do I customize Microsoft Edge and related settings for my organization?**
|
||||||
|
|
||||||
|
**A:** You can use Group Policy or Microsoft Intune to manage settings related to Microsoft Edge, such as security settings, folder redirection, and preferences. See [Group Policy and Mobile Device Management (MDM) settings for Microsoft Edge](https://docs.microsoft.com/en-us/microsoft-edge/deploy/available-policies) for a list of available policies for Microsoft Edge.
|
||||||
|
|
||||||
|
**Q: Is Adobe Flash supported in Microsoft Edge?**
|
||||||
|
|
||||||
|
**A:** Currently, Adobe Flash is supported as a built-in feature of Microsoft Edge on devices running the desktop version of Windows 10. In July 2017, Adobe announced that Flash will no longer be supported after 2020. We will phase out Flash from Microsoft Edge and Internet Explorer, culminating in the removal of Flash from Windows entirely by the end of 2020. This process began already for Microsoft Edge with [Click-to-Run for Flash](https://blogs.windows.com/msedgedev/2016/12/14/edge-flash-click-run/) in the Windows 10 Creators Update.
|
||||||
|
|
||||||
|
For more information about the phasing out of Flash, read the [End of an Era – Next Steps for Adobe Flash](https://blogs.windows.com/msedgedev/2017/07/25/flash-on-windows-timeline/#85ZBy7aiVlDQHebO.97) blog post.
|
||||||
|
|
||||||
|
**Q: Does Microsoft Edge support ActiveX controls or BHOs like Silverlight or Java?**
|
||||||
|
|
||||||
|
**A:** No, ActiveX controls and BHOs such as Silverlight or Java are not supported in Microsoft Edge. The need for ActiveX controls has been significantly reduced by modern web standards, which are more interoperable across browsers. We are working on plans for an extension model based on the modern web platform in Microsoft Edge. We look forward to sharing more details on these plans soon. Not supporting legacy controls in Microsoft Edge provides many benefits including better interoperability with other modern browsers, as well as increased performance, security, and reliability.
|
||||||
|
|
||||||
|
**Q: How often will Microsoft Edge be updated?**
|
||||||
|
|
||||||
|
**A:** In Windows 10, we are delivering Windows as a service, updated on a cadence driven by quality and the availability of new features. Microsoft Edge security updates are released every two to four weeks, and the bigger feature updates are currently pushed out with the Windows 10 releases on a semi-annual cadence.
|
||||||
|
|
||||||
|
**Q: How can I provide feedback on Microsoft Edge?**
|
||||||
|
|
||||||
|
**A:** Microsoft Edge is an evergreen browser and we will continue to evolve both the web platform and the user interface with regular updates. To send feedback on user experience, or on broken or malicious sites, you can use the **Send Feedback** option under the ellipses icon (**...**) in the Microsoft Edge toolbar. You can also provide feedback through the [Microsoft Edge Dev Twitter](https://twitter.com/MSEdgeDev) account.
|
||||||
|
|
||||||
|
**Q: Will Internet Explorer 11 continue to receive updates?**
|
||||||
|
|
||||||
|
**A:** We will continue to deliver security updates to Internet Explorer 11 through its supported lifespan. To ensure consistent behavior across Windows versions, we will evaluate Internet Explorer 11 bugs for servicing on a case by case basis. The latest features and platform updates will only be available in Microsoft Edge.
|
||||||
|
|
||||||
|
**Q: I loaded a web page and Microsoft Edge sent me to Internet Explorer - what happened?**
|
||||||
|
|
||||||
|
**A:** In some cases, Internet Explorer loads automatically for sites that still rely on legacy technologies such as ActiveX. For more information, read [Legacy web apps in the enterprise](https://blogs.windows.com/msedgedev/2017/04/07/legacy-web-apps-enterprise/#uHpbs94kAaVsU1qB.97).
|
||||||
|
|
||||||
|
**Q: Why is Do Not Track (DNT) off by default in Microsoft Edge?**
|
||||||
|
|
||||||
|
**A:** When Microsoft first set the Do Not Track setting to “On” by default in Internet Explorer 10, industry standards had not yet been established. We are now making this default change as the World Wide Web Consortium (W3C) formalizes industry standards to recommend that default settings allow customers to actively indicate whether they want to enable DNT. As a result, DNT will not be enabled by default in upcoming versions of Microsoft’s browsers, but we will provide customers with clear information on how to turn this feature on in the browser settings should you wish to do so.
|
||||||
|
|
||||||
|
**Q: How do I find out what version of Microsoft Edge I have?**
|
||||||
|
|
||||||
|
**A:** Open Microsoft Edge. In the upper right corner click the ellipses icon (**…**), and then click **Settings**. Look in the **About this app** section to find your version.
|
||||||
|
|
||||||
|
**Q: What is Microsoft EdgeHTML?**
|
||||||
|
|
||||||
|
**A:** Microsoft EdgeHTML is the new web rendering engine that powers the Microsoft Edge web browser and Windows 10 web app platform, and that helps web developers build and maintain a consistent site across all modern browsers. The Microsoft EdgeHTML engine also helps to defend against hacking through support for the W3C standard for [Content Security Policy (CSP)](https://developer.microsoft.com/microsoft-edge/platform/documentation/dev-guide/security/content-Security-Policy), which can help web developers defend their sites against cross-site scripting attacks, and support for the [HTTP Strict Transport Security (HSTS)](https://developer.microsoft.com/microsoft-edge/platform/documentation/dev-guide/security/HSTS/) security feature (IETF-standard compliant), which helps ensure that connections to important sites, such as to your bank, are always secured.
|
||||||
|
|
||||||
|
**Q: Will Windows 7 or Windows 8.1 users get Microsoft Edge or the new Microsoft EdgeHTML rendering engine?**
|
||||||
|
|
||||||
|
**A:** Microsoft Edge has been designed and built to showcase Windows 10 features like Cortana, and is built on top of the Universal Windows Platform. Although we don’t have any plans to bring Microsoft Edge to Windows 7 or Windows 8.1 at this time, you can test Microsoft Edge with older versions of Internet Explorer using [free virtual machines](https://developer.microsoft.com/en-us/microsoft-edge/tools/vms/).
|
||||||
|
|
@ -1,13 +1,15 @@
|
|||||||
---
|
---
|
||||||
ms.localizationpriority: low
|
title: Check for a new Enterprise Mode site list xml file (Internet Explorer 11 for IT Pros)
|
||||||
|
description: You can have centralized control over Enterprise Mode by creating a single, global XML site list that includes the list of websites to render using Enterprise Mode.
|
||||||
|
ms.assetid: 2bbc7017-622e-4baa-8981-c0bbda10e9df
|
||||||
|
ms.prod: ie11
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.pagetype: appcompat
|
ms.pagetype: appcompat
|
||||||
description: You can have centralized control over Enterprise Mode by creating a single, global XML site list that includes the list of websites to render using Enterprise Mode.
|
|
||||||
author: eross-msft
|
|
||||||
ms.prod: ie11
|
|
||||||
ms.assetid: 2bbc7017-622e-4baa-8981-c0bbda10e9df
|
|
||||||
title: Check for a new Enterprise Mode site list xml file (Internet Explorer 11 for IT Pros)
|
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
author: eross-msft
|
||||||
|
ms.author: lizross
|
||||||
|
ms.date: 08/11/2017
|
||||||
|
ms.localizationpriority: low
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|
||||||
@ -23,7 +25,7 @@ ms.sitesec: library
|
|||||||
|
|
||||||
You can have centralized control over Enterprise Mode by creating a single, global XML site list that includes the list of websites to render using Enterprise Mode. You can add and remove sites from your XML list as frequently as you want, changing which sites should render in Enterprise Mode for your employees. For information about turning on Enterprise Mode and using site lists, see [Turn on Enterprise Mode and use a site list](turn-on-enterprise-mode-and-use-a-site-list.md).
|
You can have centralized control over Enterprise Mode by creating a single, global XML site list that includes the list of websites to render using Enterprise Mode. You can add and remove sites from your XML list as frequently as you want, changing which sites should render in Enterprise Mode for your employees. For information about turning on Enterprise Mode and using site lists, see [Turn on Enterprise Mode and use a site list](turn-on-enterprise-mode-and-use-a-site-list.md).
|
||||||
|
|
||||||
The information in this topic only covers HTTP protocol. We strongly recommend that you use HTTP protocol instead of file protocol due to increased performance.
|
The information in this topic only covers HTTPS protocol. We strongly recommend that you use HTTPS protocol instead of file protocol due to increased performance.
|
||||||
|
|
||||||
**How Internet Explorer 11 looks for an updated site list**
|
**How Internet Explorer 11 looks for an updated site list**
|
||||||
|
|
||||||
|
Before Width: | Height: | Size: 30 KiB After Width: | Height: | Size: 39 KiB |
Before Width: | Height: | Size: 14 KiB After Width: | Height: | Size: 18 KiB |
@ -1,13 +1,20 @@
|
|||||||
---
|
---
|
||||||
ms.localizationpriority: low
|
title: Turn on Enterprise Mode and use a site list (Internet Explorer 11 for IT Pros)
|
||||||
|
description: How to turn on Enterprise Mode and specify a site list.
|
||||||
|
ms.assetid: 800e9c5a-57a6-4d61-a38a-4cb972d833e1
|
||||||
|
ms.prod: ie11
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.pagetype: appcompat
|
ms.pagetype: appcompat
|
||||||
description: How to turn on Enterprise Mode and specify a site list.
|
|
||||||
author: eross-msft
|
|
||||||
ms.prod: ie11
|
|
||||||
ms.assetid: 800e9c5a-57a6-4d61-a38a-4cb972d833e1
|
|
||||||
title: Turn on Enterprise Mode and use a site list (Internet Explorer 11 for IT Pros)
|
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
author: eross-msft
|
||||||
|
ms.author: lizross
|
||||||
|
ms.date: 08/11/2017
|
||||||
|
ms.localizationpriority: low
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|
||||||
@ -23,8 +30,8 @@ ms.sitesec: library
|
|||||||
|
|
||||||
Before you can use a site list with Enterprise Mode, you need to turn the functionality on and set up the system for centralized control. By allowing centralized control, you can create one global list of websites that render using Enterprise Mode. Approximately 65 seconds after Internet Explorer 11 starts, it looks for a properly formatted site list. If a new site list if found, with a different version number than the active list, IE11 loads and uses the newer version. After the initial check, IE11 won’t look for an updated list again until you restart the browser.
|
Before you can use a site list with Enterprise Mode, you need to turn the functionality on and set up the system for centralized control. By allowing centralized control, you can create one global list of websites that render using Enterprise Mode. Approximately 65 seconds after Internet Explorer 11 starts, it looks for a properly formatted site list. If a new site list if found, with a different version number than the active list, IE11 loads and uses the newer version. After the initial check, IE11 won’t look for an updated list again until you restart the browser.
|
||||||
|
|
||||||
**Note**<br>
|
>[!NOTE]
|
||||||
We recommend that you store and download your website list from a secure web sever (https://), to help protect against data tampering. After the list is downloaded, it's stored locally on your employee’s computers so if the centralized file location is unavailable, they can still use Enterprise Mode.
|
>We recommend that you store and download your website list from a secure web server (https://), to help protect against data tampering. After the list is downloaded, it's stored locally on your employees' computers so if the centralized file location is unavailable, they can still use Enterprise Mode.
|
||||||
|
|
||||||
**To turn on Enterprise Mode using Group Policy**
|
**To turn on Enterprise Mode using Group Policy**
|
||||||
|
|
||||||
@ -45,7 +52,7 @@ Turning this setting on also requires you to create and store a site list. For m
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
- **HTTP location**: `"SiteList"="http://localhost:8080/sites.xml"`
|
- **HTTPS location**: `"SiteList"="https://localhost:8080/sites.xml"`
|
||||||
|
|
||||||
- **Local network:** `"SiteList"="\\network\shares\sites.xml"`
|
- **Local network:** `"SiteList"="\\network\shares\sites.xml"`
|
||||||
|
|
||||||
|
@ -33,12 +33,14 @@
|
|||||||
### [Install apps on your Surface Hub](install-apps-on-surface-hub.md)
|
### [Install apps on your Surface Hub](install-apps-on-surface-hub.md)
|
||||||
### [Set up and use Whiteboard to Whiteboard collaboration](whiteboard-collaboration.md)
|
### [Set up and use Whiteboard to Whiteboard collaboration](whiteboard-collaboration.md)
|
||||||
### [End a Surface Hub meeting with End session](i-am-done-finishing-your-surface-hub-meeting.md)
|
### [End a Surface Hub meeting with End session](i-am-done-finishing-your-surface-hub-meeting.md)
|
||||||
|
### [Sign in to Surface Hub with Microsoft Authenticator](surface-hub-authenticator-app.md)
|
||||||
### [Save your BitLocker key](save-bitlocker-key-surface-hub.md)
|
### [Save your BitLocker key](save-bitlocker-key-surface-hub.md)
|
||||||
### [Connect other devices and display with Surface Hub](connect-and-display-with-surface-hub.md)
|
### [Connect other devices and display with Surface Hub](connect-and-display-with-surface-hub.md)
|
||||||
### [Miracast on existing wireless network or LAN](miracast-over-infrastructure.md)
|
### [Miracast on existing wireless network or LAN](miracast-over-infrastructure.md)
|
||||||
### [Using a room control system](use-room-control-system-with-surface-hub.md)
|
### [Using a room control system](use-room-control-system-with-surface-hub.md)
|
||||||
## [PowerShell for Surface Hub](appendix-a-powershell-scripts-for-surface-hub.md)
|
## [PowerShell for Surface Hub](appendix-a-powershell-scripts-for-surface-hub.md)
|
||||||
## [How Surface Hub addresses Wi-Fi Direct security issues](surface-hub-wifi-direct.md)
|
## [How Surface Hub addresses Wi-Fi Direct security issues](surface-hub-wifi-direct.md)
|
||||||
|
## [Top support solutions for Surface Hub](support-solutions-surface-hub.md)
|
||||||
## [Troubleshoot Microsoft Surface Hub](troubleshoot-surface-hub.md)
|
## [Troubleshoot Microsoft Surface Hub](troubleshoot-surface-hub.md)
|
||||||
## [Troubleshoot Miracast on Surface Hub](miracast-troubleshooting.md)
|
## [Troubleshoot Miracast on Surface Hub](miracast-troubleshooting.md)
|
||||||
## [Useful downloads for Surface Hub administrators](surface-hub-downloads.md)
|
## [Useful downloads for Surface Hub administrators](surface-hub-downloads.md)
|
||||||
|
@ -9,7 +9,7 @@ ms.pagetype: surfacehub
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
ms.author: jdecker
|
ms.author: jdecker
|
||||||
ms.date: 06/19/2017
|
ms.date: 08/17/2017
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -24,7 +24,6 @@ The full list of accessibility settings are available to IT admins in the **Sett
|
|||||||
|
|
||||||
| Accessibility feature | Default settings |
|
| Accessibility feature | Default settings |
|
||||||
| --------------------- | ----------------- |
|
| --------------------- | ----------------- |
|
||||||
| Narrator | Off |
|
|
||||||
| Magnifier | Off |
|
| Magnifier | Off |
|
||||||
| High contrast | No theme selected |
|
| High contrast | No theme selected |
|
||||||
| Closed captions | Defaults selected for Font and Background and window |
|
| Closed captions | Defaults selected for Font and Background and window |
|
||||||
@ -32,6 +31,17 @@ The full list of accessibility settings are available to IT admins in the **Sett
|
|||||||
| Mouse | Defaults selected for **Pointer size**, **Pointer color** and **Mouse keys**. |
|
| Mouse | Defaults selected for **Pointer size**, **Pointer color** and **Mouse keys**. |
|
||||||
| Other options | Defaults selected for **Visual options** and **Touch feedback**. |
|
| Other options | Defaults selected for **Visual options** and **Touch feedback**. |
|
||||||
|
|
||||||
|
The accessibility feature Narrator is not available in the **Settings** app. By default, Narrator is turned off. To change the default settings for Narrator, perform the following steps using a keyboard and mouse.
|
||||||
|
|
||||||
|
1. Dismiss the Welcome screen.
|
||||||
|
2. Open **Quick Actions** > **Ease of Access** from the status bar.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
3. Turn Narrator on.
|
||||||
|
4. Click **Task Switcher**.
|
||||||
|
5. Select **Narrator Settings** from Task Switcher. You can now edit the default Narrator settings.
|
||||||
|
|
||||||
Additionally, these accessibility features and apps are returned to default settings when users press [End session](finishing-your-surface-hub-meeting.md):
|
Additionally, these accessibility features and apps are returned to default settings when users press [End session](finishing-your-surface-hub-meeting.md):
|
||||||
- Narrator
|
- Narrator
|
||||||
- Magnifier
|
- Magnifier
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: PowerShell for Surface Hub (Surface Hub)
|
title: PowerShell for Surface Hub (Surface Hub)
|
||||||
description: PowerShell scripts to help set up and manage your Microsoft Surface Hub .
|
description: PowerShell scripts to help set up and manage your Microsoft Surface Hub.
|
||||||
ms.assetid: 3EF48F63-8E4C-4D74-ACD5-461F1C653784
|
ms.assetid: 3EF48F63-8E4C-4D74-ACD5-461F1C653784
|
||||||
keywords: PowerShell, set up Surface Hub, manage Surface Hub
|
keywords: PowerShell, set up Surface Hub, manage Surface Hub
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
@ -9,7 +9,7 @@ ms.sitesec: library
|
|||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
ms.author: jdecker
|
ms.author: jdecker
|
||||||
ms.date: 06/19/2017
|
ms.date: 08/16/2017
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -465,7 +465,7 @@ PrintAction "Configuring password not to expire..."
|
|||||||
Start-Sleep -s 20
|
Start-Sleep -s 20
|
||||||
try
|
try
|
||||||
{
|
{
|
||||||
Set-AdUser $mailbox.Alias -PasswordNeverExpires $true -Enabled $true
|
Set-AdUser $mailbox.UserPrincipalName -PasswordNeverExpires $true -Enabled $true
|
||||||
}
|
}
|
||||||
catch
|
catch
|
||||||
{
|
{
|
||||||
@ -1243,7 +1243,7 @@ if (!$fExIsOnline)
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
$strAlias = $mailbox.Alias
|
$strAlias = $mailbox.UserPrincipalName
|
||||||
$strDisplayName = $mailbox.DisplayName
|
$strDisplayName = $mailbox.DisplayName
|
||||||
|
|
||||||
$strLinkedAccount = $strLinkedDomain = $strLinkedUser = $strLinkedServer = $null
|
$strLinkedAccount = $strLinkedDomain = $strLinkedUser = $strLinkedServer = $null
|
||||||
@ -1424,7 +1424,7 @@ if ($fHasOnPrem)
|
|||||||
else
|
else
|
||||||
{
|
{
|
||||||
#AD User enabled validation
|
#AD User enabled validation
|
||||||
$accountOnPrem = Get-AdUser $strAlias -properties PasswordNeverExpires -WarningAction SilentlyContinue -ErrorAction SilentlyContinue
|
$accountOnPrem = Get-AdUser $mailbox.UserPrincipalName -properties PasswordNeverExpires -WarningAction SilentlyContinue -ErrorAction SilentlyContinue
|
||||||
}
|
}
|
||||||
$strOnPremUpn = $accountOnPrem.UserPrincipalName
|
$strOnPremUpn = $accountOnPrem.UserPrincipalName
|
||||||
Validate -Test "There is a user account for $strOnPremUpn" -Condition ($accountOnprem -ne $null) -FailureMsg "Could not find an Active Directory account for this user"
|
Validate -Test "There is a user account for $strOnPremUpn" -Condition ($accountOnprem -ne $null) -FailureMsg "Could not find an Active Directory account for this user"
|
||||||
|
@ -8,7 +8,7 @@ ms.sitesec: library
|
|||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
ms.author: jdecker
|
ms.author: jdecker
|
||||||
ms.date: 06/19/2017
|
ms.date: 08/17/2017
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -16,6 +16,24 @@ ms.localizationpriority: medium
|
|||||||
|
|
||||||
This topic lists new and updated topics in the [Surface Hub Admin Guide]( surface-hub-administrators-guide.md).
|
This topic lists new and updated topics in the [Surface Hub Admin Guide]( surface-hub-administrators-guide.md).
|
||||||
|
|
||||||
|
## September 2017
|
||||||
|
|
||||||
|
New or changed topic | Description
|
||||||
|
--- | ---
|
||||||
|
[Top support solutions for Surface Hub](support-solutions-surface-hub.md) | New
|
||||||
|
|
||||||
|
## August 2017
|
||||||
|
|
||||||
|
|
||||||
|
| New or changed topic | Description |
|
||||||
|
| --- | --- |
|
||||||
|
[Accessibility](accessibility-surface-hub.md) | Added information about Narrator
|
||||||
|
[Sign in to Surface Hub with Microsoft Authenticator](surface-hub-authenticator-app.md) | New
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## July 2017
|
## July 2017
|
||||||
|
|
||||||
| New or changed topic | Description |
|
| New or changed topic | Description |
|
||||||
|
@ -114,6 +114,7 @@ Use this procedure if you use Exchange on-prem.
|
|||||||
|
|
||||||
Next, you enable the device account with [Skype for Business Online](#skype-for-business-online), [Skype for Business on-prem](#skype-for-business-on-prem), or [Skype for Business hybrid](#skype-for-business-hybrid).
|
Next, you enable the device account with [Skype for Business Online](#skype-for-business-online), [Skype for Business on-prem](#skype-for-business-on-prem), or [Skype for Business hybrid](#skype-for-business-hybrid).
|
||||||
|
|
||||||
|
<span id="sfb-online"/>
|
||||||
### Skype for Business Online
|
### Skype for Business Online
|
||||||
|
|
||||||
To enable Skype for Business online, your tenant users must have Exchange mailboxes (at least one Exchange mailbox in the tenant is required). The following table explains which plans or additional services you need.
|
To enable Skype for Business online, your tenant users must have Exchange mailboxes (at least one Exchange mailbox in the tenant is required). The following table explains which plans or additional services you need.
|
||||||
@ -309,18 +310,10 @@ Use this procedure if you use Exchange online.
|
|||||||
|
|
||||||
Next, you enable the device account with [Skype for Business Online](#sfb-online), [Skype for Business on-prem](#sfb-onprem), or [Skype for Business hybrid](#sfb-hybrid).
|
Next, you enable the device account with [Skype for Business Online](#sfb-online), [Skype for Business on-prem](#sfb-onprem), or [Skype for Business hybrid](#sfb-hybrid).
|
||||||
|
|
||||||
<span id="sfb-online"/>
|
|
||||||
### Skype for Business Online
|
### Skype for Business Online
|
||||||
|
|
||||||
In order to enable Skype for Business, your environment will need to meet the following prerequisites:
|
In order to enable Skype for Business, your environment will need to meet the [prerequisites for Skype for Business online](#sfb-online).
|
||||||
|
|
||||||
- You'll need to have Lync Online (Plan 2) or higher in your O365 plan. The plan needs to support conferencing capability.
|
|
||||||
|
|
||||||
- If you need Enterprise Voice (PSTN telephony) using telephony service providers for the Surface Hub, you need Lync Online (Plan 3).
|
|
||||||
|
|
||||||
- Your tenant users must have Exchange mailboxes (at least one Exchange mailbox in the tenant is required).
|
|
||||||
|
|
||||||
- Your Surface Hub account does require a Lync Online (Plan 2) or Lync Online (Plan 3) license, but it does not require an Exchange Online license.
|
|
||||||
|
|
||||||
1. Start by creating a remote PowerShell session to the Skype for Business online environment from a PC.
|
1. Start by creating a remote PowerShell session to the Skype for Business online environment from a PC.
|
||||||
|
|
||||||
|
BIN
devices/surface-hub/images/approve-signin.png
Normal file
After Width: | Height: | Size: 32 KiB |
BIN
devices/surface-hub/images/approve-signin2.png
Normal file
After Width: | Height: | Size: 33 KiB |
BIN
devices/surface-hub/images/attendees.png
Normal file
After Width: | Height: | Size: 46 KiB |
BIN
devices/surface-hub/images/ease-of-access.png
Normal file
After Width: | Height: | Size: 46 KiB |
BIN
devices/surface-hub/images/mfa-options.png
Normal file
After Width: | Height: | Size: 70 KiB |
BIN
devices/surface-hub/images/sign-in.png
Normal file
After Width: | Height: | Size: 120 KiB |
@ -44,6 +44,7 @@ In some ways, adding your new Surface Hub is just like adding any other Microsof
|
|||||||
| [Manage Microsoft Surface Hub](manage-surface-hub.md) | How to manage your Surface Hub after finishing the first-run program. |
|
| [Manage Microsoft Surface Hub](manage-surface-hub.md) | How to manage your Surface Hub after finishing the first-run program. |
|
||||||
| [PowerShell for Surface Hub](appendix-a-powershell-scripts-for-surface-hub.md) |
|
| [PowerShell for Surface Hub](appendix-a-powershell-scripts-for-surface-hub.md) |
|
||||||
| [How Surface Hub addresses Wi-Fi Direct security issues](surface-hub-wifi-direct.md) | This topic provides guidance on Wi-Fi Direct security risks, how the Surface Hub has addressed those risks, and how Surface Hub administrators can configure the device for the highest level of security. | PowerShell scripts to help set up and manage your Surface Hub. |
|
| [How Surface Hub addresses Wi-Fi Direct security issues](surface-hub-wifi-direct.md) | This topic provides guidance on Wi-Fi Direct security risks, how the Surface Hub has addressed those risks, and how Surface Hub administrators can configure the device for the highest level of security. | PowerShell scripts to help set up and manage your Surface Hub. |
|
||||||
|
| [Top support solutions for Surface Hub](support-solutions-surface-hub.md) | These are the top Microsoft Support solutions for common issues experienced using Surface Hub. |
|
||||||
| [Troubleshoot Microsoft Surface Hub](troubleshoot-surface-hub.md) | Troubleshoot common problems, including setup issues, Exchange ActiveSync errors. |
|
| [Troubleshoot Microsoft Surface Hub](troubleshoot-surface-hub.md) | Troubleshoot common problems, including setup issues, Exchange ActiveSync errors. |
|
||||||
| [Troubleshoot Miracast on Surface Hub](miracast-troubleshooting.md) | Learn how to resolve Miracast issues. |
|
| [Troubleshoot Miracast on Surface Hub](miracast-troubleshooting.md) | Learn how to resolve Miracast issues. |
|
||||||
| [Useful downloads for Surface Hub administrators](surface-hub-downloads.md) | This topic provides links to useful Surface Hub documents, such as product datasheets, the site readiness guide, and user's guide. |
|
| [Useful downloads for Surface Hub administrators](surface-hub-downloads.md) | This topic provides links to useful Surface Hub documents, such as product datasheets, the site readiness guide, and user's guide. |
|
||||||
|
@ -34,8 +34,12 @@ Learn about managing and updating Surface Hub.
|
|||||||
| [Install apps on your Surface Hub]( https://technet.microsoft.com/itpro/surface-hub/install-apps-on-surface-hub) | Admins can install apps can from either the Microsoft Store or the Microsoft Store for Business.|
|
| [Install apps on your Surface Hub]( https://technet.microsoft.com/itpro/surface-hub/install-apps-on-surface-hub) | Admins can install apps can from either the Microsoft Store or the Microsoft Store for Business.|
|
||||||
| [Set up and use Whiteboard to Whiteboard collaboration](whiteboard-collaboration.md) | Microsoft Whiteboard’s latest update includes the capability for two Surface Hubs to collaborate in real time on the same board. |
|
| [Set up and use Whiteboard to Whiteboard collaboration](whiteboard-collaboration.md) | Microsoft Whiteboard’s latest update includes the capability for two Surface Hubs to collaborate in real time on the same board. |
|
||||||
| [End a meeting with End session](https://technet.microsoft.com/itpro/surface-hub/i-am-done-finishing-your-surface-hub-meeting) | At the end of a meeting, users can tap **End session** to clean up any sensitive data and prepare the device for the next meeting.|
|
| [End a meeting with End session](https://technet.microsoft.com/itpro/surface-hub/i-am-done-finishing-your-surface-hub-meeting) | At the end of a meeting, users can tap **End session** to clean up any sensitive data and prepare the device for the next meeting.|
|
||||||
|
| [Sign in to Surface Hub with Microsoft Authenticator](surface-hub-authenticator-app.md) | You can sign in to a Surface Hub without a password using the Microsoft Authenticator app, available on Android and iOS. |
|
||||||
| [Save your BitLocker key](https://technet.microsoft.com/itpro/surface-hub/save-bitlocker-key-surface-hub) | Every Surface Hub is automatically set up with BitLocker drive encryption software. Microsoft strongly recommends that you make sure you back up your BitLocker recovery keys.|
|
| [Save your BitLocker key](https://technet.microsoft.com/itpro/surface-hub/save-bitlocker-key-surface-hub) | Every Surface Hub is automatically set up with BitLocker drive encryption software. Microsoft strongly recommends that you make sure you back up your BitLocker recovery keys.|
|
||||||
| [Connect other devices and display with Surface Hub](https://technet.microsoft.com/itpro/surface-hub/connect-and-display-with-surface-hub) | You can connect other device to your Surface Hub to display content.|
|
| [Connect other devices and display with Surface Hub](https://technet.microsoft.com/itpro/surface-hub/connect-and-display-with-surface-hub) | You can connect other device to your Surface Hub to display content.|
|
||||||
| [Miracast on existing wireless network or LAN](miracast-over-infrastructure.md) | You can use Miracast on your wireless network or LAN to connect to Surface Hub. |
|
| [Miracast on existing wireless network or LAN](miracast-over-infrastructure.md) | You can use Miracast on your wireless network or LAN to connect to Surface Hub. |
|
||||||
| [Using a room control system]( https://technet.microsoft.com/itpro/surface-hub/use-room-control-system-with-surface-hub) | Room control systems can be used with your Microsoft Surface Hub.|
|
| [Using a room control system]( https://technet.microsoft.com/itpro/surface-hub/use-room-control-system-with-surface-hub) | Room control systems can be used with your Microsoft Surface Hub.|
|
||||||
|
|
||||||
|
## Related topics
|
||||||
|
|
||||||
|
- [View Power BI presentation mode on Surface Hub & Windows 10](https://powerbi.microsoft.com/documentation/powerbi-mobile-win10-app-presentation-mode/)
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Miracast on existing wireless network or LAN
|
title: Miracast on existing wireless network or LAN
|
||||||
description: Monitoring for Microsoft Surface Hub devices is enabled through Microsoft Operations Management Suite (OMS).
|
description: Windows 10 enables you to send a Miracast stream over a local network.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: manage
|
ms.mktglfcycl: manage
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
@ -32,13 +32,15 @@ Users attempt to connect to a Miracast receiver as they did previously. When the
|
|||||||
|
|
||||||
## Enabling Miracast over Infrastructure
|
## Enabling Miracast over Infrastructure
|
||||||
|
|
||||||
If you have a Surface Hub that has been updated to Windows 10, version 1703, then you automatically have this new feature. To take advantage of it in your environment, you need to ensure the following is true within your deployment:
|
If you have a Surface Hub or other Windows 10 device that has been updated to Windows 10, version 1703, then you automatically have this new feature. To take advantage of it in your environment, you need to ensure the following is true within your deployment:
|
||||||
|
|
||||||
- The Surface Hub needs to be running Windows 10, version 1703.
|
- The Surface Hub or device (Windows PC or phone) needs to be running Windows 10, version 1703.
|
||||||
- The Surface Hub must be connected to your enterprise network via either Ethernet or a secure Wi-Fi connection (e.g. using either WPA2-PSK or WPA2-Enterprise security). If the Hub is connected to an open Wi-Fi connection, Miracast over Infrastructure will disable itself.
|
- A Surface Hub or Windows PC can act as a Miracast over Infrastructure *receiver*. A Windows PC or phone can act as a Miracast over Infrastructure *source*.
|
||||||
- The DNS Hostname (device name) of the Surface Hub needs to be resolvable via your DNS servers. You can achieve this by either allowing your Surface Hub to register automatically via Dynamic DNS, or by manually creating an A or AAAA record for the Surface Hub's hostname.
|
- As a Miracast receiver, the Surface Hub or device must be connected to your enterprise network via either Ethernet or a secure Wi-Fi connection (e.g. using either WPA2-PSK or WPA2-Enterprise security). If the Hub is connected to an open Wi-Fi connection, Miracast over Infrastructure will disable itself.
|
||||||
|
- As a Miracast source, the Windows PC or phone must be connected to the same enterprise network via Ethernet or a secure Wi-Fi connection.
|
||||||
|
- The DNS Hostname (device name) of the Surface Hub or deviceneeds to be resolvable via your DNS servers. You can achieve this by either allowing your Surface Hub to register automatically via Dynamic DNS, or by manually creating an A or AAAA record for the Surface Hub's hostname.
|
||||||
- Windows 10 PCs must be connected to the same enterprise network via Ethernet or a secure Wi-Fi connection.
|
- Windows 10 PCs must be connected to the same enterprise network via Ethernet or a secure Wi-Fi connection.
|
||||||
- PCs need to be running Windows 10, version 1703.
|
|
||||||
|
|
||||||
It is important to note that Miracast over Infrastructure is not a replacement for standard Miracast. Instead, the functionality is complementary, and provides an advantage to users who are part of the enterprise network. Users who are guests to a particular location and don’t have access to the enterprise network will continue to connect using the Wi-Fi Direct connection method.
|
It is important to note that Miracast over Infrastructure is not a replacement for standard Miracast. Instead, the functionality is complementary, and provides an advantage to users who are part of the enterprise network. Users who are guests to a particular location and don’t have access to the enterprise network will continue to connect using the Wi-Fi Direct connection method.
|
||||||
|
|
||||||
|
@ -83,11 +83,8 @@ If you have a pure, online (O365) deployment, then you can [use the provided Pow
|
|||||||
Set-MsolUser -UserPrincipalName 'HUB01@contoso.com' -PasswordNeverExpires $true
|
Set-MsolUser -UserPrincipalName 'HUB01@contoso.com' -PasswordNeverExpires $true
|
||||||
```
|
```
|
||||||
|
|
||||||
7. Surface Hub requires a license for Skype for Business functionality.
|
7. Surface Hub requires a license for Skype for Business functionality. In order to enable Skype for Business, your environment will need to meet the [prerequisites for Skype for Business online](hybrid-deployment-surface-hub-device-accounts.md#sfb-online).
|
||||||
- Your Surface Hub account requires a Lync Online (Plan 2) or Lync Online (Plan 3) license, but it does not require an Exchange Online license.
|
|
||||||
- You'll need to have Lync Online (Plan 2) or higher in your O365 plan. The plan needs to support conferencing capability.
|
|
||||||
- If you need Enterprise Voice (PSTN telephony) using telephony service providers for the Surface Hub, you need Lync Online (Plan 3).
|
|
||||||
|
|
||||||
Next, you can use `Get-MsolAccountSku` to retrieve a list of available SKUs for your O365 tenant.
|
Next, you can use `Get-MsolAccountSku` to retrieve a list of available SKUs for your O365 tenant.
|
||||||
|
|
||||||
Once you list out the SKUs, you can add a license using the `Set-MsolUserLicense` cmdlet. In this case, `$strLicense` is the SKU code that you see (for example, *contoso:STANDARDPACK*).
|
Once you list out the SKUs, you can add a license using the `Set-MsolUserLicense` cmdlet. In this case, `$strLicense` is the SKU code that you see (for example, *contoso:STANDARDPACK*).
|
||||||
|
@ -68,9 +68,8 @@ Surface Hub interacts with a few different products and services. Depending on t
|
|||||||
|
|
||||||
A device account is an Exchange resource account that Surface Hub uses to display its meeting calendar, join Skype for Business calls, send email, and (optionally) to authenticate to Exchange. See [Create and test a device account](create-and-test-a-device-account-surface-hub.md) for details.
|
A device account is an Exchange resource account that Surface Hub uses to display its meeting calendar, join Skype for Business calls, send email, and (optionally) to authenticate to Exchange. See [Create and test a device account](create-and-test-a-device-account-surface-hub.md) for details.
|
||||||
|
|
||||||
After you've created your device account, there are a couple of ways to verify that it's setup correctly.
|
After you've created your device account, to verify that it's setup correctly, run Surface Hub device account validation PowerShell scripts. For more information, see [Surface Hub device account scripts](https://gallery.technet.microsoft.com/scriptcenter/Surface-Hub-device-account-6db77696) in Script Center, or [PowerShell scripts for Surface Hub](appendix-a-powershell-scripts-for-surface-hub.md) later in this guide.
|
||||||
- Run Surface Hub device account validation PowerShell scripts. For more information, see [Surface Hub device account scripts](https://gallery.technet.microsoft.com/scriptcenter/Surface-Hub-device-account-6db77696) in Script Center, or [PowerShell scripts for Surface Hub](appendix-a-powershell-scripts-for-surface-hub.md) later in this guide.
|
|
||||||
- Use the account with the [Lync Microsoft Store app](https://www.microsoft.com/en-us/store/p/lync/9wzdncrfhvhm). If Lync signs in successfully, then the device account will most likely work with Skype for Business on Surface Hub.
|
|
||||||
|
|
||||||
|
|
||||||
## Prepare for first-run program
|
## Prepare for first-run program
|
||||||
|
50
devices/surface-hub/support-solutions-surface-hub.md
Normal file
@ -0,0 +1,50 @@
|
|||||||
|
---
|
||||||
|
title: Top support solutions for Microsoft Surface Hub
|
||||||
|
description: Find top solutions for common issues using Surface Hub.
|
||||||
|
ms.assetid: CF58F74D-8077-48C3-981E-FCFDCA34B34A
|
||||||
|
keywords: Troubleshoot common problems, setup issues
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: support
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: surfacehub
|
||||||
|
author: kaushika-msft
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 09/07/2017
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
---
|
||||||
|
|
||||||
|
# Top support solutions for Microsoft Surface Hub
|
||||||
|
|
||||||
|
Microsoft regularly releases both updates and solutions for Surface Hub. To ensure your devices can receive future updates, including security updates, it's important to keep your Surface Hub devices updated. For a complete listing of the update history, see [Surface Hub update history](https://www.microsoft.com/surface/support/surface-hub/surface-hub-update-history) and [Known issues and additional information about Microsoft Surface Hub](https://support.microsoft.com/help/4025643).
|
||||||
|
|
||||||
|
|
||||||
|
These are the top Microsoft Support solutions for common issues experienced when using Surface Hub.
|
||||||
|
|
||||||
|
## Setup and install issues
|
||||||
|
|
||||||
|
- [Setup troubleshooting](troubleshoot-surface-hub.md#setup-troubleshooting)
|
||||||
|
- [Exchange ActiveSync errors](troubleshoot-surface-hub.md#exchange-activesync-errors)
|
||||||
|
|
||||||
|
## Miracast issues
|
||||||
|
|
||||||
|
- [Troubleshoot Miracast on Surface Hub](miracast-troubleshooting.md)
|
||||||
|
|
||||||
|
## Download updates issues
|
||||||
|
|
||||||
|
- [Surface Hub can't download updates from Windows Update](https://support.microsoft.com/help/3191418/surface-hub-can-t-download-updates-from-windows-update)
|
||||||
|
|
||||||
|
## Connect app issues
|
||||||
|
|
||||||
|
- [The Connect app in Surface Hub exits unexpectedly](https://support.microsoft.com/help/3157417/the-connect-app-in-surface-hub-exits-unexpectedly)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
89
devices/surface-hub/surface-hub-authenticator-app.md
Normal file
@ -0,0 +1,89 @@
|
|||||||
|
---
|
||||||
|
title: Sign in to Surface Hub with Microsoft Authenticator
|
||||||
|
description: Use Microsoft Authenticator on your mobile device to sign in to Surface Hub.
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: manage
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: surfacehub
|
||||||
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 07/27/2017
|
||||||
|
localizationpriority: medium
|
||||||
|
---
|
||||||
|
|
||||||
|
# Sign in to Surface Hub with Microsoft Authenticator
|
||||||
|
|
||||||
|
People in your organization can sign in to a Surface Hub without a password using the Microsoft Authenticator app, available on Android and iOS.
|
||||||
|
|
||||||
|
|
||||||
|
## Organization prerequisites
|
||||||
|
|
||||||
|
To let people in your organization sign in to Surface Hub with their phones and other devices instead of a password, you’ll need to make sure that your organization meets these prerequisites:
|
||||||
|
|
||||||
|
- Your organization must be a hybrid or cloud-only organization, backed by Azure Active Directory (Azure AD). For more information, see [What is Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-whatis)
|
||||||
|
|
||||||
|
- Make sure you have at minimum an Office 365 E3 subscription.
|
||||||
|
|
||||||
|
- [Configure Multi-Factor Authentication](https://docs.microsoft.com/azure/multi-factor-authentication/multi-factor-authentication). Make sure **Notification through mobile app** is selected.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
- Enable content hosting on Azure AD services such as Office online, SharePoint, etc.
|
||||||
|
|
||||||
|
- Surface Hub must be running Windows 10, version 1703 or later.
|
||||||
|
|
||||||
|
- Surface Hub is set up with either a local or domain-joined account.
|
||||||
|
|
||||||
|
Currently, you cannot use Microsoft Authenticator to sign in to Surface Hubs that are joined to an Active Directory domain or to Azure AD.
|
||||||
|
|
||||||
|
## Individual prerequisites
|
||||||
|
|
||||||
|
- An Android phone running 6.0 or later, or an iPhone or iPad running iOS9 or later
|
||||||
|
|
||||||
|
- The most recent version of the Microsoft Authenticator app from the appropriate app store
|
||||||
|
>[!NOTE]
|
||||||
|
>On iOS, the app version must be 5.4.0 or higher.
|
||||||
|
>
|
||||||
|
>The Microsoft Authenticator app on phones running a Windows operating system can't be used to sign in to Surface Hub.
|
||||||
|
|
||||||
|
- Passcode or screen lock on your device is enabled
|
||||||
|
|
||||||
|
- A standard SMTP email address (example: joe@contoso.com). Non-standard or vanity SMTP email addresses (example: firstname.lastname@contoso.com) currently don’t work.
|
||||||
|
|
||||||
|
|
||||||
|
## How to set up the Microsoft Authenticator app
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>If Company Portal is installed on your Android device, uninstall it before you set up Microsoft Authenticator. After you set up the app, you can reinstall Company Portal.
|
||||||
|
>
|
||||||
|
>If you have already set up Microsoft Authenticator on your phone and registered your device, go to the [sign-in instructions](#signin).
|
||||||
|
|
||||||
|
1. Add your work or school account to Microsoft Authenticator for Multi-Factor Authentication. You will need a QR code provided by your IT department. For help, see [Get started with the Microsoft Authenticator app](https://docs.microsoft.com/azure/multi-factor-authentication/end-user/microsoft-authenticator-app-how-to).
|
||||||
|
2. Go to **Settings** and register your device.
|
||||||
|
1. Return to the accounts page and choose **Enable phone sign-in** from the account dropdown menu.
|
||||||
|
|
||||||
|
|
||||||
|
<span id="signin" />
|
||||||
|
## How to sign in to Surface Hub during a meeting
|
||||||
|
|
||||||
|
1. After you’ve set up a meeting, go to the Surface Hub and select **Sign in to see your meetings and files**.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>If you’re not sure how to schedule a meeting on a Surface Hub, see [Schedule a meeting on Surface Hub](https://support.microsoft.com/help/17325/surfacehub-schedulemeeting).
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
2. You’ll see a list of the people invited to the meeting. Select yourself (or the person who wants to sign in – make sure this person has gone through the steps to set up their device before your meeting), and then select **Continue**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
You'll see a code on the Surface Hub.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
3. To approve the sign-in, open the Authenticator app, enter the four-digit code that’s displayed on the Surface Hub, and select **Approve**. You will then be asked to enter the PIN or use your fingerprint to complete the sign in.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
You can now access all files through the OneDrive app.
|
||||||
|
|
@ -23,7 +23,7 @@ This topic provides links to useful Surface Hub documents, such as product datas
|
|||||||
| [Surface Hub User Guide (PDF)](http://download.microsoft.com/download/3/6/B/36B6331E-0C63-4E71-A05D-EE88D05081F8/surface-hub-user-guide-en-us.pdf) | Learn how to use Surface Hub in scheduled or ad-hoc meetings. Invite remote participants, use the built-in tools, save data from your meeting, and more. |
|
| [Surface Hub User Guide (PDF)](http://download.microsoft.com/download/3/6/B/36B6331E-0C63-4E71-A05D-EE88D05081F8/surface-hub-user-guide-en-us.pdf) | Learn how to use Surface Hub in scheduled or ad-hoc meetings. Invite remote participants, use the built-in tools, save data from your meeting, and more. |
|
||||||
| [Surface Hub Replacement PC Drivers](https://www.microsoft.com/download/details.aspx?id=52210) | The Surface Hub Replacement PC driver set is available for those customers who have chosen to disable the Surface Hub’s internal PC and use an external computer with their 84” or 55” Surface Hub. This download is meant to be used with the Surface Hub Admin Guide , which contains further details on configuring a Surface Hub Replacement PC. |
|
| [Surface Hub Replacement PC Drivers](https://www.microsoft.com/download/details.aspx?id=52210) | The Surface Hub Replacement PC driver set is available for those customers who have chosen to disable the Surface Hub’s internal PC and use an external computer with their 84” or 55” Surface Hub. This download is meant to be used with the Surface Hub Admin Guide , which contains further details on configuring a Surface Hub Replacement PC. |
|
||||||
| [Surface Hub SSD Replacement Guide (PDF)](https://www.microsoft.com/surface/en-us/support/surfacehubssd) | Learn how to replace the solid state drive (SSD) for the 55- and 84-inch Surface Hub. |
|
| [Surface Hub SSD Replacement Guide (PDF)](https://www.microsoft.com/surface/en-us/support/surfacehubssd) | Learn how to replace the solid state drive (SSD) for the 55- and 84-inch Surface Hub. |
|
||||||
| [Microsoft Surface Hub Rollout and Adoption Success Kit (ZIP)](http://download.microsoft.com/download/F/A/3/FA3ADEA4-4966-456B-8BDE-0A594FD52C6C/Surface%20Hub%20RASK.zip) | Best practices for generating awareness and implementing change management to maximize adoption, usage, and benefits of Microsoft Surface Hub. The Rollout and Adoption Success Kit zip file includes the Rollout and Adoption Success Kit detailed document, Surface Hub presentation, demo guidance, awareness graphics, and more. |
|
| [Microsoft Surface Hub Rollout and Adoption Success Kit (ZIP)](http://download.microsoft.com/download/F/A/3/FA3ADEA4-4966-456B-8BDE-0A594FD52C6C/Surface_Hub_Adoption_Kit_Final_0519.pdf) | Best practices for generating awareness and implementing change management to maximize adoption, usage, and benefits of Microsoft Surface Hub. The Rollout and Adoption Success Kit zip file includes the Rollout and Adoption Success Kit detailed document, Surface Hub presentation, demo guidance, awareness graphics, and more. |
|
||||||
| [Unpacking Guide for 84-inch Surface Hub (PDF)](https://www.microsoft.com/surface/support/surface-hub/surface-hub-unpacking-guide-84) | Learn how to unpack your 84-inch Surface Hub efficiently and safely. [Watch the video (opens in a pop-up media player)](http://compass.xbox.com/assets/75/2b/752b73dc-6e9d-4692-8ba1-0f9fc03bff6b.mov?n=04.07.16_installation_video_03_unpacking_84.mov) |
|
| [Unpacking Guide for 84-inch Surface Hub (PDF)](https://www.microsoft.com/surface/support/surface-hub/surface-hub-unpacking-guide-84) | Learn how to unpack your 84-inch Surface Hub efficiently and safely. [Watch the video (opens in a pop-up media player)](http://compass.xbox.com/assets/75/2b/752b73dc-6e9d-4692-8ba1-0f9fc03bff6b.mov?n=04.07.16_installation_video_03_unpacking_84.mov) |
|
||||||
| [Unpacking Guide for 55-inch Surface Hub (PDF)](https://www.microsoft.com/surface/support/surface-hub/surface-hub-unpacking-guide-55) | Learn how to unpack your 55-inch Surface Hub efficiently and safely. [Watch the video (opens in a pop-up media player)](http://compass.xbox.com/assets/a9/d6/a9d6b4d7-d33f-4e8b-be92-28f7fc2c06d7.mov?n=04.07.16_installation_video_02_unpacking_55.mov) |
|
| [Unpacking Guide for 55-inch Surface Hub (PDF)](https://www.microsoft.com/surface/support/surface-hub/surface-hub-unpacking-guide-55) | Learn how to unpack your 55-inch Surface Hub efficiently and safely. [Watch the video (opens in a pop-up media player)](http://compass.xbox.com/assets/a9/d6/a9d6b4d7-d33f-4e8b-be92-28f7fc2c06d7.mov?n=04.07.16_installation_video_02_unpacking_55.mov) |
|
||||||
| [Wall Mounting and Assembly Guide (PDF)](https://www.microsoft.com/surface/support/surface-hub/surface-hub-wall-mounting-assembly-guide) | Detailed instructions on how to safely and securely assemble the wall brackets, and how to mount your Surface Hub onto them. [Watch the video (opens in a pop-up media player)](http://compass.xbox.com/assets/bf/4d/bf4d6f06-370c-45ee-88e6-c409873914e8.mov?n=04.07.16_installation_video_05_wall_mount.mov) |
|
| [Wall Mounting and Assembly Guide (PDF)](https://www.microsoft.com/surface/support/surface-hub/surface-hub-wall-mounting-assembly-guide) | Detailed instructions on how to safely and securely assemble the wall brackets, and how to mount your Surface Hub onto them. [Watch the video (opens in a pop-up media player)](http://compass.xbox.com/assets/bf/4d/bf4d6f06-370c-45ee-88e6-c409873914e8.mov?n=04.07.16_installation_video_05_wall_mount.mov) |
|
||||||
|
@ -20,8 +20,6 @@ Troubleshoot common problems, including setup issues, Exchange ActiveSync errors
|
|||||||
|
|
||||||
Common issues are listed in the following table, along with causes and possible fixes. The [Setup troubleshooting](#setup-troubleshooting) section contains a listing of on-device problems, along with several types of issues that may be encountered during the first-run experience. The [Exchange ActiveSync errors](#exchange-activesync-errors) section lists common errors the device may encounter when trying to synchronize with an Microsoft Exchange ActiveSync server.
|
Common issues are listed in the following table, along with causes and possible fixes. The [Setup troubleshooting](#setup-troubleshooting) section contains a listing of on-device problems, along with several types of issues that may be encountered during the first-run experience. The [Exchange ActiveSync errors](#exchange-activesync-errors) section lists common errors the device may encounter when trying to synchronize with an Microsoft Exchange ActiveSync server.
|
||||||
|
|
||||||
- [Setup troubleshooting](#setup-troubleshooting)
|
|
||||||
- [Exchange ActiveSync errors](#exchange-activesync-errors)
|
|
||||||
|
|
||||||
## Setup troubleshooting
|
## Setup troubleshooting
|
||||||
|
|
||||||
|
@ -26,6 +26,7 @@
|
|||||||
### [Use System Center Configuration Manager to manage devices with SEMM](use-system-center-configuration-manager-to-manage-devices-with-semm.md)
|
### [Use System Center Configuration Manager to manage devices with SEMM](use-system-center-configuration-manager-to-manage-devices-with-semm.md)
|
||||||
## [Surface Diagnostic Toolkit](surface-diagnostic-toolkit.md)
|
## [Surface Diagnostic Toolkit](surface-diagnostic-toolkit.md)
|
||||||
## [Surface Data Eraser](microsoft-surface-data-eraser.md)
|
## [Surface Data Eraser](microsoft-surface-data-eraser.md)
|
||||||
|
## [Top support solutions for Surface devices](support-solutions-surface.md)
|
||||||
## [Change history for Surface documentation](change-history-for-surface.md)
|
## [Change history for Surface documentation](change-history-for-surface.md)
|
||||||
|
|
||||||
|
|
||||||
|
@ -11,6 +11,12 @@ author: jdeckerms
|
|||||||
|
|
||||||
This topic lists new and updated topics in the Surface documentation library.
|
This topic lists new and updated topics in the Surface documentation library.
|
||||||
|
|
||||||
|
## September 2017
|
||||||
|
|
||||||
|
New or changed topic | Description
|
||||||
|
--- | ---
|
||||||
|
[Top support solutions for Surface devices](support-solutions-surface.md) | New
|
||||||
|
|
||||||
## June 2017
|
## June 2017
|
||||||
|
|
||||||
|New or changed topic | Description |
|
|New or changed topic | Description |
|
||||||
|
@ -30,6 +30,7 @@ For more information on planning for, deploying, and managing Surface devices in
|
|||||||
| [Surface Enterprise Management Mode](surface-enterprise-management-mode.md) | See how this feature of Surface devices with Surface UEFI allows you to secure and manage firmware settings within your organization. |
|
| [Surface Enterprise Management Mode](surface-enterprise-management-mode.md) | See how this feature of Surface devices with Surface UEFI allows you to secure and manage firmware settings within your organization. |
|
||||||
| [Surface Diagnostic Toolkit](surface-diagnostic-toolkit.md) | Find out how you can use the Microsoft Surface Diagnostic Toolkit to test the hardware of your Surface device. |
|
| [Surface Diagnostic Toolkit](surface-diagnostic-toolkit.md) | Find out how you can use the Microsoft Surface Diagnostic Toolkit to test the hardware of your Surface device. |
|
||||||
| [Surface Data Eraser](microsoft-surface-data-eraser.md) | Find out how the Microsoft Surface Data Eraser tool can help you securely wipe data from your Surface devices. |
|
| [Surface Data Eraser](microsoft-surface-data-eraser.md) | Find out how the Microsoft Surface Data Eraser tool can help you securely wipe data from your Surface devices. |
|
||||||
|
| [Top support solutions for Surface devices](support-solutions-surface.md) | These are the top Microsoft Support solutions for common issues experienced using Surface devices in an enterprise. |
|
||||||
| [Change history for Surface documentation](change-history-for-surface.md) | This topic lists new and updated topics in the Surface documentation library. |
|
| [Change history for Surface documentation](change-history-for-surface.md) | This topic lists new and updated topics in the Surface documentation library. |
|
||||||
|
|
||||||
|
|
||||||
|
64
devices/surface/support-solutions-surface.md
Normal file
@ -0,0 +1,64 @@
|
|||||||
|
---
|
||||||
|
title: Top support solutions for Surface devices
|
||||||
|
description: Find top solutions for common issues using Surface devices in the enterprise.
|
||||||
|
ms.assetid: CF58F74D-8077-48C3-981E-FCFDCA34B34A
|
||||||
|
keywords: Troubleshoot common problems, setup issues
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: support
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: surfacehub
|
||||||
|
author: kaushika-msft
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 09/07/2017
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
---
|
||||||
|
|
||||||
|
# Top support solutions for Surface devices
|
||||||
|
|
||||||
|
Microsoft regularly releases both updates and solutions for Surface devices. To ensure your devices can receive future updates, including security updates, it's important to keep your Surface devices updated. For a complete listing of the update history, see [Surface update history](https://www.microsoft.com/surface/support/install-update-activate/surface-update-history) and [Install Surface and Windows updates](https://www.microsoft.com/surface/support/performance-and-maintenance/install-software-updates-for-surface?os=windows-10&=undefined).
|
||||||
|
|
||||||
|
|
||||||
|
These are the top Microsoft Support solutions for common issues experienced when using Surface devices in an enterprise.
|
||||||
|
|
||||||
|
## Screen cracked or scratched issues
|
||||||
|
|
||||||
|
- [Cracked screen and physical damage](https://www.microsoft.com/surface/support/warranty-service-and-recovery/surface-is-damaged)
|
||||||
|
|
||||||
|
|
||||||
|
##Device cover or keyboard issues
|
||||||
|
|
||||||
|
- [Troubleshoot your Surface Type Cover or keyboard](https://www.microsoft.com/surface/support/hardware-and-drivers/troubleshoot-surface-keyboards)
|
||||||
|
- [Troubleshoot problems with Surface Keyboard, Surface Ergonomic Keyboard, and Microsoft Modern Keyboard with Fingerprint ID](https://www.microsoft.com/surface/support/touch-mouse-and-search/surface-keyboard-troubleshooting)
|
||||||
|
- [Set up Microsoft Modern Keyboard with Fingerprint ID](https://www.microsoft.com/surface/support/touch-mouse-and-search/microsoft-modern-keyboard-fingerprintid-set-up)
|
||||||
|
- [Enabling Surface Laptop keyboard during MDT deployment](https://blogs.technet.microsoft.com/askcore/2017/08/18/enabling-surface-laptop-keyboard-during-mdt-deployment/)
|
||||||
|
|
||||||
|
|
||||||
|
## Device won't wake from sleep or hibernation issues
|
||||||
|
|
||||||
|
- [Surface won’t turn on or wake from sleep](https://www.microsoft.com/surface/support/warranty-service-and-recovery/surface-wont-turn-on-or-wake-from-sleep?os=windows-10&=undefined)
|
||||||
|
- [Surface Pro 4 or Surface Book doesn't hibernate in Windows 10](https://support.microsoft.com/help/3122682)
|
||||||
|
- [Surface Pro 3 doesn't hibernate after four hours in connected standby](https://support.microsoft.com/help/2998588/surface-pro-3-doesn-t-hibernate-after-four-hours-in-connected-standby)
|
||||||
|
- [Surface Pro 3 Hibernation Doesn’t Occur on Enterprise Install](https://blogs.technet.microsoft.com/askcore/2014/11/05/surface-pro-3-hibernation-doesnt-occur-on-enterprise-install/)
|
||||||
|
|
||||||
|
|
||||||
|
## Other common issues
|
||||||
|
|
||||||
|
- [Trouble installing Surface updates](https://www.microsoft.com/surface/support/performance-and-maintenance/troubleshoot-updates?os=windows-10&=undefined)
|
||||||
|
- [Troubleshooting common Surface Pro 3 issues post-deployment](http://blogs.technet.com/b/askcore/archive/2015/03/19/troubleshooting-common-surface-pro-3-issues-post-deployment.aspx)
|
||||||
|
- [Surface Pro 3 hibernation doesn't occur on enterprise install](https://blogs.technet.microsoft.com/askcore/2014/11/05/surface-pro-3-hibernation-doesnt-occur-on-enterprise-install/)
|
||||||
|
- [Reusing the same NIC for multiple PXE initiated deployments in System Center Configuration Manger OSD](https://blogs.technet.microsoft.com/system_center_configuration_manager_operating_system_deployment_support_blog/2015/08/27/reusing-the-same-nic-for-multiple-pxe-initiated-deployments-in-system-center-configuration-manger-osd)
|
||||||
|
- [Troubleshoot docking stations for Surface Pro and Surface 3](https://www.microsoft.com/surface/support/hardware-and-drivers/troubleshoot-docking-station?os=windows-8.1-update-1&=undefined)
|
||||||
|
- [What to do if Surface is running slower](https://www.microsoft.com/surface/support/performance-and-maintenance/what-to-do-if-surface-is-running-slower?os=windows-10&=undefined)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
@ -1,7 +1,6 @@
|
|||||||
# [Get started: Deploy and manage a full cloud IT solution with Microsoft Education](get-started-with-microsoft-education.md)
|
# [Get started: Deploy and manage a full cloud IT solution with Microsoft Education](get-started-with-microsoft-education.md)
|
||||||
## [Set up an Office 365 education tenant](set-up-office365-edu-tenant.md)
|
## [Set up an Office 365 education tenant](set-up-office365-edu-tenant.md)
|
||||||
## [Use School Data Sync to import student data](use-school-data-sync.md)
|
## [Use School Data Sync to import student data](use-school-data-sync.md)
|
||||||
## [Enable Microsoft Teams for your school](enable-microsoft-teams.md)
|
|
||||||
## [Configure Microsoft Store for Education](configure-microsoft-store-for-education.md)
|
## [Configure Microsoft Store for Education](configure-microsoft-store-for-education.md)
|
||||||
## [Use Intune for Education to manage groups, apps, and settings](use-intune-for-education.md)
|
## [Use Intune for Education to manage groups, apps, and settings](use-intune-for-education.md)
|
||||||
## [Set up Windows 10 education devices](set-up-windows-10-education-devices.md)
|
## [Set up Windows 10 education devices](set-up-windows-10-education-devices.md)
|
||||||
|
@ -15,6 +15,10 @@ ms.date: 07/10/2017
|
|||||||
|
|
||||||
# Configure Microsoft Store for Education
|
# Configure Microsoft Store for Education
|
||||||
|
|
||||||
|
> [!div class="step-by-step"]
|
||||||
|
[<< Use School Data Sync to import student data](use-school-data-sync.md)
|
||||||
|
[Use Intune for Education to manage groups, apps, and settings >>](use-intune-for-education.md)
|
||||||
|
|
||||||
You'll need to configure Microsoft Store for Education to accept the services agreement and make sure your Microsoft Store account is associated with Intune for Education.
|
You'll need to configure Microsoft Store for Education to accept the services agreement and make sure your Microsoft Store account is associated with Intune for Education.
|
||||||
|
|
||||||
You can watch the video to see how this is done, or follow the step-by-step guide. </br>
|
You can watch the video to see how this is done, or follow the step-by-step guide. </br>
|
||||||
@ -58,7 +62,7 @@ Your Microsoft Store for Education account is now linked to Intune for Education
|
|||||||
-->
|
-->
|
||||||
|
|
||||||
> [!div class="step-by-step"]
|
> [!div class="step-by-step"]
|
||||||
[<< Enable Microsoft Teams for your school](enable-microsoft-teams.md)
|
[<< Use School Data Sync to import student data](use-school-data-sync.md)
|
||||||
[Use Intune for Education to manage groups, apps, and settings >>](use-intune-for-education.md)
|
[Use Intune for Education to manage groups, apps, and settings >>](use-intune-for-education.md)
|
||||||
|
|
||||||
|
|
||||||
|
@ -14,6 +14,10 @@ ms.date: 07/10/2017
|
|||||||
---
|
---
|
||||||
|
|
||||||
# Finish Windows 10 device setup and other tasks
|
# Finish Windows 10 device setup and other tasks
|
||||||
|
|
||||||
|
> [!div class="step-by-step"]
|
||||||
|
[<< Set up Windows 10 education devices](set-up-windows-10-education-devices.md)
|
||||||
|
|
||||||
Once you've set up your Windows 10 education device, it's worth checking to verify the following:
|
Once you've set up your Windows 10 education device, it's worth checking to verify the following:
|
||||||
|
|
||||||
> [!div class="checklist"]
|
> [!div class="checklist"]
|
||||||
@ -70,6 +74,7 @@ You can follow the rest of the walkthrough to finish setup and complete other ta
|
|||||||
> * Update group settings in Intune for Education
|
> * Update group settings in Intune for Education
|
||||||
> * Configure Azure settings
|
> * Configure Azure settings
|
||||||
> * Complete Office 365 for Education setup
|
> * Complete Office 365 for Education setup
|
||||||
|
> * Enable Microsoft teams for your school
|
||||||
> * Add more users
|
> * Add more users
|
||||||
> * Connect other devices, like BYOD devices, to your cloud infrastructure
|
> * Connect other devices, like BYOD devices, to your cloud infrastructure
|
||||||
|
|
||||||
@ -136,6 +141,38 @@ Follow the steps in this section to ensure that settings for the each user follo
|
|||||||
## Complete Office 365 for Education setup
|
## Complete Office 365 for Education setup
|
||||||
Now that your basic cloud infrastructure is up and running, it's time to complete the rest of the Office 365 for Education setup. You can find detailed information about completing Office 365 setup, services and applications, troubleshooting, and more by reading the <a href="https://support.office.com/en-US/Article/set-up-Office-365-for-business-6a3a29a0-e616-4713-99d1-15eda62d04fa#ID0EAAAABAAA=Education" target="_blank">Office 365 admin documentation</a>.
|
Now that your basic cloud infrastructure is up and running, it's time to complete the rest of the Office 365 for Education setup. You can find detailed information about completing Office 365 setup, services and applications, troubleshooting, and more by reading the <a href="https://support.office.com/en-US/Article/set-up-Office-365-for-business-6a3a29a0-e616-4713-99d1-15eda62d04fa#ID0EAAAABAAA=Education" target="_blank">Office 365 admin documentation</a>.
|
||||||
|
|
||||||
|
## Enable Microsoft Teams for your school
|
||||||
|
Microsoft Teams is a digital hub that brings conversations, content, and apps together in one place. Because it's built on Office 365, schools benefit from integration with their familiar Office apps and services. Your institution can use Microsoft Teams to create collaborative classrooms, connect in professional learning communities, and communicate with school staff all from a single experience in Office 365 for Education.
|
||||||
|
|
||||||
|
To get started, IT administrators need to use the Office 365 Admin Center to enable Microsoft Teams for your school.
|
||||||
|
|
||||||
|
**To enable Microsoft Teams for your school**
|
||||||
|
|
||||||
|
1. Sign in to <a href="https://portal.office.com" target="_blank">Office 365</a> with your work or school account.
|
||||||
|
2. Click **Admin** to go to the Office 365 admin center.
|
||||||
|
3. Go to **Settings > Services & add-ins**.
|
||||||
|
4. On the **Services & add-ins** page, select **Microsoft Teams**.
|
||||||
|
|
||||||
|
**Figure 1** - Select Microsoft Teams from the list of services & add-ins
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
5. On the Microsoft Teams settings screen, select the license that you want to configure, **Student** or **Faculty and Staff**. Select **Faculty and Staff**.
|
||||||
|
|
||||||
|
**Figure 2** - Select the license that you want to configure
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
6. After you select the license type, set the toggle to turn on Microsoft Teams for your organization.
|
||||||
|
|
||||||
|
**Figure 3** - Turn on Microsoft Teams for your organization
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
7. Click **Save**.
|
||||||
|
|
||||||
|
You can find more info about how to control which users in your school can use Microsoft Teams, turn off group creation, configure tenant-level settings, and more by reading the *Guide for IT admins* getting started guide in the <a href="https://aka.ms/MeetTeamsEdu" target="_blank">Meet Microsoft Teams</a> page.
|
||||||
|
|
||||||
## Add more users
|
## Add more users
|
||||||
After your cloud infrastructure is set up and you have a device management strategy in place, you may need to add more users and you want the same policies to apply to these users. You can add new users to your tenant simply by adding them to the Office 365 groups. Adding new users to Office 365 groups automatically adds them to the corresponding groups in Intune for Education.
|
After your cloud infrastructure is set up and you have a device management strategy in place, you may need to add more users and you want the same policies to apply to these users. You can add new users to your tenant simply by adding them to the Office 365 groups. Adding new users to Office 365 groups automatically adds them to the corresponding groups in Intune for Education.
|
||||||
|
|
||||||
@ -173,6 +210,10 @@ Adding a new device to your cloud-based tenant is easy. For new devices, you can
|
|||||||
|
|
||||||
It may take several minutes before the new device shows up so check again later.
|
It may take several minutes before the new device shows up so check again later.
|
||||||
|
|
||||||
|
|
||||||
|
> [!div class="step-by-step"]
|
||||||
|
[<< Set up Windows 10 education devices](set-up-windows-10-education-devices.md)
|
||||||
|
|
||||||
|
|
||||||
## Related topic
|
## Related topic
|
||||||
[Get started: Deploy and manage a full cloud IT solution with Microsoft Education](get-started-with-microsoft-education.md)
|
[Get started: Deploy and manage a full cloud IT solution with Microsoft Education](get-started-with-microsoft-education.md)
|
||||||
|
@ -10,7 +10,7 @@ ms.localizationpriority: high
|
|||||||
ms.pagetype: edu
|
ms.pagetype: edu
|
||||||
author: CelesteDG
|
author: CelesteDG
|
||||||
ms.author: celested
|
ms.author: celested
|
||||||
ms.date: 07/10/2017
|
ms.date: 08/29/2017
|
||||||
---
|
---
|
||||||
|
|
||||||
# Get started: Deploy and manage a full cloud IT solution with Microsoft Education
|
# Get started: Deploy and manage a full cloud IT solution with Microsoft Education
|
||||||
@ -43,21 +43,20 @@ With Microsoft Education, schools can:
|
|||||||
Go to the <a href="https://www.microsoft.com/en-us/education" target="_blank">Microsoft Education site</a> to learn more. See <a href="https://www.microsoft.com/en-us/education/buy-license/overview-of-how-to-buy/default.aspx?tabshow=schools" target="_blank">How to buy</a> to learn about pricing and purchasing options for schools, students, and teachers as well as academic pricing and offers for qualified K-12 and higher education institutions.
|
Go to the <a href="https://www.microsoft.com/en-us/education" target="_blank">Microsoft Education site</a> to learn more. See <a href="https://www.microsoft.com/en-us/education/buy-license/overview-of-how-to-buy/default.aspx?tabshow=schools" target="_blank">How to buy</a> to learn about pricing and purchasing options for schools, students, and teachers as well as academic pricing and offers for qualified K-12 and higher education institutions.
|
||||||
|
|
||||||
## What we're doing
|
## What we're doing
|
||||||
In this walkthrough, we'll show you the basics on how to:
|
The end-to-end process for deploying and managing a full cloud IT solution with Microsoft Education is outlined here. Depending on your [setup scenario](#setup-options), you may not need to implement all these steps.
|
||||||
> [!div class="checklist"]
|
|
||||||
> * Acquire an Office 365 for Education tenant, if you don't already have one
|
|
||||||
> * Import school, student, teacher, and class data using School Data Sync (SDS)
|
|
||||||
> * Deploy Microsoft Teams to enable groups and teams in your school to communicate and collaborate
|
|
||||||
> * Manage apps and settings deployment with Intune for Education
|
|
||||||
> * Acquire additional apps in Microsoft Store for Education
|
|
||||||
> * Use the Set up School PCs app to quickly set up and provision your Windows 10 education devices
|
|
||||||
> * Log in and use the devices
|
|
||||||
|
|
||||||
This diagram shows a high-level view of what we cover in this walkthrough. The numbers correspond to the sections in the walkthrough and roughly correspond to the flow of the overall process; but, note that not all sections in this walkthrough are shown in the diagram.
|
Click the link to watch the video or follow the step-by-step guidance for each.
|
||||||
|
|
||||||
|
1. [Set up an Office 365 education tenant](set-up-office365-edu-tenant.md)
|
||||||
|
2. [Use School Data Sync to import student data](use-school-data-sync.md)
|
||||||
|
3. [Configure Microsoft Store for Education](configure-microsoft-store-for-education.md)
|
||||||
|
4. [Use Intune for Education to manage groups, apps, and settings](use-intune-for-education.md)
|
||||||
|
5. [Set up Windows 10 education devices](set-up-windows-10-education-devices.md)
|
||||||
|
6. [Finish Windows 10 device setup and other tasks](finish-setup-and-other-tasks.md)
|
||||||
|
|
||||||
**Figure 1** - Microsoft Education IT administrator workflow
|
**Figure 1** - Microsoft Education IT administrator workflow
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
## Prerequisites
|
## Prerequisites
|
||||||
Complete these tasks before you start the walkthrough:
|
Complete these tasks before you start the walkthrough:
|
||||||
@ -130,19 +129,6 @@ Already have an Office 365 for Education verified tenant? Just sign in with your
|
|||||||
3. Enter your Office 365 global admin credentials to apply the Intune for Education trial to your tenant.
|
3. Enter your Office 365 global admin credentials to apply the Intune for Education trial to your tenant.
|
||||||
4. If you don't already have Microsoft Teams deployed to your tenant, you can start with [Enable Microsoft Teams for your school](enable-microsoft-teams.md) and then follow the rest of the instructions in this walkthrough.
|
4. If you don't already have Microsoft Teams deployed to your tenant, you can start with [Enable Microsoft Teams for your school](enable-microsoft-teams.md) and then follow the rest of the instructions in this walkthrough.
|
||||||
|
|
||||||
## End-to-end process
|
|
||||||
The end-to-end process for deploying and managing a full cloud IT solution with Microsoft Education is outlined here. Depending on scenario, you may not need to implement all these steps.
|
|
||||||
|
|
||||||
Click the link to watch the video or follow the step-by-step guidance for each.
|
|
||||||
|
|
||||||
1. [Set up an Office 365 education tenant](set-up-office365-edu-tenant.md)
|
|
||||||
2. [Use School Data Sync to import student data](use-school-data-sync.md)
|
|
||||||
3. [Enable Microsoft Teams for your school](enable-microsoft-teams.md)
|
|
||||||
4. [Configure Microsoft Store for Education](configure-microsoft-store-for-education.md)
|
|
||||||
5. [Use Intune for Education to manage groups, apps, and settings](use-intune-for-education.md)
|
|
||||||
6. [Set up Windows 10 education devices](set-up-windows-10-education-devices.md)
|
|
||||||
7. [Finish Windows 10 device setup and other tasks](finish-setup-and-other-tasks.md)
|
|
||||||
|
|
||||||
## Get more info
|
## Get more info
|
||||||
|
|
||||||
### Microsoft Education documentation and resources hub
|
### Microsoft Education documentation and resources hub
|
||||||
|
BIN
education/get-started/images/MSES_Get_Started_IT_082917.png
Normal file
After Width: | Height: | Size: 662 KiB |
@ -15,6 +15,10 @@ ms.date: 07/10/2017
|
|||||||
|
|
||||||
# Set up an Office 365 Education tenant
|
# Set up an Office 365 Education tenant
|
||||||
|
|
||||||
|
> [!div class="step-by-step"]
|
||||||
|
[<< Get started: Deploy and manage a full cloud IT solution with Microsoft Education](get-started-with-microsoft-education.md)
|
||||||
|
[Use School Data Sync to import student data >>](use-school-data-sync.md)
|
||||||
|
|
||||||
Schools can use Office 365 to save time and be more productive. Built with powerful tools and accessible from any device, setting it up is the first step in getting your school to the cloud.
|
Schools can use Office 365 to save time and be more productive. Built with powerful tools and accessible from any device, setting it up is the first step in getting your school to the cloud.
|
||||||
|
|
||||||
Don't have an Office 365 for Education verified tenant or just starting out? Follow these steps to set up an Office 365 for Education tenant. [Learn more about Office 365 for Education plans and pricing](https://products.office.com/en-us/academic/compare-office-365-education-plans). </br>
|
Don't have an Office 365 for Education verified tenant or just starting out? Follow these steps to set up an Office 365 for Education tenant. [Learn more about Office 365 for Education plans and pricing](https://products.office.com/en-us/academic/compare-office-365-education-plans). </br>
|
||||||
|
@ -15,6 +15,10 @@ ms.date: 07/10/2017
|
|||||||
|
|
||||||
# Set up Windows 10 education devices
|
# Set up Windows 10 education devices
|
||||||
|
|
||||||
|
> [!div class="step-by-step"]
|
||||||
|
[<< Use Intune for Education to manage groups, apps, and settings](use-intune-for-education.md)
|
||||||
|
[Finish setup and other tasks >>](finish-setup-and-other-tasks.md)
|
||||||
|
|
||||||
We recommend using the latest build of Windows 10, version 1703 on your education devices.
|
We recommend using the latest build of Windows 10, version 1703 on your education devices.
|
||||||
|
|
||||||
To set up new Windows 10 devices and enroll them to your education tenant, choose from one of these options and follow the link to watch the video or follow the step-by-step guide:
|
To set up new Windows 10 devices and enroll them to your education tenant, choose from one of these options and follow the link to watch the video or follow the step-by-step guide:
|
||||||
|
@ -15,6 +15,10 @@ ms.date: 07/10/2017
|
|||||||
|
|
||||||
# Use Intune for Education to manage groups, apps, and settings
|
# Use Intune for Education to manage groups, apps, and settings
|
||||||
|
|
||||||
|
> [!div class="step-by-step"]
|
||||||
|
[<< Configure Microsoft Store for Education](configure-microsoft-store-for-education.md)
|
||||||
|
[Set up Windows 10 education devices >>](set-up-windows-10-education-devices.md)
|
||||||
|
|
||||||
Intune for Education is a streamlined device management solution for educational institutions that can be used to quickly set up and manage Windows 10 devices for your school. It provides a new streamlined UI with the enterprise readiness and resiliency of the Intune service. You can learn more about Intune for Education by reading the <a href="https://docs.microsoft.com/intune-education" target="_blank">Intune for Education documentation</a>.
|
Intune for Education is a streamlined device management solution for educational institutions that can be used to quickly set up and manage Windows 10 devices for your school. It provides a new streamlined UI with the enterprise readiness and resiliency of the Intune service. You can learn more about Intune for Education by reading the <a href="https://docs.microsoft.com/intune-education" target="_blank">Intune for Education documentation</a>.
|
||||||
|
|
||||||
## Example - Set up Intune for Education, buy apps from the Store, and install the apps
|
## Example - Set up Intune for Education, buy apps from the Store, and install the apps
|
||||||
|
@ -15,6 +15,10 @@ ms.date: 07/10/2017
|
|||||||
|
|
||||||
# Use School Data Sync to import student data
|
# Use School Data Sync to import student data
|
||||||
|
|
||||||
|
> [!div class="step-by-step"]
|
||||||
|
[<< Set up an Office 365 education tenant](set-up-office365-edu-tenant.md)
|
||||||
|
[Configure Microsoft Store for Education >>](configure-microsoft-store-for-education.md)
|
||||||
|
|
||||||
School Data Sync (SDS) helps you import Student Information System (SIS) data into Office 365. It helps automate the process for importing and integrating SIS data that you can use with Office 365 and apps like OneNote Class Notebooks.
|
School Data Sync (SDS) helps you import Student Information System (SIS) data into Office 365. It helps automate the process for importing and integrating SIS data that you can use with Office 365 and apps like OneNote Class Notebooks.
|
||||||
|
|
||||||
Follow all the steps in this section to use SDS and sample CSV files in a trial environment. To use SDS in a production environment, see step 2 in [Try out Microsoft Education in a production environment](https://docs.microsoft.com/en-us/education/get-started/get-started-with-microsoft-education#setup-options) instead.
|
Follow all the steps in this section to use SDS and sample CSV files in a trial environment. To use SDS in a production environment, see step 2 in [Try out Microsoft Education in a production environment](https://docs.microsoft.com/en-us/education/get-started/get-started-with-microsoft-education#setup-options) instead.
|
||||||
@ -177,7 +181,7 @@ That's it for importing sample school data using SDS.
|
|||||||
|
|
||||||
> [!div class="step-by-step"]
|
> [!div class="step-by-step"]
|
||||||
[<< Set up an Office 365 education tenant](set-up-office365-edu-tenant.md)
|
[<< Set up an Office 365 education tenant](set-up-office365-edu-tenant.md)
|
||||||
[Enable Microsoft Teams for your school >>](enable-microsoft-teams.md)
|
[Configure Microsoft Store for Education >>](configure-microsoft-store-for-education.md)
|
||||||
|
|
||||||
## Related topic
|
## Related topic
|
||||||
[Get started: Deploy and manage a full cloud IT solution with Microsoft Education](get-started-with-microsoft-education.md)
|
[Get started: Deploy and manage a full cloud IT solution with Microsoft Education](get-started-with-microsoft-education.md)
|
@ -28,7 +28,7 @@ This topic lists new and updated topics in the [Windows 10 for Education](index.
|
|||||||
| --- | ---- |
|
| --- | ---- |
|
||||||
| [Get Minecraft: Education Edition with Windows 10 device promotion](get-minecraft-for-education.md) | New information about redeeming Minecraft: Education Edition licenses with qualifying purchases of Windows 10 devices. |
|
| [Get Minecraft: Education Edition with Windows 10 device promotion](get-minecraft-for-education.md) | New information about redeeming Minecraft: Education Edition licenses with qualifying purchases of Windows 10 devices. |
|
||||||
| [Use the Set up School PCs app ](use-set-up-school-pcs-app.md) | Added the how-to video, which shows how to use the app to create a provisioning package that you can use to set up school PCs. |
|
| [Use the Set up School PCs app ](use-set-up-school-pcs-app.md) | Added the how-to video, which shows how to use the app to create a provisioning package that you can use to set up school PCs. |
|
||||||
| [Take a Test app technical reference](take-a-test-app-technical.md) | Added a policies section to inform you of any policies that affect the Take a Test app or functionality within the app. |
|
| [Take a Test app technical reference](take-a-test-app-technical.md) | Added a Group Policy section to inform you of any policies that affect the Take a Test app or functionality within the app. |
|
||||||
|
|
||||||
## June 2017
|
## June 2017
|
||||||
|
|
||||||
|
@ -26,7 +26,7 @@ In Windows 10, version 1703 (Creators Update), it is straightforward to configur
|
|||||||
|
|
||||||
| Area | How to configure | What this does | Windows 10 Education | Windows 10 Pro Education | Windows 10 S |
|
| Area | How to configure | What this does | Windows 10 Education | Windows 10 Pro Education | Windows 10 S |
|
||||||
| --- | --- | --- | --- | --- | --- |
|
| --- | --- | --- | --- | --- | --- |
|
||||||
| **Diagnostic Data** | **SetEduPolicies** | Sets Diagnostic Data to [Basic](https://technet.microsoft.com/itpro/windows/configure/configure-windows-telemetry-in-your-organization) | This is already set | This is already set | The policy must be set |
|
| **Diagnostic Data** | **AllowTelemetry** | Sets Diagnostic Data to [Basic](https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization) | This is already set | This is already set | The policy must be set |
|
||||||
| **Microsoft consumer experiences** | **SetEduPolicies** | Disables suggested content from Windows such as app recommendations | This is already set | This is already set | The policy must be set |
|
| **Microsoft consumer experiences** | **SetEduPolicies** | Disables suggested content from Windows such as app recommendations | This is already set | This is already set | The policy must be set |
|
||||||
| **Cortana** | **AllowCortana** | Disables Cortana </br></br> * Cortana is enabled by default on all editions in Windows 10, version 1703 | If using Windows 10 Education, upgrading from Windows 10, version 1607 to Windows 10, version 1703 will enable Cortana. </br></br> See the [Recommended configuration](#recommended-configuration) section below for recommended Cortana settings. | If using Windows 10 Pro Education, upgrading from Windows 10, version 1607 to Windows 10, version 1703 will enable Cortana. </br></br> See the [Recommended configuration](#recommended-configuration) section below for recommended Cortana settings. | See the [Recommended configuration](#recommended-configuration) section below for recommended Cortana settings. |
|
| **Cortana** | **AllowCortana** | Disables Cortana </br></br> * Cortana is enabled by default on all editions in Windows 10, version 1703 | If using Windows 10 Education, upgrading from Windows 10, version 1607 to Windows 10, version 1703 will enable Cortana. </br></br> See the [Recommended configuration](#recommended-configuration) section below for recommended Cortana settings. | If using Windows 10 Pro Education, upgrading from Windows 10, version 1607 to Windows 10, version 1703 will enable Cortana. </br></br> See the [Recommended configuration](#recommended-configuration) section below for recommended Cortana settings. | See the [Recommended configuration](#recommended-configuration) section below for recommended Cortana settings. |
|
||||||
| **Safe search** | **SetEduPolicies** | Locks Bing safe search to Strict in Microsoft Edge | This is already set | This is already set | The policy must be set |
|
| **Safe search** | **SetEduPolicies** | Locks Bing safe search to Strict in Microsoft Edge | This is already set | This is already set | The policy must be set |
|
||||||
|
@ -9,7 +9,7 @@ ms.pagetype: edu
|
|||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
author: CelesteDG
|
author: CelesteDG
|
||||||
ms.author: celested
|
ms.author: celested
|
||||||
ms.date: 07/28/2017
|
ms.date: 08/07/2017
|
||||||
---
|
---
|
||||||
|
|
||||||
# Take a Test app technical reference
|
# Take a Test app technical reference
|
||||||
@ -51,6 +51,18 @@ When Take a Test is running, the following MDM policies are applied to lock down
|
|||||||
| AllowCortana | Disables Cortana functionality | 0 |
|
| AllowCortana | Disables Cortana functionality | 0 |
|
||||||
| AllowAutoupdate | Disables Windows Update from starting OS updates | 5 |
|
| AllowAutoupdate | Disables Windows Update from starting OS updates | 5 |
|
||||||
|
|
||||||
|
## Group Policy
|
||||||
|
|
||||||
|
To ensure Take a Test activates correctly, make sure the following Group Policy are not configured on the PC.
|
||||||
|
|
||||||
|
| Functionality | Group Policy path | Policy |
|
||||||
|
| --- | --- | --- |
|
||||||
|
| Require Ctrl+Alt+Del | Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options | Interactive logon: Do not Require CTRL+ALT+DEL |
|
||||||
|
| Disable lock screen notifications | Computer Configuration\Administrative Templates\System\Logon | Turn off app notifications on the lock screen |
|
||||||
|
| Disable lock screen | Computer Configuration\Administrative Templates\Control Panel\Personalization | Do not display the lock screen |
|
||||||
|
| Disable UAC | Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options | User Account Control: Run all administrators in Admin Approval Mode |
|
||||||
|
| Disable local workstation | User Configuration\Administrative Templates\System\Ctrl+Alt+Del Options | Remove Lock Computer |
|
||||||
|
|
||||||
## Allowed functionality
|
## Allowed functionality
|
||||||
|
|
||||||
When Take a Test is running, the following functionality is available to students:
|
When Take a Test is running, the following functionality is available to students:
|
||||||
@ -75,26 +87,6 @@ When Take a Test is running, the following functionality is available to student
|
|||||||
- Ctrl+Alt+Del
|
- Ctrl+Alt+Del
|
||||||
- Alt+F4 (Take a Test will restart if the student is using a dedicated test account)
|
- Alt+F4 (Take a Test will restart if the student is using a dedicated test account)
|
||||||
|
|
||||||
## Policies
|
|
||||||
|
|
||||||
If the lock screen is disabled, Take a Test will not launch above lock. Be aware that if you set the following Group Policy, this breaks activation of Take a Test above lock.
|
|
||||||
|
|
||||||
**Group Policy path:** Computer Configuration\Administrative Templates\Control Panel\Personalization\ <br />
|
|
||||||
**Group Policy name:** Do not display the lock screen <br />
|
|
||||||
**ADML:** %SDXROOT%\shell\policies\ControlPanelDisplay.adml <br />
|
|
||||||
**ADMX:** %SDXROOT%\shell\policies\ControlPanelDisplay.admx <br />
|
|
||||||
|
|
||||||
```
|
|
||||||
<policy name="CPL_Personalization_NoLockScreen" class="Machine"
|
|
||||||
displayName="$(string.CPL_Personalization_NoLockScreen)"
|
|
||||||
explainText="$(string.CPL_Personalization_NoLockScreen_Help)"
|
|
||||||
key="Software\Policies\Microsoft\Windows\Personalization"
|
|
||||||
valueName="NoLockScreen">
|
|
||||||
<parentCategory ref="Personalization" />
|
|
||||||
<supportedOn ref="windows:SUPPORTED_Windows8" />
|
|
||||||
</policy>
|
|
||||||
```
|
|
||||||
|
|
||||||
|
|
||||||
## Learn more
|
## Learn more
|
||||||
|
|
||||||
|
@ -9,7 +9,7 @@ ms.sitesec: library
|
|||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
author: CelesteDG
|
author: CelesteDG
|
||||||
ms.author: celested
|
ms.author: celested
|
||||||
ms.date: 08/01/2017
|
ms.date: 08/30/2017
|
||||||
---
|
---
|
||||||
|
|
||||||
# Test Windows 10 S on existing Windows 10 education devices
|
# Test Windows 10 S on existing Windows 10 education devices
|
||||||
@ -77,8 +77,26 @@ Make sure all drivers are installed and working properly on your device running
|
|||||||
|
|
||||||
Check with your device manufacturer before trying Windows 10 S on your device to see if the drivers are available and supported by the device manufacturer.
|
Check with your device manufacturer before trying Windows 10 S on your device to see if the drivers are available and supported by the device manufacturer.
|
||||||
|
|
||||||
|
| | | |
|
||||||
|
| - | - | - |
|
||||||
|
| <a href="https://www.acer.com/ac/en/US/content/windows10s-compatible-list" target="_blank">Acer</a> | <a href="http://www.51cube.com/ch/win10s-help.php" target="_blank">Alldocube</a> | <a href="https://www.ibuypower.com/site/computer/windows-10-s" target="_blank">American Future Tech</a> |
|
||||||
|
| <a href="http://www.prestigio.com/support/compatibility-with-windows-10-s/" target="_blank">ASBISC</a> | <a href="https://www.asus.com/event/2017/win10S/" target="_blank">Asus</a> | <a href="http://www.atec.kr/contents/ms_info.html" target="_blank">Atec</a> |
|
||||||
|
| <a href="https://www.odys.de/web/web_lan_en_hmp_1_win10s_ja.html" target="_blank">Axdia</a> | <a href="http://www.casper.com.tr/window10sdestegi" target="_blank">Casper</a> | <a href="https://www.cyberpowerpc.com/page/Windows-10-S/" target="_blank">Cyberpower</a> |
|
||||||
|
| <a href="http://www.lucoms.com/v2/cs/cs_windows10.asp" target="_blank">Daewoo</a> | <a href="http://www.daten.com.br/suportes/windows10s/" target="_blank">Daten</a> | <a href="http://www.dell.com/support/article/us/en/19/sln307174/dell-computers-tested-for-windows-10-s?lang=en" target="_blank">Dell</a> |
|
||||||
|
| <a href="http://www.epson.jp/support/misc/windows10s.htm" target="_blank">Epson</a> | <a href="http://exo.com.ar/actualizaciones-de-windows-10" target="_blank">EXO</a> | <a href="http://www.fujitsu.com/au/products/computing/pc/microsoft/s-compatible/" target="_blank">Fujitsu</a> |
|
||||||
|
| <a href="http://apac.getac.com/support/windows10s.html" target="_blank">Getac</a> | <a href="http://compaq.com.br/sistemas-compativeis-com-windows-10-s.html" target="_blank">Global K</a> | <a href="https://support.hp.com/us-en/document/c05588871" target="_blank">HP</a> |
|
||||||
|
| <a href="http://consumer.huawei.com/cn/support/notice/detail/index.htm?id=1541" target="_blank">Huawei</a> | <a href="http://www.inet-tek.com/en/product-qadetail-86.html" target="_blank">iNET</a> | <a href="https://www.intel.com/content/www/us/en/support/boards-and-kits/000025096.html" target="_blank">Intel</a> |
|
||||||
|
| <a href="http://irbis-digital.ru/support/podderzhka-windows-10-s/" target="_blank">LANIT Trading</a> | <a href="https://support.lenovo.com/us/en/solutions/ht504589" target="_blank">Lenovo</a> | <a href="http://www.lg.com/us/content/html/hq/windows10update/Win10S_UpdateInfo.html" target="_blank">LG</a> |
|
||||||
|
| <a href="https://www2.mouse-jp.co.jp/ssl/user_support2/info.asp?N_ID=361" target="_blank">MCJ</a> | <a href="http://support.linxtablets.com/WindowsSupport/Articles/Windows_10_S_Supported_Devices.aspx" target="_blank">Micro P/Exertis</a> | <a href="https://www.microsoft.com/surface/en-us/support/windows-and-office/surface-devices-that-work-with-windows-10-s" target="_blank">Microsoft</a> |
|
||||||
|
| <a href="https://www.msi.com/Landing/Win10S" target="_blank">MSI</a> | <a href="https://panasonic.net/cns/pc/Windows10S/" target="_blank">Panasonic</a> | <a href="http://www.bangho.com.ar/windows10s" target="_blank">PC Arts</a> |
|
||||||
|
| <a href="http://www.positivoinformatica.com.br/atualizacao-windows-10" target="_blank">Positivo SA</a> | <a href="http://www.br.vaio.com/atualizacao-windows-10/" target="_blank">Positivo da Bahia</a> | <a href="http://www.samsung.com/us/support/windows10s/" target="_blank">Samsung</a> |
|
||||||
|
| <a href="http://www.teclast.com/zt/aboutwin10s/" target="_blank">Teclast</a> | <a href="http://www.dospara.co.jp/support/share.php?contents=about_windows10s" target="_blank">Thirdwave</a> | <a href="http://www.tongfangpc.com/service/win10.aspx" target="_blank">Tongfang</a> |
|
||||||
|
| <a href="http://win10upgrade.toshiba.com/win10s/information?region=TAIS&country=US&lang=en" target="_blank">Toshiba</a> | <a href="http://www.trekstor.de/windows-10-s-en.html" target="_blank">Trekstor</a> | <a href="http://www.trigem.co.kr/windows/win10S.html" target="_blank">Trigem</a> |
|
||||||
|
| <a href="http://us.vaio.com/support/knowledge-base/windows-10-s-compatibility-information/" target="_blank">Vaio</a> | <a href="https://www.wortmann.de/en-gb/content/+windows-10-s-supportinformation/windows-10-s-supportinformation.aspx" target="_blank">Wortmann</a> | <a href="http://www.yifangdigital.com/Customerservice/win10s.aspx" target="_blank">Yifang</a> |
|
||||||
|
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> We'll update this section with more information so check back again soon.
|
> If you don't see any device listed on the manufacturer's web site, check back again later as more devices get added in the future.
|
||||||
|
|
||||||
<!--
|
<!--
|
||||||
* [Microsoft](https://www.microsoft.com/surface/en-us/support/windows-and-office/surface-devices-that-work-with-windows-10-s)
|
* [Microsoft](https://www.microsoft.com/surface/en-us/support/windows-and-office/surface-devices-that-work-with-windows-10-s)
|
||||||
@ -172,7 +190,6 @@ To use an installation media to reinstall Windows 10, follow these steps.
|
|||||||
Ready to test Windows 10 S on your existing Windows 10 Pro or Windows 10 Pro Education device? Make sure you read the [important pre-installation information](#important-information) and all the above information.
|
Ready to test Windows 10 S on your existing Windows 10 Pro or Windows 10 Pro Education device? Make sure you read the [important pre-installation information](#important-information) and all the above information.
|
||||||
|
|
||||||
When you're ready, you can download the Windows 10 S installer by clicking the **Download installer** button below:
|
When you're ready, you can download the Windows 10 S installer by clicking the **Download installer** button below:
|
||||||
<!-- download the Windows 10 S installer from [this Microsoft website](https://go.microsoft.com/fwlink/?linkid=853240). -->
|
|
||||||
|
|
||||||
> [!div class="nextstepaction" style="center"]
|
> [!div class="nextstepaction" style="center"]
|
||||||
> [Download installer](https://go.microsoft.com/fwlink/?linkid=853240)
|
> [Download installer](https://go.microsoft.com/fwlink/?linkid=853240)
|
||||||
@ -201,7 +218,7 @@ Common support questions for the Windows 10 S test program:
|
|||||||
|
|
||||||
* **What if I want to move from Windows 10 S to Windows 10 Pro?**
|
* **What if I want to move from Windows 10 S to Windows 10 Pro?**
|
||||||
|
|
||||||
If you want to discontinue using Windows 10 S, follow the instructions to return to your previous installation of Windows 10. If you already had Windows 10 Pro or Windows 10 Pro Education on the device you are testing on, you should be able to move to Windows 10 Pro or Windows 10 Pro Education at no charge with the instructions in this document. Otherwise, ther emay be a cost to acquire a Windows 10 Pro license in the Store.
|
If you want to discontinue using Windows 10 S, follow the instructions to return to your previous installation of Windows 10. If you already had Windows 10 Pro or Windows 10 Pro Education on the device you are testing on, you should be able to move to Windows 10 Pro or Windows 10 Pro Education at no charge with the instructions in this document. Otherwise, there may be a cost to acquire a Windows 10 Pro license in the Store.
|
||||||
|
|
||||||
For help with activation issues, click on the appropriate link below for support options.
|
For help with activation issues, click on the appropriate link below for support options.
|
||||||
* For Volume Licensing Agreement or Shape the Future program customers, go to the [Microsoft Commercial Support](https://support.microsoft.com/gp/commercialsupport) website and select the country/region in which you are seeking commercial support to contact our commercial support team.
|
* For Volume Licensing Agreement or Shape the Future program customers, go to the [Microsoft Commercial Support](https://support.microsoft.com/gp/commercialsupport) website and select the country/region in which you are seeking commercial support to contact our commercial support team.
|
||||||
|
@ -233,7 +233,7 @@ The **Set up School PCs** app guides you through the configuration choices for t
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
11. When the provisioning package is ready, you will see the name of the file and you can remove the USB drive. Click **Next** if you're done, or click **Add a USB** to save the same provisioning package to another USB drive.
|
11. <a name="suspc_pkgready"></a>When the provisioning package is ready, you will see the name of the file and you can remove the USB drive. Click **Next** if you're done, or click **Add a USB** to save the same provisioning package to another USB drive.
|
||||||
|
|
||||||
**Figure 9** - Provisioning package is ready
|
**Figure 9** - Provisioning package is ready
|
||||||
|
|
||||||
@ -246,7 +246,7 @@ The **Set up School PCs** app guides you through the configuration choices for t
|
|||||||

|

|
||||||
|
|
||||||
13. Click **Next**.
|
13. Click **Next**.
|
||||||
14. In the **Install the package** page, follow the instructions in [Apply the provisioning package to the student PCs](#apply-the-provisioning-package-to-the-student-pcs) to set up the student PCs.
|
14. <a name="suspc_installpkg"></a>In the **Install the package** page, follow the instructions in [Apply the provisioning package to the student PCs](#apply-the-provisioning-package-to-the-student-pcs) to set up the student PCs.
|
||||||
|
|
||||||
Select **Create new package** if you need to create a new provisioning package. Otherwise, you can remove the USB drive if you're completely done creating the package.
|
Select **Create new package** if you need to create a new provisioning package. Otherwise, you can remove the USB drive if you're completely done creating the package.
|
||||||
|
|
||||||
|
@ -189,7 +189,7 @@ The available image file types are:
|
|||||||
|
|
||||||
- **Windows Imaging File (WIM)** - used to deploy DaRT to a preboot execution environment (PXE) or local partition).
|
- **Windows Imaging File (WIM)** - used to deploy DaRT to a preboot execution environment (PXE) or local partition).
|
||||||
|
|
||||||
- **International Standards Organization (ISO)** – used to deploy to CD or DVD, or for use in virtual machines (VM)s). The wizard requires that the ISO image have an .iso file name extension because most programs that burn a CD or DVD require that extension. If you do not specify a different location, the ISO image is created on your desktop with the name DaRT8.ISO.
|
- **ISO image file** – used to deploy to CD or DVD, or for use in virtual machines (VM)s). The wizard requires that the ISO image have an .iso file name extension because most programs that burn a CD or DVD require that extension. If you do not specify a different location, the ISO image is created on your desktop with the name DaRT8.ISO.
|
||||||
|
|
||||||
- **PowerShell script** – creates a DaRT recovery image with commands that provide essentially the same options that you can select by using the DaRT Recovery Image wizard. The script also enables you to add or changes files in the DaRT recovery image.
|
- **PowerShell script** – creates a DaRT recovery image with commands that provide essentially the same options that you can select by using the DaRT Recovery Image wizard. The script also enables you to add or changes files in the DaRT recovery image.
|
||||||
|
|
||||||
|
@ -32,8 +32,8 @@ In the following sections, complete the instructions that correspond to the vers
|
|||||||
// Microsoft BitLocker Administration and Monitoring
|
// Microsoft BitLocker Administration and Monitoring
|
||||||
//===================================================
|
//===================================================
|
||||||
|
|
||||||
#pragma namespace ("\\\\.\\root\\cimv2\\SMS")
|
#pragma namespace ("\\\\.\\root\\cimv2\\SMS")
|
||||||
#pragma deleteclass("Win32_BitLockerEncryptionDetails", NOFAIL)
|
#pragma deleteclass("Win32_BitLockerEncryptionDetails", NOFAIL)
|
||||||
[ SMS_Report (TRUE),
|
[ SMS_Report (TRUE),
|
||||||
SMS_Group_Name ("BitLocker Encryption Details"),
|
SMS_Group_Name ("BitLocker Encryption Details"),
|
||||||
SMS_Class_ID ("MICROSOFT|BITLOCKER_DETAILS|1.0")]
|
SMS_Class_ID ("MICROSOFT|BITLOCKER_DETAILS|1.0")]
|
||||||
@ -66,9 +66,9 @@ In the following sections, complete the instructions that correspond to the vers
|
|||||||
[ SMS_Report (TRUE) ]
|
[ SMS_Report (TRUE) ]
|
||||||
Boolean IsAutoUnlockEnabled;
|
Boolean IsAutoUnlockEnabled;
|
||||||
};
|
};
|
||||||
#pragma namespace ("\\\\.\\root\\cimv2\\SMS")
|
#pragma namespace ("\\\\.\\root\\cimv2\\SMS")
|
||||||
|
|
||||||
#pragma deleteclass("Win32Reg_MBAMPolicy", NOFAIL)
|
#pragma deleteclass("Win32Reg_MBAMPolicy", NOFAIL)
|
||||||
[ SMS_Report(TRUE),
|
[ SMS_Report(TRUE),
|
||||||
SMS_Group_Name("BitLocker Policy"),
|
SMS_Group_Name("BitLocker Policy"),
|
||||||
SMS_Class_ID("MICROSOFT|MBAM_POLICY|1.0")]
|
SMS_Class_ID("MICROSOFT|MBAM_POLICY|1.0")]
|
||||||
@ -112,8 +112,8 @@ In the following sections, complete the instructions that correspond to the vers
|
|||||||
};
|
};
|
||||||
|
|
||||||
//Read Win32_OperatingSystem.SKU WMI property in a new class - because SKU is not available before Vista.
|
//Read Win32_OperatingSystem.SKU WMI property in a new class - because SKU is not available before Vista.
|
||||||
#pragma namespace ("\\\\.\\root\\cimv2\\SMS")
|
#pragma namespace ("\\\\.\\root\\cimv2\\SMS")
|
||||||
#pragma deleteclass("CCM_OperatingSystemExtended", NOFAIL)
|
#pragma deleteclass("CCM_OperatingSystemExtended", NOFAIL)
|
||||||
[ SMS_Report (TRUE),
|
[ SMS_Report (TRUE),
|
||||||
SMS_Group_Name ("Operating System Ex"),
|
SMS_Group_Name ("Operating System Ex"),
|
||||||
SMS_Class_ID ("MICROSOFT|OPERATING_SYSTEM_EXT|1.0") ]
|
SMS_Class_ID ("MICROSOFT|OPERATING_SYSTEM_EXT|1.0") ]
|
||||||
@ -126,8 +126,8 @@ In the following sections, complete the instructions that correspond to the vers
|
|||||||
};
|
};
|
||||||
|
|
||||||
//Read Win32_ComputerSystem.PCSystemType WMI property in a new class - because PCSystemType is not available before Vista.
|
//Read Win32_ComputerSystem.PCSystemType WMI property in a new class - because PCSystemType is not available before Vista.
|
||||||
#pragma namespace ("\\\\.\\root\\cimv2\\SMS")
|
#pragma namespace ("\\\\.\\root\\cimv2\\SMS")
|
||||||
#pragma deleteclass("CCM_ComputerSystemExtended", NOFAIL)
|
#pragma deleteclass("CCM_ComputerSystemExtended", NOFAIL)
|
||||||
[ SMS_Report (TRUE),
|
[ SMS_Report (TRUE),
|
||||||
SMS_Group_Name ("Computer System Ex"),
|
SMS_Group_Name ("Computer System Ex"),
|
||||||
SMS_Class_ID ("MICROSOFT|COMPUTER_SYSTEM_EXT|1.0") ]
|
SMS_Class_ID ("MICROSOFT|COMPUTER_SYSTEM_EXT|1.0") ]
|
||||||
@ -194,8 +194,8 @@ In the following sections, complete the instructions that correspond to the vers
|
|||||||
// Microsoft BitLocker Administration and Monitoring
|
// Microsoft BitLocker Administration and Monitoring
|
||||||
//===================================================
|
//===================================================
|
||||||
|
|
||||||
#pragma namespace ("\\\\.\\root\\cimv2\\SMS")
|
#pragma namespace ("\\\\.\\root\\cimv2\\SMS")
|
||||||
#pragma deleteclass("Win32_BitLockerEncryptionDetails", NOFAIL)
|
#pragma deleteclass("Win32_BitLockerEncryptionDetails", NOFAIL)
|
||||||
[ SMS_Report (TRUE),
|
[ SMS_Report (TRUE),
|
||||||
SMS_Group_Name ("BitLocker Encryption Details"),
|
SMS_Group_Name ("BitLocker Encryption Details"),
|
||||||
SMS_Class_ID ("MICROSOFT|BITLOCKER_DETAILS|1.0")]
|
SMS_Class_ID ("MICROSOFT|BITLOCKER_DETAILS|1.0")]
|
||||||
@ -229,8 +229,8 @@ In the following sections, complete the instructions that correspond to the vers
|
|||||||
Boolean IsAutoUnlockEnabled;
|
Boolean IsAutoUnlockEnabled;
|
||||||
};
|
};
|
||||||
|
|
||||||
#pragma namespace ("\\\\.\\root\\cimv2\\SMS")
|
#pragma namespace ("\\\\.\\root\\cimv2\\SMS")
|
||||||
#pragma deleteclass("Win32Reg_MBAMPolicy", NOFAIL)
|
#pragma deleteclass("Win32Reg_MBAMPolicy", NOFAIL)
|
||||||
[ SMS_Report(TRUE),
|
[ SMS_Report(TRUE),
|
||||||
SMS_Group_Name("BitLocker Policy"),
|
SMS_Group_Name("BitLocker Policy"),
|
||||||
SMS_Class_ID("MICROSOFT|MBAM_POLICY|1.0"),
|
SMS_Class_ID("MICROSOFT|MBAM_POLICY|1.0"),
|
||||||
@ -275,8 +275,8 @@ In the following sections, complete the instructions that correspond to the vers
|
|||||||
string EncodedComputerName;
|
string EncodedComputerName;
|
||||||
};
|
};
|
||||||
|
|
||||||
#pragma namespace ("\\\\.\\root\\cimv2\\SMS")
|
#pragma namespace ("\\\\.\\root\\cimv2\\SMS")
|
||||||
#pragma deleteclass("Win32Reg_MBAMPolicy_64", NOFAIL)
|
#pragma deleteclass("Win32Reg_MBAMPolicy_64", NOFAIL)
|
||||||
[ SMS_Report(TRUE),
|
[ SMS_Report(TRUE),
|
||||||
SMS_Group_Name("BitLocker Policy"),
|
SMS_Group_Name("BitLocker Policy"),
|
||||||
SMS_Class_ID("MICROSOFT|MBAM_POLICY|1.0"),
|
SMS_Class_ID("MICROSOFT|MBAM_POLICY|1.0"),
|
||||||
@ -322,8 +322,8 @@ In the following sections, complete the instructions that correspond to the vers
|
|||||||
};
|
};
|
||||||
|
|
||||||
//Read Win32_OperatingSystem.SKU WMI property in a new class - because SKU is not available before Vista.
|
//Read Win32_OperatingSystem.SKU WMI property in a new class - because SKU is not available before Vista.
|
||||||
#pragma namespace ("\\\\.\\root\\cimv2\\SMS")
|
#pragma namespace ("\\\\.\\root\\cimv2\\SMS")
|
||||||
#pragma deleteclass("CCM_OperatingSystemExtended", NOFAIL)
|
#pragma deleteclass("CCM_OperatingSystemExtended", NOFAIL)
|
||||||
[ SMS_Report (TRUE),
|
[ SMS_Report (TRUE),
|
||||||
SMS_Group_Name ("Operating System Ex"),
|
SMS_Group_Name ("Operating System Ex"),
|
||||||
SMS_Class_ID ("MICROSOFT|OPERATING_SYSTEM_EXT|1.0") ]
|
SMS_Class_ID ("MICROSOFT|OPERATING_SYSTEM_EXT|1.0") ]
|
||||||
@ -336,8 +336,8 @@ In the following sections, complete the instructions that correspond to the vers
|
|||||||
};
|
};
|
||||||
|
|
||||||
//Read Win32_ComputerSystem.PCSystemType WMI property in a new class - because PCSystemType is not available before Vista.
|
//Read Win32_ComputerSystem.PCSystemType WMI property in a new class - because PCSystemType is not available before Vista.
|
||||||
#pragma namespace ("\\\\.\\root\\cimv2\\SMS")
|
#pragma namespace ("\\\\.\\root\\cimv2\\SMS")
|
||||||
#pragma deleteclass("CCM_ComputerSystemExtended", NOFAIL)
|
#pragma deleteclass("CCM_ComputerSystemExtended", NOFAIL)
|
||||||
[ SMS_Report (TRUE),
|
[ SMS_Report (TRUE),
|
||||||
SMS_Group_Name ("Computer System Ex"),
|
SMS_Group_Name ("Computer System Ex"),
|
||||||
SMS_Class_ID ("MICROSOFT|COMPUTER_SYSTEM_EXT|1.0") ]
|
SMS_Class_ID ("MICROSOFT|COMPUTER_SYSTEM_EXT|1.0") ]
|
||||||
|
@ -42,8 +42,8 @@ If you are installing Microsoft BitLocker Administration and Monitoring (MBAM) 2
|
|||||||
//===================================================
|
//===================================================
|
||||||
// Microsoft BitLocker Administration and Monitoring
|
// Microsoft BitLocker Administration and Monitoring
|
||||||
//===================================================
|
//===================================================
|
||||||
#pragma namespace ("\\\\.\\root\\cimv2")
|
#pragma namespace ("\\\\.\\root\\cimv2")
|
||||||
#pragma deleteclass("Win32_BitLockerEncryptionDetails", NOFAIL)
|
#pragma deleteclass("Win32_BitLockerEncryptionDetails", NOFAIL)
|
||||||
[Union, ViewSources{"select DeviceId, BitlockerPersistentVolumeId, BitLockerManagementPersistentVolumeId, BitLockerManagementVolumeType, DriveLetter, Compliant, ReasonsForNonCompliance, KeyProtectorTypes, EncryptionMethod, ConversionStatus, ProtectionStatus, IsAutoUnlockEnabled from Mbam_Volume"}, ViewSpaces{"\\\\.\\root\\microsoft\\mbam"}, dynamic, Provider("MS_VIEW_INSTANCE_PROVIDER")]
|
[Union, ViewSources{"select DeviceId, BitlockerPersistentVolumeId, BitLockerManagementPersistentVolumeId, BitLockerManagementVolumeType, DriveLetter, Compliant, ReasonsForNonCompliance, KeyProtectorTypes, EncryptionMethod, ConversionStatus, ProtectionStatus, IsAutoUnlockEnabled from Mbam_Volume"}, ViewSpaces{"\\\\.\\root\\microsoft\\mbam"}, dynamic, Provider("MS_VIEW_INSTANCE_PROVIDER")]
|
||||||
class Win32_BitLockerEncryptionDetails
|
class Win32_BitLockerEncryptionDetails
|
||||||
{
|
{
|
||||||
@ -75,8 +75,8 @@ If you are installing Microsoft BitLocker Administration and Monitoring (MBAM) 2
|
|||||||
Boolean IsAutoUnlockEnabled;
|
Boolean IsAutoUnlockEnabled;
|
||||||
};
|
};
|
||||||
|
|
||||||
#pragma namespace ("\\\\.\\root\\cimv2")
|
#pragma namespace ("\\\\.\\root\\cimv2")
|
||||||
#pragma deleteclass("Win32Reg_MBAMPolicy", NOFAIL)
|
#pragma deleteclass("Win32Reg_MBAMPolicy", NOFAIL)
|
||||||
[DYNPROPS]
|
[DYNPROPS]
|
||||||
Class Win32Reg_MBAMPolicy
|
Class Win32Reg_MBAMPolicy
|
||||||
{
|
{
|
||||||
@ -137,8 +137,8 @@ If you are installing Microsoft BitLocker Administration and Monitoring (MBAM) 2
|
|||||||
EncodedComputerName;
|
EncodedComputerName;
|
||||||
};
|
};
|
||||||
|
|
||||||
#pragma namespace ("\\\\.\\root\\cimv2")
|
#pragma namespace ("\\\\.\\root\\cimv2")
|
||||||
#pragma deleteclass("CCM_OperatingSystemExtended", NOFAIL)
|
#pragma deleteclass("CCM_OperatingSystemExtended", NOFAIL)
|
||||||
[Union, ViewSources{"select Name,OperatingSystemSKU from Win32_OperatingSystem"}, ViewSpaces{"\\\\.\\root\\cimv2"},
|
[Union, ViewSources{"select Name,OperatingSystemSKU from Win32_OperatingSystem"}, ViewSpaces{"\\\\.\\root\\cimv2"},
|
||||||
dynamic,Provider("MS_VIEW_INSTANCE_PROVIDER")]
|
dynamic,Provider("MS_VIEW_INSTANCE_PROVIDER")]
|
||||||
class CCM_OperatingSystemExtended
|
class CCM_OperatingSystemExtended
|
||||||
@ -149,8 +149,8 @@ If you are installing Microsoft BitLocker Administration and Monitoring (MBAM) 2
|
|||||||
uint32 SKU;
|
uint32 SKU;
|
||||||
};
|
};
|
||||||
|
|
||||||
#pragma namespace ("\\\\.\\root\\cimv2")
|
#pragma namespace ("\\\\.\\root\\cimv2")
|
||||||
#pragma deleteclass("CCM_ComputerSystemExtended", NOFAIL)
|
#pragma deleteclass("CCM_ComputerSystemExtended", NOFAIL)
|
||||||
[Union, ViewSources{"select Name,PCSystemType from Win32_ComputerSystem"}, ViewSpaces{"\\\\.\\root\\cimv2"},
|
[Union, ViewSources{"select Name,PCSystemType from Win32_ComputerSystem"}, ViewSpaces{"\\\\.\\root\\cimv2"},
|
||||||
dynamic,Provider("MS_VIEW_INSTANCE_PROVIDER")]
|
dynamic,Provider("MS_VIEW_INSTANCE_PROVIDER")]
|
||||||
class CCM_ComputerSystemExtended
|
class CCM_ComputerSystemExtended
|
||||||
@ -181,8 +181,8 @@ If you are installing Microsoft BitLocker Administration and Monitoring (MBAM) 2
|
|||||||
// Microsoft BitLocker Administration and Monitoring
|
// Microsoft BitLocker Administration and Monitoring
|
||||||
//===================================================
|
//===================================================
|
||||||
|
|
||||||
#pragma namespace ("\\\\.\\root\\cimv2")
|
#pragma namespace ("\\\\.\\root\\cimv2")
|
||||||
#pragma deleteclass("Win32_BitLockerEncryptionDetails", NOFAIL)
|
#pragma deleteclass("Win32_BitLockerEncryptionDetails", NOFAIL)
|
||||||
[Union, ViewSources{"select DeviceId, BitlockerPersistentVolumeId, BitLockerManagementPersistentVolumeId, BitLockerManagementVolumeType, DriveLetter, Compliant, ReasonsForNonCompliance, KeyProtectorTypes, EncryptionMethod, ConversionStatus, ProtectionStatus, IsAutoUnlockEnabled from Mbam_Volume"}, ViewSpaces{"\\\\.\\root\\microsoft\\mbam"}, dynamic, Provider("MS_VIEW_INSTANCE_PROVIDER")]
|
[Union, ViewSources{"select DeviceId, BitlockerPersistentVolumeId, BitLockerManagementPersistentVolumeId, BitLockerManagementVolumeType, DriveLetter, Compliant, ReasonsForNonCompliance, KeyProtectorTypes, EncryptionMethod, ConversionStatus, ProtectionStatus, IsAutoUnlockEnabled from Mbam_Volume"}, ViewSpaces{"\\\\.\\root\\microsoft\\mbam"}, dynamic, Provider("MS_VIEW_INSTANCE_PROVIDER")]
|
||||||
class Win32_BitLockerEncryptionDetails
|
class Win32_BitLockerEncryptionDetails
|
||||||
{
|
{
|
||||||
@ -214,8 +214,8 @@ If you are installing Microsoft BitLocker Administration and Monitoring (MBAM) 2
|
|||||||
Boolean IsAutoUnlockEnabled;
|
Boolean IsAutoUnlockEnabled;
|
||||||
};
|
};
|
||||||
|
|
||||||
#pragma namespace ("\\\\.\\root\\cimv2")
|
#pragma namespace ("\\\\.\\root\\cimv2")
|
||||||
#pragma deleteclass("Win32Reg_MBAMPolicy", NOFAIL)
|
#pragma deleteclass("Win32Reg_MBAMPolicy", NOFAIL)
|
||||||
[DYNPROPS]
|
[DYNPROPS]
|
||||||
Class Win32Reg_MBAMPolicy
|
Class Win32Reg_MBAMPolicy
|
||||||
{
|
{
|
||||||
@ -276,8 +276,8 @@ If you are installing Microsoft BitLocker Administration and Monitoring (MBAM) 2
|
|||||||
EncodedComputerName;
|
EncodedComputerName;
|
||||||
};
|
};
|
||||||
|
|
||||||
#pragma namespace ("\\\\.\\root\\cimv2")
|
#pragma namespace ("\\\\.\\root\\cimv2")
|
||||||
#pragma deleteclass("Win32Reg_MBAMPolicy_64", NOFAIL)
|
#pragma deleteclass("Win32Reg_MBAMPolicy_64", NOFAIL)
|
||||||
[DYNPROPS]
|
[DYNPROPS]
|
||||||
Class Win32Reg_MBAMPolicy_64
|
Class Win32Reg_MBAMPolicy_64
|
||||||
{
|
{
|
||||||
@ -338,8 +338,8 @@ If you are installing Microsoft BitLocker Administration and Monitoring (MBAM) 2
|
|||||||
EncodedComputerName;
|
EncodedComputerName;
|
||||||
};
|
};
|
||||||
|
|
||||||
#pragma namespace ("\\\\.\\root\\cimv2")
|
#pragma namespace ("\\\\.\\root\\cimv2")
|
||||||
#pragma deleteclass("CCM_OperatingSystemExtended", NOFAIL)
|
#pragma deleteclass("CCM_OperatingSystemExtended", NOFAIL)
|
||||||
[Union, ViewSources{"select Name,OperatingSystemSKU from Win32_OperatingSystem"}, ViewSpaces{"\\\\.\\root\\cimv2"},
|
[Union, ViewSources{"select Name,OperatingSystemSKU from Win32_OperatingSystem"}, ViewSpaces{"\\\\.\\root\\cimv2"},
|
||||||
dynamic,Provider("MS_VIEW_INSTANCE_PROVIDER")]
|
dynamic,Provider("MS_VIEW_INSTANCE_PROVIDER")]
|
||||||
class CCM_OperatingSystemExtended
|
class CCM_OperatingSystemExtended
|
||||||
@ -350,8 +350,8 @@ If you are installing Microsoft BitLocker Administration and Monitoring (MBAM) 2
|
|||||||
uint32 SKU;
|
uint32 SKU;
|
||||||
};
|
};
|
||||||
|
|
||||||
#pragma namespace ("\\\\.\\root\\cimv2")
|
#pragma namespace ("\\\\.\\root\\cimv2")
|
||||||
#pragma deleteclass("CCM_ComputerSystemExtended", NOFAIL)
|
#pragma deleteclass("CCM_ComputerSystemExtended", NOFAIL)
|
||||||
[Union, ViewSources{"select Name,PCSystemType from Win32_ComputerSystem"}, ViewSpaces{"\\\\.\\root\\cimv2"},
|
[Union, ViewSources{"select Name,PCSystemType from Win32_ComputerSystem"}, ViewSpaces{"\\\\.\\root\\cimv2"},
|
||||||
dynamic,Provider("MS_VIEW_INSTANCE_PROVIDER")]
|
dynamic,Provider("MS_VIEW_INSTANCE_PROVIDER")]
|
||||||
class CCM_ComputerSystemExtended
|
class CCM_ComputerSystemExtended
|
||||||
|
@ -89,6 +89,14 @@ You can use your preferred method to view WMI. If you use PowerShell, run `gwmi
|
|||||||
<td align="left"><p>14</p></td>
|
<td align="left"><p>14</p></td>
|
||||||
<td align="left"><p>AutoUnlock unsafe unless the OS volume is encrypted.</p></td>
|
<td align="left"><p>AutoUnlock unsafe unless the OS volume is encrypted.</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
|
<tr class="even">
|
||||||
|
<td align="left"><p>15</p></td>
|
||||||
|
<td align="left"><p>Policy requires minimum cypher strength is XTS-AES-128 bit, actual cypher strength is weaker than that.</p></td>
|
||||||
|
</tr>
|
||||||
|
<tr class="odd">
|
||||||
|
<td align="left"><p>16</p></td>
|
||||||
|
<td align="left"><p>Policy requires minimum cypher strength is XTS-AES-256 bit, actual cypher strength is weaker than that.</p></td>
|
||||||
|
</tr>
|
||||||
</tbody>
|
</tbody>
|
||||||
</table>
|
</table>
|
||||||
|
|
||||||
|
@ -128,6 +128,20 @@ If different encryption strengths are used, MBAM will report the machine as **no
|
|||||||
As of HF02, the MBAM Self-Service Portal automatically adds the '-' on Key ID entry.
|
As of HF02, the MBAM Self-Service Portal automatically adds the '-' on Key ID entry.
|
||||||
**Note:** The Server has to be reconfigured for the Javascript to take effect.
|
**Note:** The Server has to be reconfigured for the Javascript to take effect.
|
||||||
|
|
||||||
|
### MBAM 2.5 Sp1 Reports does not work / render properly
|
||||||
|
Reports Page does not render properly when SSRS is hosted on SQL Server 2016 edition.
|
||||||
|
For example – Browsing to Helpdesk – Clicking on Reports – ( Highlighted portion have “x” on it )
|
||||||
|
Digging this further with Fiddler – it does look like once we click on Reports – it calls the SSRS page with HTML 4.0 rendering format.
|
||||||
|
|
||||||
|
**Workaround:** Looking at the site.master code and noticed the X-UA mode was dictated as IE8. As IE8 is WAY past the end of life, and customer is using IE11. Update the setting to the below code. This allows the site to utilize IE11 rendering technologies
|
||||||
|
|
||||||
|
<meta http-equiv="X-UA-Compatible" content="IE=Edge" />
|
||||||
|
|
||||||
|
Original setting is:
|
||||||
|
<meta http-equiv="X-UA-Compatible" content="IE=8" />
|
||||||
|
|
||||||
|
This is the reason why the issue was not seen with other browsers like Chrome, Firefox etc.
|
||||||
|
|
||||||
## Got a suggestion for MBAM?
|
## Got a suggestion for MBAM?
|
||||||
|
|
||||||
|
|
||||||
|
@ -14,20 +14,12 @@ ms.pagetype: security
|
|||||||
|
|
||||||
This topic for the IT professional explains how a Microsoft account works to enhance security and privacy for users, and how you can manage this consumer account type in your organization.
|
This topic for the IT professional explains how a Microsoft account works to enhance security and privacy for users, and how you can manage this consumer account type in your organization.
|
||||||
|
|
||||||
Microsoft sites, services, and properties such as Windows Live, MSN, Xbox LIVE, Zune, Windows Phone, and computers running Windows 10, Windows 8.1, Windows 8, and Windows RT use a Microsoft account as a mean of identifying users. Microsoft account is the name for what was previously called Windows Live ID. It has user-defined secrets associated with it, and it consists of a unique email address and a password.
|
Microsoft sites, services, and properties, as well as computers running Windows 10, can use a Microsoft account as a mean of identifying a user. Microsoft account was previously called Windows Live ID. It has user-defined secrets, and consists of a unique email address and a password.
|
||||||
|
|
||||||
There are some benefits and considerations when using Microsoft accounts in the enterprise. For more information, see [Microsoft account in the enterprise](#bkmk-msaccountintheenterprise) later in this topic.
|
When a user signs in with a Microsoft account, the device is connected to cloud services. Many of the user's settings, preferences, and apps can be shared across devices.
|
||||||
|
|
||||||
When a user signs in with a Microsoft account, their device is connected to cloud services, and many of the settings, preferences, and apps associated with that user account can roam between devices.
|
|
||||||
|
|
||||||
**Note**
|
|
||||||
This content applies to the operating system versions that are designated in the **Applies To** list at the beginning of this topic.
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## <a href="" id="bkmk-benefits"></a>How a Microsoft account works
|
## <a href="" id="bkmk-benefits"></a>How a Microsoft account works
|
||||||
|
|
||||||
|
|
||||||
The Microsoft account allows users to sign in to websites that support this service by using a single set of credentials. Users' credentials are validated by a Microsoft account authentication server that is associated with a website. The Windows Store is an example of this association. When new users sign in to websites that are enabled to use Microsoft accounts, they are redirected to the nearest authentication server, which asks for a user name and password. Windows uses the Schannel Security Support Provider to open a Transport Level Security/Secure Sockets Layer (TLS/SSL) connection for this function. Users then have the option to use Credential Manager to store their credentials.
|
The Microsoft account allows users to sign in to websites that support this service by using a single set of credentials. Users' credentials are validated by a Microsoft account authentication server that is associated with a website. The Windows Store is an example of this association. When new users sign in to websites that are enabled to use Microsoft accounts, they are redirected to the nearest authentication server, which asks for a user name and password. Windows uses the Schannel Security Support Provider to open a Transport Level Security/Secure Sockets Layer (TLS/SSL) connection for this function. Users then have the option to use Credential Manager to store their credentials.
|
||||||
|
|
||||||
When users sign in to websites that are enabled to use a Microsoft account, a time-limited cookie is installed on their computers, which includes a triple DES encrypted ID tag. This encrypted ID tag has been agreed upon between the authentication server and the website. This ID tag is sent to the website, and the website plants another time-limited encrypted HTTP cookie on the user’s computer. When these cookies are valid, users are not required to supply a user name and password. If a user actively signs out of their Microsoft account, these cookies are removed.
|
When users sign in to websites that are enabled to use a Microsoft account, a time-limited cookie is installed on their computers, which includes a triple DES encrypted ID tag. This encrypted ID tag has been agreed upon between the authentication server and the website. This ID tag is sent to the website, and the website plants another time-limited encrypted HTTP cookie on the user’s computer. When these cookies are valid, users are not required to supply a user name and password. If a user actively signs out of their Microsoft account, these cookies are removed.
|
||||||
@ -35,19 +27,17 @@ When users sign in to websites that are enabled to use a Microsoft account, a ti
|
|||||||
**Important**
|
**Important**
|
||||||
Local Windows account functionality has not been removed, and it is still an option to use in managed environments.
|
Local Windows account functionality has not been removed, and it is still an option to use in managed environments.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
### How Microsoft accounts are created
|
### How Microsoft accounts are created
|
||||||
|
|
||||||
To prevent fraud, the Microsoft system verifies the IP address when a user creates an account. If a user tries to create multiple Microsoft accounts with the same IP address, they are stopped.
|
To prevent fraud, the Microsoft system verifies the IP address when a user creates an account. A user who tries to create multiple Microsoft accounts with the same IP address is stopped.
|
||||||
|
|
||||||
Microsoft accounts are not designed to be created in batches, for example, for a group of domain users within your enterprise.
|
Microsoft accounts are not designed to be created in batches, such as for a group of domain users within your enterprise.
|
||||||
|
|
||||||
There are two methods for creating a Microsoft account:
|
There are two methods for creating a Microsoft account:
|
||||||
|
|
||||||
- **Use an existing email address**.
|
- **Use an existing email address**.
|
||||||
|
|
||||||
Users are able to use their valid email addresses to sign up for Microsoft accounts. The service turns the requesting user's email address into a Microsoft account. Users can also choose their personal password.
|
Users are able to use their valid email addresses to sign up for Microsoft accounts. The service turns the requesting user's email address into a Microsoft account. Users can also choose their personal passwords.
|
||||||
|
|
||||||
- **Sign up for a Microsoft email address**.
|
- **Sign up for a Microsoft email address**.
|
||||||
|
|
||||||
@ -118,13 +108,46 @@ Depending on your IT and business models, introducing Microsoft accounts into yo
|
|||||||
|
|
||||||
### <a href="" id="bkmk-restrictuse"></a>Restrict the use of the Microsoft account
|
### <a href="" id="bkmk-restrictuse"></a>Restrict the use of the Microsoft account
|
||||||
|
|
||||||
If employees are allowed to join the domain with their personal devices, they might expect to connect to enterprise resources by using their Microsoft accounts. If you want to prevent any use of Microsoft accounts within your enterprise, you can configure the local security policy setting [Accounts: Block Microsoft accounts](/windows/device-security/security-policy-settings/accounts-block-microsoft-accounts). However, this setting can prevent the users from signing in to their Windows devices with their Microsoft accounts (if they had set them up to do so) when they are joined to the domain.
|
The following Group Policy settings help control the use of Microsoft accounts in the enterprise:
|
||||||
|
|
||||||
The default for this setting is **Disabled**, which enables users to use their Microsoft accounts on devices that are joined to your domain. Other options in the setting can:
|
- [Block all consumer Microsoft account user authentication](#block-all-consumer-microsoft-account-user-authentication)
|
||||||
|
- [Accounts: Block Microsoft accounts](#accounts-block-microsoft-accounts)
|
||||||
|
|
||||||
1. Prevent users from creating new Microsoft accounts on a computer, switch a local account to a Microsoft account, or connect a domain account to a Microsoft account. This is the preferred option if you need to limit the use of Microsoft accounts in your enterprise.
|
#### Block all consumer Microsoft account user authentication
|
||||||
|
|
||||||
2. Prevent users with an existing Microsoft account from signing in to Windows. Selecting this option might make it impossible for an existing administrator to sign in to a computer and manage the system.
|
This setting controls whether users can provide Microsoft accounts for authentication for applications or services.
|
||||||
|
|
||||||
|
If this setting is enabled, all applications and services on the device are prevented from using Microsoft accounts for authentication.
|
||||||
|
This applies both to existing users of a device and new users who may be added.
|
||||||
|
|
||||||
|
However, any application or service that has already authenticated a user will not be affected by enabling this setting until the authentication cache expires.
|
||||||
|
It is recommended to enable this setting before any user signs in to a device to prevent cached tokens from being present.
|
||||||
|
|
||||||
|
If this setting is disabled or not configured, applications and services can use Microsoft accounts for authentication.
|
||||||
|
By default, this setting is **Disabled**.
|
||||||
|
|
||||||
|
This setting does not affect whether users can sign in to devices by using Microsoft accounts, or the ability for users to provide Microsoft accounts via the browser for authentication with web-based applications.
|
||||||
|
|
||||||
|
The path to this setting is:
|
||||||
|
|
||||||
|
Computer Configuration\Administrative Templates\Windows Components\Microsoft account
|
||||||
|
|
||||||
|
#### Accounts: Block Microsoft accounts
|
||||||
|
|
||||||
|
This setting prevents using the **Settings** app to add a Microsoft account for single sign-on (SSO) authentication for Microsoft services and some background services, or using a Microsoft account for single sign-on to other applications or services.
|
||||||
|
|
||||||
|
There are two options if this setting is enabled:
|
||||||
|
|
||||||
|
- **Users can’t add Microsoft accounts** means that existing connected accounts can still sign in to the device (and appear on the Sign in screen). However, users cannot use the **Settings** app to add new connected accounts (or connect local accounts to Microsoft accounts).
|
||||||
|
- **Users can’t add or log on with Microsoft accounts** means that users cannot add new connected accounts (or connect local accounts to Microsoft accounts) or use existing connected accounts through **Settings**.
|
||||||
|
|
||||||
|
This setting does not affect adding a Microsoft account for application authentication. For example, if this setting is enabled, a user can still provide a Microsoft account for authentication with an application such as **Mail**, but the user cannot use the Microsoft account for single sign-on authentication for other applications or services (in other words, the user will be prompted to authenticate for other applications or services).
|
||||||
|
|
||||||
|
By default, this setting is **Not defined**.
|
||||||
|
|
||||||
|
The path to this setting is:
|
||||||
|
|
||||||
|
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options
|
||||||
|
|
||||||
### <a href="" id="bkmk-cfgconnectedaccounts"></a>Configure connected accounts
|
### <a href="" id="bkmk-cfgconnectedaccounts"></a>Configure connected accounts
|
||||||
|
|
||||||
@ -135,8 +158,6 @@ Users can disconnect a Microsoft account from their domain account at any time a
|
|||||||
**Note**
|
**Note**
|
||||||
Connecting Microsoft accounts with domain accounts can limit access to some high-privileged tasks in Windows. For example, Task Scheduler will evaluate the connected Microsoft account for access and fail. In these situations, the account owner should disconnect the account.
|
Connecting Microsoft accounts with domain accounts can limit access to some high-privileged tasks in Windows. For example, Task Scheduler will evaluate the connected Microsoft account for access and fail. In these situations, the account owner should disconnect the account.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
### <a href="" id="bkmk-provisionaccounts"></a>Provision Microsoft accounts in the enterprise
|
### <a href="" id="bkmk-provisionaccounts"></a>Provision Microsoft accounts in the enterprise
|
||||||
|
|
||||||
Microsoft accounts are private user accounts. There are no methods provided by Microsoft to provision Microsoft accounts for an enterprise. Enterprises should use domain accounts.
|
Microsoft accounts are private user accounts. There are no methods provided by Microsoft to provision Microsoft accounts for an enterprise. Enterprises should use domain accounts.
|
||||||
|
@ -11,6 +11,11 @@ author: brianlic-msft
|
|||||||
# Change history for access protection
|
# Change history for access protection
|
||||||
This topic lists new and updated topics in the [Access protection](index.md) documentation.
|
This topic lists new and updated topics in the [Access protection](index.md) documentation.
|
||||||
|
|
||||||
|
## August 2017
|
||||||
|
|New or changed topic |Description |
|
||||||
|
|---------------------|------------|
|
||||||
|
|[Microsoft accounts](access-control/microsoft-accounts.md) |Revised to cover new Group Policy setting in Windows 10, version 1703, named **Block all consumer Microsoft account user authentication**.|
|
||||||
|
|
||||||
## March 2017
|
## March 2017
|
||||||
|New or changed topic |Description |
|
|New or changed topic |Description |
|
||||||
|---------------------|------------|
|
|---------------------|------------|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Scripts for Certificate Issuance Policies in Credential Guard (Windows 10)
|
title: Additional mitigations
|
||||||
description: Scripts listed in this topic for obtaining the available issuance policies on the certificate authority for Credential Guard on Windows 10.
|
description: Scripts listed in this topic for obtaining the available issuance policies on the certificate authority for Windows Defender Credential Guard on Windows 10.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: explore
|
ms.mktglfcycl: explore
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
@ -11,11 +11,11 @@ author: brianlic-msft
|
|||||||
|
|
||||||
## Additional mitigations
|
## Additional mitigations
|
||||||
|
|
||||||
Credential Guard can provide mitigations against attacks on derived credentials and prevent the use of stolen credentials elsewhere. However, PCs can still be vulnerable to certain attacks, even if the derived credentials are protected by Credential Guard. These attacks can include abusing privileges and use of derived credentials directly from a compromised device, reusing previously stolen credentials prior to Device Guard, and abuse of management tools and weak application configurations. Because of this, additional mitigations also must be deployed to make the domain environment more robust.
|
Windows Defender Credential Guard can provide mitigations against attacks on derived credentials and prevent the use of stolen credentials elsewhere. However, PCs can still be vulnerable to certain attacks, even if the derived credentials are protected by Windows Defender Credential Guard. These attacks can include abusing privileges and use of derived credentials directly from a compromised device, re-using previously stolen credentials prior to Windows Defender Device Guard, and abuse of management tools and weak application configurations. Because of this, additional mitigations also must be deployed to make the domain environment more robust.
|
||||||
|
|
||||||
### Restricting domain users to specific domain-joined devices
|
### Restricting domain users to specific domain-joined devices
|
||||||
|
|
||||||
Credential theft attacks allow the attacker to steal secrets from one device and use them from another device. If a user can sign on to multiple devices then any device could be used to steal credentials. How do you ensure that users only sign on using devices that have Credential Guard enabled? By deploying authentication policies that restrict them to specific domain-joined devices that have been configured with Credential Guard. For the domain controller to know what device a user is signing on from, Kerberos armoring must be used.
|
Credential theft attacks allow the attacker to steal secrets from one device and use them from another device. If a user can sign on to multiple devices then any device could be used to steal credentials. How do you ensure that users only sign on using devices that have Windows Defender Credential Guard enabled? By deploying authentication policies that restrict them to specific domain-joined devices that have been configured with Windows Defender Credential Guard. For the domain controller to know what device a user is signing on from, Kerberos armoring must be used.
|
||||||
|
|
||||||
#### Kerberos armoring
|
#### Kerberos armoring
|
||||||
|
|
||||||
@ -25,11 +25,11 @@ Kerberos armoring is part of RFC 6113. When a device supports Kerberos armoring,
|
|||||||
|
|
||||||
- Users need to be in domains that are running Windows Server 2012 R2 or higher
|
- Users need to be in domains that are running Windows Server 2012 R2 or higher
|
||||||
- All the domain controllers in these domains must be configured to support Kerberos armoring. Set the **KDC support for claims, compound authentication, and Kerberos armoring** Group Policy setting to either **Supported** or **Always provide claims**.
|
- All the domain controllers in these domains must be configured to support Kerberos armoring. Set the **KDC support for claims, compound authentication, and Kerberos armoring** Group Policy setting to either **Supported** or **Always provide claims**.
|
||||||
- All the devices with Credential Guard that the users will be restricted to must be configured to support Kerberos armoring. Enable the **Kerberos client support for claims, compound authentication and Kerberos armoring** Group Policy settings under **Computer Configuration** -> **Administrative Templates** -> **System** -> **Kerberos**.
|
- All the devices with Windows Defender Credential Guard that the users will be restricted to must be configured to support Kerberos armoring. Enable the **Kerberos client support for claims, compound authentication and Kerberos armoring** Group Policy settings under **Computer Configuration** -> **Administrative Templates** -> **System** -> **Kerberos**.
|
||||||
|
|
||||||
#### Protecting domain-joined device secrets
|
#### Protecting domain-joined device secrets
|
||||||
|
|
||||||
Since domain-joined devices also use shared secrets for authentication, attackers can steal those secrets as well. By deploying device certificates with Credential Guard, the private key can be protected. Then authentication policies can require that users sign on devices that authenticate using those certificates. This prevents shared secrets stolen from the device to be used with stolen user credentials to sign on as the user.
|
Since domain-joined devices also use shared secrets for authentication, attackers can steal those secrets as well. By deploying device certificates with Windows Defender Credential Guard, the private key can be protected. Then authentication policies can require that users sign on devices that authenticate using those certificates. This prevents shared secrets stolen from the device to be used with stolen user credentials to sign on as the user.
|
||||||
|
|
||||||
Domain-joined device certificate authentication has the following requirements:
|
Domain-joined device certificate authentication has the following requirements:
|
||||||
- Devices' accounts are in Windows Server 2012 domain functional level or higher.
|
- Devices' accounts are in Windows Server 2012 domain functional level or higher.
|
||||||
@ -59,7 +59,7 @@ For example, let's say you wanted to use the High Assurance policy only on these
|
|||||||
8. Under **Issuance Policies**, click**High Assurance**.
|
8. Under **Issuance Policies**, click**High Assurance**.
|
||||||
9. On the **Subject name** tab, clear the **DNS name** check box, and then select the **User Principal Name (UPN)** check box.
|
9. On the **Subject name** tab, clear the **DNS name** check box, and then select the **User Principal Name (UPN)** check box.
|
||||||
|
|
||||||
Then on the devices that are running Credential Guard, enroll the devices using the certificate you just created.
|
Then on the devices that are running Windows Defender Credential Guard, enroll the devices using the certificate you just created.
|
||||||
|
|
||||||
**Enrolling devices in a certificate**
|
**Enrolling devices in a certificate**
|
||||||
|
|
||||||
@ -126,7 +126,7 @@ Authentication policies have the following requirements:
|
|||||||
|
|
||||||
To make tracking authentication failures due to authentication policies easier, an operational log exists with just those events. To enable the logs on the domain controllers, in Event Viewer, navigate to **Applications and Services Logs\\Microsoft\\Windows\\Authentication, right-click AuthenticationPolicyFailures-DomainController**, and then click **Enable Log**.
|
To make tracking authentication failures due to authentication policies easier, an operational log exists with just those events. To enable the logs on the domain controllers, in Event Viewer, navigate to **Applications and Services Logs\\Microsoft\\Windows\\Authentication, right-click AuthenticationPolicyFailures-DomainController**, and then click **Enable Log**.
|
||||||
|
|
||||||
To learn more about authentication policy events, see [Authentication Policies and Authentication Policy Silos](https://technet.microsoft.com/en-us/library/dn486813(v=ws.11).aspx).
|
To learn more about authentication policy events, see [Authentication Policies and Authentication Policy Silos](https://technet.microsoft.com/library/dn486813(v=ws.11).aspx).
|
||||||
|
|
||||||
### Appendix: Scripts
|
### Appendix: Scripts
|
||||||
|
|
||||||
@ -607,6 +607,6 @@ write-host $tmp -Foreground Red
|
|||||||
|
|
||||||
## See also
|
## See also
|
||||||
|
|
||||||
**Deep Dive into Credential Guard: Related videos**
|
**Deep Dive into Windows Defender Credential Guard: Related videos**
|
||||||
|
|
||||||
[Protecting privileged users with Credential Guard](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=JNbjYMJyC_8104300474)
|
[Protecting privileged users with Windows Defender Credential Guard](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=JNbjYMJyC_8104300474)
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Considerations when using Credential Guard (Windows 10)
|
title: Considerations when using Windows Defender Credential Guard (Windows 10)
|
||||||
description: Considerations and recommendations for certain scenarios when using Credential Guard in Windows 10.
|
description: Considerations and recommendations for certain scenarios when using Windows Defender Credential Guard in Windows 10.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: explore
|
ms.mktglfcycl: explore
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
@ -9,35 +9,89 @@ ms.localizationpriority: high
|
|||||||
author: brianlic-msft
|
author: brianlic-msft
|
||||||
---
|
---
|
||||||
|
|
||||||
# Considerations when using Credential Guard
|
# Considerations when using Windows Defender Credential Guard
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows Server 2016
|
- Windows Server 2016
|
||||||
|
|
||||||
Prefer video? See [Credentials Protected by Credential Guard](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=mD3geLJyC_8304300474)
|
Prefer video? See [Credentials Protected by Windows Defender Credential Guard](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=mD3geLJyC_8304300474)
|
||||||
in the Deep Dive into Credential Guard video series.
|
in the **Deep Dive into Windows Defender Credential Guard** video series.
|
||||||
|
|
||||||
- Passwords are still weak so we recommend that your organization deploy Credential Guard and move away from passwords and to other authentication methods, such as physical smart cards, virtual smart cards, or Windows Hello for Business.
|
Passwords are still weak. We recommend that in addition to deploying Windows Defender Credential Guard, organizations move away from passwords to other authentication methods, such as physical smart cards, virtual smart cards, or Windows Hello for Business.
|
||||||
- Some 3rd party Security Support Providers (SSPs and APs) might not be compatible with Credential Guard. Credential Guard does not allow 3rd party SSPs to ask for password hashes from LSA. However, SSPs and APs still get notified of the password when a user logs on and/or changes their password. Any use of undocumented APIs within custom SSPs and APs are not supported. We recommend that custom implementations of SSPs/APs are tested against Credential Guard to ensure that the SSPs and APs do not depend on any undocumented or unsupported behaviors. For example, using the KerbQuerySupplementalCredentialsMessage API is not supported. You should not replace the NTLM or Kerberos SSPs with custom SSPs and APs. For more info, see [Restrictions around Registering and Installing a Security Package](http://msdn.microsoft.com/library/windows/desktop/dn865014.aspx) on MSDN.
|
|
||||||
- As the depth and breadth of protections provided by Credential Guard are increased, subsequent releases of Windows 10 with Credential Guard running may impact scenarios that were working in the past. For example, Credential Guard may block the use of a particular type of credential or a particular component to prevent malware from taking advantage of vulnerabilities. Therefore, we recommend that scenarios required for operations in an organization are tested before upgrading a device that has Credential Guard running.
|
Windows Defender Credential Guard uses hardware security, so some features such as Windows To Go, are not supported.
|
||||||
|
|
||||||
- Starting with Windows 10, version 1511, domain credentials that are stored with Credential Manager are protected with Credential Guard. Credential Manager allows you to store credentials, such as user names and passwords that you use to log on to websites or other computers on a network. The following considerations apply to the Credential Guard protections for Credential Manager:
|
|
||||||
- Credentials saved by Remote Desktop Services cannot be used to remotely connect to another machine without supplying the password. Attempts to use saved credentials will fail, displaying the error message "Logon attempt failed".
|
|
||||||
- Applications that extract derived domain credentials from Credential Manager will no longer be able to use those credentials.
|
|
||||||
- You cannot restore credentials using the Credential Manager control panel if the credentials were backed up from a PC that has Credential Guard turned on. If you need to back up your credentials, you must do this before you enable Credential Guard. Otherwise, you won't be able to restore those credentials.
|
|
||||||
- Credential Guard uses hardware security so some features, such as Windows To Go, are not supported.
|
|
||||||
|
|
||||||
## Wi-fi and VPN Considerations
|
## Wi-fi and VPN Considerations
|
||||||
When you enable Credential Guard, you can no longer use NTLM v1 authentication. If you are using WiFi and VPN endpoints that are based on MS-CHAPv2, they are subject to similar attacks as for NTLMv1. For WiFi and VPN connections, Microsoft recommends that organizations move from MSCHAPv2-based connections such as PEAP-MSCHAPv2 and EAP-MSCHAPv2, to certificate-based authentication such as PEAP-TLS or EAP-TLS.
|
When you enable Windows Defender Credential Guard, you can no longer use NTLM classic deployment model authentication. If you are using WiFi and VPN endpoints that are based on MS-CHAPv2, they are subject to similar attacks as for NTLMv1. For WiFi and VPN connections, Microsoft recommends that organizations move from MSCHAPv2-based connections such as PEAP-MSCHAPv2 and EAP-MSCHAPv2, to certificate-based authentication such as PEAP-TLS or EAP-TLS.
|
||||||
|
|
||||||
|
|
||||||
## Kerberos Considerations
|
## Kerberos Considerations
|
||||||
|
|
||||||
When you enable Credential Guard, you can no longer use Kerberos unconstrained delegation or DES encryption. Unconstrained delegation could allow attackers to extract Kerberos keys from the isolated LSA process. You must use constrained or resource-based Kerberos delegation instead.
|
When you enable Windows Defender Credential Guard, you can no longer use Kerberos unconstrained delegation or DES encryption. Unconstrained delegation could allow attackers to extract Kerberos keys from the isolated LSA process. Use constrained or resource-based Kerberos delegation instead.
|
||||||
|
|
||||||
|
## 3rd Party Security Support Providers Considerations
|
||||||
|
Some 3rd party Security Support Providers (SSPs and APs) might not be compatible with Windows Defender Credential Guard because it does not allow third-party SSPs to ask for password hashes from LSA. However, SSPs and APs still get notified of the password when a user logs on and/or changes their password. Any use of undocumented APIs within custom SSPs and APs are not supported. We recommend that custom implementations of SSPs/APs are tested with Windows Defender Credential Guard. SSPs and APs that depend on any undocumented or unsupported behaviors fail. For example, using the KerbQuerySupplementalCredentialsMessage API is not supported. Replacing the NTLM or Kerberos SSPs with custom SSPs and APs. For more info, see [Restrictions around Registering and Installing a Security Package](http://msdn.microsoft.com/library/windows/desktop/dn865014.aspx) on MSDN.
|
||||||
|
|
||||||
|
## Upgrade Considerations
|
||||||
|
As the depth and breadth of protections provided by Windows Defender Credential Guard are increased, subsequent releases of Windows 10 with Windows Defender Credential Guard running may impact scenarios that were working in the past. For example, Windows Defender Credential Guard may block the use of a particular type of credential or a particular component to prevent malware from taking advantage of vulnerabilities. Test scenarios required for operations in an organization before upgrading a device using Windows Defender Credential Guard.
|
||||||
|
|
||||||
|
### Saved Windows Credentials Protected
|
||||||
|
|
||||||
|
Starting with Windows 10, version 1511, domain credentials that are stored with Credential Manager are protected with Windows Defender Credential Guard. Credential Manager allows you to store three types of credentials: Windows credentials, certificate-based credentials, and generic credentials. Generic credentials such as user names and passwords that you use to log on to websites are not protected since the applications require your cleartext password. If the application does not need a copy of the password, they can save domain credentials as Windows credentials that are protected. Windows credentials are used to connect to other computers on a network. The following considerations apply to the Windows Defender Credential Guard protections for Credential Manager:
|
||||||
|
- Windows credentials saved by Remote Desktop Client cannot be sent to a remote host. Attempts to use saved Windows credentials fail, displaying the error message "Logon attempt failed."
|
||||||
|
- Applications that extract Windows credentials fail.
|
||||||
|
- When credentials are backed up from a PC that has Windows Defender Credential Guard enabled, the Windows credentials cannot be restored. If you need to back up your credentials, you must do this before you enable Windows Defender Credential Guard. Otherwise, you cannot restore those credentials.
|
||||||
|
|
||||||
|
## Clearing TPM Considerations
|
||||||
|
Virtualization-based Security (VBS) uses the TPM to protect its key. So when the TPM is cleared then the TPM protected key used to encrypt VBS secrets is lost.
|
||||||
|
|
||||||
|
>[!WARNING]
|
||||||
|
> Clearing the TPM results in loss of protected data for all features that use VBS to protect data. <br>
|
||||||
|
> When a TPM is cleared ALL features, which use VBS to protect data can no longer decrypt their protected data.
|
||||||
|
|
||||||
|
As a result Credential Guard can no longer decrypt protected data. VBS creates a new TPM protected key for Credential Guard. Credential Guard uses the new key to protect new data. However, the previously protected data is lost forever.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
> Credential Guard obtains the key during initialization. So the data loss will only impact persistent data and occur after the next system startup.
|
||||||
|
|
||||||
|
### Windows credentials saved to Credential Manager
|
||||||
|
Since Credential Manager cannot decrypt saved Windows Credentials, they are deleted. Applications should prompt for credentials that were previously saved. If saved again, then Windows credentials are protected Credential Guard.
|
||||||
|
|
||||||
|
### Domain-joined device’s automatically provisioned public key
|
||||||
|
Beginning with Windows 10 and Windows Server 2016, domain-devices automatically provision a bound public key, for more information about automatic public key provisioning, see [Domain-joined Device Public Key Authentication](https://docs.microsoft.com/windows-server/security/kerberos/domain-joined-device-public-key-authentication).
|
||||||
|
|
||||||
|
Since Credential Guard cannot decrypt the protected private key, Windows uses the domain-joined computer's password for authentication to the domain. Unless additional policies are deployed, there should not be a loss of functionality. If a device is configured to only use public key, then it cannot authenticate with password until that policy disabled. For more information on Configuring device to only use public key, see [Domain-joined Device Public Key Authentication](https://docs.microsoft.com/windows-server/security/kerberos/domain-joined-device-public-key-authentication).
|
||||||
|
|
||||||
|
Also if any access control checks including authentication policies require devices to have either the KEY TRUST IDENTITY (S-1-18-4) or FRESH PUBLIC KEY IDENTITY (S-1-18-3) well-known SIDs, then those access checks fail. For more information about authentication policies, see [Authentication Policies and Authentication Policy Silos](https://docs.microsoft.com/en-us/windows-server/security/credentials-protection-and-management/authentication-policies-and-authentication-policy-silos). For more information about well-known SIDs, see [[MS-DTYP] Section 2.4.2.4 Well-known SID Structures](https://msdn.microsoft.com/en-us/library/cc980032.aspx).
|
||||||
|
|
||||||
|
### Breaking DPAPI on domain-joined devices
|
||||||
|
On domain-joined devices, DPAPI can recover user keys using a domain controller from the user's domain. If a domain-joined device has no connectivity to a domain controller, then recovery is not possible.
|
||||||
|
|
||||||
|
>[!IMPORTANT]
|
||||||
|
> Best practice when clearing a TPM on a domain-joined device is to be on a network with connectivity to domain controllers. This ensures DPAPI functions and the user does not experience strange behavior. <br>
|
||||||
|
Auto VPN configuration is protected with user DPAPI. User may not be able to use VPN to connect to domain controllers since the VPN configurations are lost.
|
||||||
|
|
||||||
|
If you must clear the TPM on a domain-joined device without connectivity to domain controllers, then you should consider the following.
|
||||||
|
|
||||||
|
Domain user sign-in on a domain-joined device after clearing a TPM for as long as there is no connectivity to a domain controller:
|
||||||
|
|
||||||
|
|Credential Type | Windows 10 version | Behavior
|
||||||
|
|---|---|---|
|
||||||
|
| Certificate (smart card or Windows Hello for Business) | All | All data protected with user DPAPI is unusable and user DPAPI does not work at all. |
|
||||||
|
| Password | Windows 10 v1709 or later | If the user signed-in with a certificate or password prior to clearing the TPM, then they can sign-in with password and user DPAPI is unaffected.
|
||||||
|
| Password | Windows 10 v1703 | If the user signed-in with a password prior to clearing the TPM, then they can sign-in with that password and are unaffected.
|
||||||
|
| Password | Windows 10 v1607 or earlier | Existing user DPAPI protected data is unusable. User DPAPI is able to protect new data.
|
||||||
|
|
||||||
|
Once the device has connectivity to the domain controllers, DPAPI recovers the user's key and data protected prior to clearing the TPM can be decrypted.
|
||||||
|
|
||||||
|
#### Impact of DPAPI failures on Windows Information Protection
|
||||||
|
When data protected with user DPAPI is unusable, then the user loses access to all work data protected by Windows Information Protection. The impact includes: Outlook 2016 is unable to start and work protected documents cannot be opened. If DPAPI is working, then newly created work data is protected and can be accessed.
|
||||||
|
|
||||||
|
**Workaround:** Users can resolve the problem by connecting their device to the domain and rebooting or using their Encrypting File System Data Recovery Agent certificate. For more information about Encrypting File System Data Recovery Agent certificate, see [Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate](https://docs.microsoft.com/en-us/windows/threat-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate).
|
||||||
|
|
||||||
|
|
||||||
## See also
|
## See also
|
||||||
|
|
||||||
**Deep Dive into Credential Guard: Related videos**
|
**Deep Dive into Windows Defender Credential Guard: Related videos**
|
||||||
|
|
||||||
[Virtualization-based security](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=1CoELLJyC_6704300474)
|
[Virtualization-based security](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=1CoELLJyC_6704300474)
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: How Credential Guard works
|
title: How Windows Defender Credential Guard works
|
||||||
description: Using virtualization-based security, Credential Guard features a new component called the isolated LSA process, which stores and protects secrets, isolating them from the rest of the operating system, so that only privileged system software can access them.
|
description: Using virtualization-based security, Windows Defender Credential Guard features a new component called the isolated LSA process, which stores and protects secrets, isolating them from the rest of the operating system, so that only privileged system software can access them.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: explore
|
ms.mktglfcycl: explore
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
@ -9,36 +9,35 @@ ms.localizationpriority: high
|
|||||||
author: brianlic-msft
|
author: brianlic-msft
|
||||||
---
|
---
|
||||||
|
|
||||||
# How Credential Guard works
|
# How Windows Defender Credential Guard works
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows Server 2016
|
- Windows Server 2016
|
||||||
|
|
||||||
|
|
||||||
Prefer video? See [Credential Guard Design](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=mD3geLJyC_8304300474) in the Deep Dive into Credential Guard video series.
|
Prefer video? See [Windows Defender Credential Guard Design](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=mD3geLJyC_8304300474) in the **Deep Dive into Windows Defender Credential Guard** video series.
|
||||||
|
|
||||||
|
Kerberos, NTLM, and Credential manager isolate secrets by using virtualization-based security. Previous versions of Windows stored secrets in the Local Security Authority (LSA). Prior to Windows 10, the LSA stored secrets used by the operating system in its process memory. With Windows Defender Credential Guard enabled, the LSA process in the operating system talks to a new component called the isolated LSA process that stores and protects those secrets. Data stored by the isolated LSA process is protected using virtualization-based security and is not accessible to the rest of the operating system. LSA uses remote procedure calls to communicate with the isolated LSA process.
|
||||||
Kerberos, NTLM, and Credential manager isolate secrets by using virtualization-based security. Previous versions of Windows stored secrets in the Local Security Authority (LSA). Prior to Windows 10, the LSA stored secrets used by the operating system in its process memory. With Credential Guard enabled, the LSA process in the operating system talks to a new component called the isolated LSA process that stores and protects those secrets. Data stored by the isolated LSA process is protected using virtualization-based security and is not accessible to the rest of the operating system. LSA uses remote procedure calls to communicate with the isolated LSA process.
|
|
||||||
|
|
||||||
For security reasons, the isolated LSA process doesn't host any device drivers. Instead, it only hosts a small subset of operating system binaries that are needed for security and nothing else. All of these binaries are signed with a certificate that is trusted by virtualization-based security and these signatures are validated before launching the file in the protected environment.
|
For security reasons, the isolated LSA process doesn't host any device drivers. Instead, it only hosts a small subset of operating system binaries that are needed for security and nothing else. All of these binaries are signed with a certificate that is trusted by virtualization-based security and these signatures are validated before launching the file in the protected environment.
|
||||||
|
|
||||||
When Credential Guard is enabled, NTLMv1, MS-CHAPv2, Digest, and CredSSP cannot use the signed-in credentials. Thus, single sign-on does not work with these protocols. However, applications can prompt for credentials or use credentials stored in the Windows Vault which are not protected by Credential Guard with any of these protocols. It is strongly recommended that valuable credentials, such as the sign-in credentials, not be used with any of these protocols. If these protocols must be used by domain or Azure AD users, secondary credentials should be provisioned for these use cases.
|
When Windows Defender Credential Guard is enabled, NTLMv1, MS-CHAPv2, Digest, and CredSSP cannot use the signed-in credentials. Thus, single sign-on does not work with these protocols. However, applications can prompt for credentials or use credentials stored in the Windows Vault which are not protected by Windows Defender Credential Guard with any of these protocols. It is strongly recommended that valuable credentials, such as the sign-in credentials, not be used with any of these protocols. If these protocols must be used by domain or Azure AD users, secondary credentials should be provisioned for these use cases.
|
||||||
|
|
||||||
When Credential Guard is enabled, Kerberos does not allow unconstrained Kerberos delegation or DES encryption, not only for signed-in credentials, but also prompted or saved credentials.
|
When Windows Defender Credential Guard is enabled, Kerberos does not allow unconstrained Kerberos delegation or DES encryption, not only for signed-in credentials, but also prompted or saved credentials.
|
||||||
|
|
||||||
Here's a high-level overview on how the LSA is isolated by using virtualization-based security:
|
Here's a high-level overview on how the LSA is isolated by using virtualization-based security:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
<br>
|
<br>
|
||||||
|
|
||||||
## See also
|
## See also
|
||||||
|
|
||||||
**Deep Dive into Credential Guard: Related videos**
|
**Deep Dive into Windows Defender Credential Guard: Related videos**
|
||||||
|
|
||||||
[Credential Theft and Lateral Traversal](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=cfGBPlIyC_9404300474)
|
[Credential Theft and Lateral Traversal](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=cfGBPlIyC_9404300474)
|
||||||
|
|
||||||
[Virtualization-based security](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=1CoELLJyC_6704300474)
|
[Virtualization-based security](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=1CoELLJyC_6704300474)
|
||||||
|
|
||||||
[Credentials protected by Credential Guard](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=pdc37LJyC_1204300474)
|
[Credentials protected by Windows Defender Credential Guard](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=pdc37LJyC_1204300474)
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Credential Guard Known issues (Windows 10)
|
title: Windows Defender Credential Guard - Known issues (Windows 10)
|
||||||
description: Credential Guard - Known issues in Windows 10 Enterprise
|
description: Windows Defender Credential Guard - Known issues in Windows 10 Enterprise
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: explore
|
ms.mktglfcycl: explore
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
@ -9,22 +9,22 @@ ms.localizationpriority: high
|
|||||||
author: brianlic-msft
|
author: brianlic-msft
|
||||||
---
|
---
|
||||||
|
|
||||||
# Credential Guard: Known issues
|
# Windows Defender Credential Guard: Known issues
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows Server 2016
|
- Windows Server 2016
|
||||||
|
|
||||||
Credential Guard has certain application requirements. Credential Guard blocks specific authentication capabilities. Therefore applications that require such capabilities will not function when Credential Guard is enabled. For further information, see [Application requirements](https://docs.microsoft.com/windows/access-protection/credential-guard/credential-guard-requirements#application-requirements).
|
Windows Defender Credential Guard has certain application requirements. Windows Defender Credential Guard blocks specific authentication capabilities. Therefore applications that require such capabilities will not function when it is enabled. For further information, see [Application requirements](https://docs.microsoft.com/windows/access-protection/credential-guard/credential-guard-requirements#application-requirements).
|
||||||
|
|
||||||
The following known issues have been fixed by servicing releases made available in the Cumulative Security Updates for April 2017:
|
The following known issues have been fixed by servicing releases made available in the Cumulative Security Updates for April 2017:
|
||||||
|
|
||||||
- [KB4015217 Credential Guard generates double bad password count on Active Directory domain-joined Windows 10 machines](https://support.microsoft.com/help/4015217/windows-10-update-kb4015217)
|
- [KB4015217 Windows Defender Credential Guard generates double bad password count on Active Directory domain-joined Windows 10 machines](https://support.microsoft.com/help/4015217/windows-10-update-kb4015217)
|
||||||
|
|
||||||
This issue can potentially lead to unexpected account lockouts. See also Microsoft® Knowledge Base articles [KB4015219](https://support.microsoft.com/help/4015219/windows-10-update-kb4015219) and [KB4015221](https://support.microsoft.com/help/4015221/windows-10-update-kb4015221)
|
This issue can potentially lead to unexpected account lockouts. See also Microsoft® Knowledge Base articles [KB4015219](https://support.microsoft.com/help/4015219/windows-10-update-kb4015219) and [KB4015221](https://support.microsoft.com/help/4015221/windows-10-update-kb4015221)
|
||||||
|
|
||||||
|
|
||||||
- [KB4033236 Two incorrect logon attempts sent to Active Directory after Credential Guard installed on Windows 10](https://support.microsoft.com/help/4033236/two-incorrect-logon-attempts-sent-to-active-directory-after-credential?preview)
|
- [KB4033236 Two incorrect logon attempts sent to Active Directory after Windows Defender Credential Guard installed on Windows 10](https://support.microsoft.com/help/4033236/two-incorrect-logon-attempts-sent-to-active-directory-after-credential?preview)
|
||||||
|
|
||||||
This issue can potentially lead to unexpected account lockouts. The issue was fixed in servicing updates for each of the following operating systems:
|
This issue can potentially lead to unexpected account lockouts. The issue was fixed in servicing updates for each of the following operating systems:
|
||||||
|
|
||||||
@ -33,45 +33,32 @@ The following known issues have been fixed by servicing releases made available
|
|||||||
- Windows 10 Version 1511: [KB4015219 (OS Build 10586.873)](https://support.microsoft.com/help/4015219)
|
- Windows 10 Version 1511: [KB4015219 (OS Build 10586.873)](https://support.microsoft.com/help/4015219)
|
||||||
- Windows 10 Version 1507: [KB4015221 (OS Build 10240.17354)](https://support.microsoft.com/help/4015221)
|
- Windows 10 Version 1507: [KB4015221 (OS Build 10240.17354)](https://support.microsoft.com/help/4015221)
|
||||||
|
|
||||||
|
## Known issues involving third-party applications
|
||||||
|
|
||||||
|
The following issue affects the Java GSS API. See the following Oracle bug database article:
|
||||||
|
|
||||||
|
- [JDK-8161921: Windows 10 Windows Defender Credential Guard does not allow sharing of TGT with Java](http://bugs.java.com/bugdatabase/view_bug.do?bug_id=8161921)
|
||||||
|
|
||||||
|
When Windows Defender Credential Guard is enabled on Windows 10, the Java GSS API will not authenticate. This is expected behavior because Windows Defender Credential Guard blocks specific application authentication capabilities and will not provide the TGT session key to applications regardless of registry key settings. For further information see [Application requirements](https://docs.microsoft.com/windows/access-protection/credential-guard/credential-guard-requirements#application-requirements).
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
The following issue affects Cisco AnyConnect Secure Mobility Client:
|
The following issue affects Cisco AnyConnect Secure Mobility Client:
|
||||||
|
|
||||||
- [Blue screen on Windows 10 computers running Device Guard and Credential Guard with Cisco Anyconnect 4.3.04027](https://quickview.cloudapps.cisco.com/quickview/bug/CSCvc66692) \*
|
- [Blue screen on Windows 10 computers running Windows Defender Device Guard and Windows Defender Credential Guard with Cisco Anyconnect 4.3.04027](https://quickview.cloudapps.cisco.com/quickview/bug/CSCvc66692) \*
|
||||||
|
|
||||||
*Registration required to access this article.
|
*Registration required to access this article.
|
||||||
|
|
||||||
The following issue affects McAfee Application and Change Control (MACC):
|
The following issue affects McAfee Application and Change Control (MACC):
|
||||||
- [KB88869 Windows 10 machines exhibit high CPU sage with McAfee Application and Change Control (MACC) installed when Credential Guard is enabled](https://kc.mcafee.com/corporate/index?page=content&id=KB88869) <sup>[1]</sup>
|
- [KB88869 Windows 10 machines exhibit high CPU usage with McAfee Application and Change Control (MACC) installed when Windows Defender Credential Guard is enabled](https://kc.mcafee.com/corporate/index?page=content&id=KB88869) <sup>[1]</sup>
|
||||||
|
|
||||||
|
|
||||||
The following issue affects AppSense Environment Manager.
|
The following issue affects AppSense Environment Manager.
|
||||||
For further information, see the following Knowledge Base article:
|
For further information, see the following Knowledge Base article:
|
||||||
- [Installing AppSense Environment Manager on Windows 10 machines causes LSAISO.exe to exhibit high CPU usage when Credential Guard is enabled](http://www.appsense.com/kb/160525073917945) <sup>[1]</sup> \**
|
- [Installing AppSense Environment Manager on Windows 10 machines causes LSAISO.exe to exhibit high CPU usage when Windows Defender Credential Guard is enabled](http://www.appsense.com/kb/160525073917945) <sup>[1]</sup> \**
|
||||||
|
|
||||||
The following issue affects Citrix applications:
|
The following issue affects Citrix applications:
|
||||||
- Windows 10 machines exhibit high CPU usage with Citrix applications installed when Credential Guard is enabled. <sup>[1]</sup>
|
- Windows 10 machines exhibit high CPU usage with Citrix applications installed when Windows Defender Credential Guard is enabled. <sup>[1]</sup>
|
||||||
|
|
||||||
<sup>[1]</sup> Products that connect to Virtualization Based Security (VBS) protected processes can cause Credential Guard-enabled Windows 10 or Windows Server 2016 machines to exhibit high CPU usage. For technical and troubleshooting information, see the following Microsoft Knowledge Base article:
|
<sup>[1]</sup> Products that connect to Virtualization Based Security (VBS) protected processes can cause Windows Defender Credential Guard-enabled Windows 10 or Windows Server 2016 machines to exhibit high CPU usage. For technical and troubleshooting information, see the following Microsoft Knowledge Base article:
|
||||||
|
|
||||||
- [KB4032786 High CPU usage in the LSAISO process on Windows 10 or Windows Server 2016](https://support.microsoft.com/help/4032786)
|
- [KB4032786 High CPU usage in the LSAISO process on Windows 10 or Windows Server 2016](https://support.microsoft.com/help/4032786)
|
||||||
|
|
||||||
@ -86,23 +73,23 @@ For further technical information on LSAISO.exe, see the MSDN article: [Isolated
|
|||||||
See the following article on Citrix support for Secure Boot:
|
See the following article on Citrix support for Secure Boot:
|
||||||
- [Citrix Support for Secure Boot](https://www.citrix.com/blogs/2016/12/08/windows-server-2016-hyper-v-secure-boot-support-now-available-in-xenapp-7-12/)
|
- [Citrix Support for Secure Boot](https://www.citrix.com/blogs/2016/12/08/windows-server-2016-hyper-v-secure-boot-support-now-available-in-xenapp-7-12/)
|
||||||
|
|
||||||
Credential Guard is not supported by either these products, products versions, computer systems, or Windows 10 versions:
|
Windows Defender Credential Guard is not supported by either these products, products versions, computer systems, or Windows 10 versions:
|
||||||
|
|
||||||
- For Credential Guard on Windows 10 with McAfee Encryption products, see:
|
- For Windows Defender Credential Guard on Windows 10 with McAfee Encryption products, see:
|
||||||
[Support for Device Guard and Credential Guard on Windows 10 with McAfee encryption products](https://kc.mcafee.com/corporate/index?page=content&id=KB86009)
|
[Support for Windows Defender Device Guard and Windows Defender Credential Guard on Windows 10 with McAfee encryption products](https://kc.mcafee.com/corporate/index?page=content&id=KB86009)
|
||||||
|
|
||||||
- For Credential Guard on Windows 10 with Check Point Endpoint Security Client, see:
|
- For Windows Defender Credential Guard on Windows 10 with Check Point Endpoint Security Client, see:
|
||||||
[Check Point Endpoint Security Client support for Microsoft Windows 10 Credential Guard and Device Guard features](https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk113912)
|
[Check Point Endpoint Security Client support for Microsoft Windows 10 Windows Defender Credential Guard and Windows Defender Device Guard features](https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk113912)
|
||||||
|
|
||||||
- For Credential Guard on Windows 10 with VMWare Workstation
|
- For Windows Defender Credential Guard on Windows 10 with VMWare Workstation
|
||||||
[Windows 10 host fails when running VMWare Workstation when Credential Guard is enabled](https://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2146361)
|
[Windows 10 host fails when running VMWare Workstation when Windows Defender Credential Guard is enabled](https://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2146361)
|
||||||
|
|
||||||
- For Credential Guard on Windows 10 with specific versions of the Lenovo ThinkPad
|
- For Windows Defender Credential Guard on Windows 10 with specific versions of the Lenovo ThinkPad
|
||||||
[ThinkPad support for Device Guard and Credential Guard in Microsoft Windows 10 – ThinkPad](https://support.lenovo.com/in/en/solutions/ht503039)
|
[ThinkPad support for Windows Defender Device Guard and Windows Defender Credential Guard in Microsoft Windows 10 – ThinkPad](https://support.lenovo.com/in/en/solutions/ht503039)
|
||||||
|
|
||||||
- For Credential Guard on Windows 10 with Symantec Endpoint Protection
|
- For Windows Defender Credential Guard on Windows 10 with Symantec Endpoint Protection
|
||||||
[Windows 10 with Credential Guard and Symantec Endpoint Protection 12.1](https://www.symantec.com/connect/forums/windows-10-device-guard-credentials-guard-and-sep-121)
|
[Windows 10 with Windows Defender Credential Guard and Symantec Endpoint Protection 12.1](https://www.symantec.com/connect/forums/windows-10-device-guard-credentials-guard-and-sep-121)
|
||||||
|
|
||||||
This is not a comprehensive list. Check whether your product vendor, product version, or computer system, supports Credential guard on systems that run Windows 10 or specific versions of Windows 10. Specific computer system models may be incompatible with Credential Guard.
|
This is not a comprehensive list. Check whether your product vendor, product version, or computer system, supports Windows Defender Credential Guard on systems that run Windows 10 or specific versions of Windows 10. Specific computer system models may be incompatible with Windows Defender Credential Guard.
|
||||||
|
|
||||||
Microsoft encourages third-party vendors to contribute to this page by providing relevant product support information and by adding links to their own product support statements.
|
Microsoft encourages third-party vendors to contribute to this page by providing relevant product support information and by adding links to their own product support statements.
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Manage Credential Guard (Windows 10)
|
title: Manage Windows Defender Credential Guard (Windows 10)
|
||||||
description: Deploying and managing Credential Guard using Group Policy, the registry, or the Device Guard and Credential Guard hardware readiness tool.
|
description: Deploying and managing Windows Defender Credential Guard using Group Policy, the registry, or the Windows Defender Device Guard and Windows Defender Credential Guard hardware readiness tool.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: explore
|
ms.mktglfcycl: explore
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
@ -9,38 +9,38 @@ ms.localizationpriority: high
|
|||||||
author: brianlic-msft
|
author: brianlic-msft
|
||||||
---
|
---
|
||||||
|
|
||||||
# Manage Credential Guard
|
# Manage Windows Defender Credential Guard
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows Server 2016
|
- Windows Server 2016
|
||||||
|
|
||||||
Prefer video? See [Credential Guard Deployment](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=sRcyvLJyC_3304300474) in the Deep Dive into Credential Guard video series.
|
Prefer video? See [Windows Defender Credential Guard Deployment](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=sRcyvLJyC_3304300474) in the Deep Dive into Windows Defender Credential Guard video series.
|
||||||
|
|
||||||
## Enable Credential Guard
|
## Enable Windows Defender Credential Guard
|
||||||
Credential Guard can be enabled either by using [Group Policy](#enable-credential-guard-by-using-group-policy), the [registry](#enable-credential-guard-by-using-the-registry), or the Device Guard and Credential Guard [hardware readiness tool](#hardware-readiness-tool). Credential Guard can also protect secrets in a Hyper-V virtual machine, just as it would on a physical machine.
|
Windows Defender Credential Guard can be enabled either by using [Group Policy](#enable-credential-guard-by-using-group-policy), the [registry](#enable-credential-guard-by-using-the-registry), or the Windows Defender Device Guard and Windows Defender Credential Guard [hardware readiness tool](#hardware-readiness-tool). Windows Defender Credential Guard can also protect secrets in a Hyper-V virtual machine, just as it would on a physical machine.
|
||||||
The same set of procedures used to enable Credential Guard on physical machines applies also to virtual machines.
|
The same set of procedures used to enable Windows Defender Credential Guard on physical machines applies also to virtual machines.
|
||||||
|
|
||||||
|
|
||||||
### Enable Credential Guard by using Group Policy
|
### Enable Windows Defender Credential Guard by using Group Policy
|
||||||
|
|
||||||
You can use Group Policy to enable Credential Guard. This will add and enable the virtualization-based security features for you if needed.
|
You can use Group Policy to enable Windows Defender Credential Guard. This will add and enable the virtualization-based security features for you if needed.
|
||||||
|
|
||||||
1. From the Group Policy Management Console, go to **Computer Configuration** -> **Administrative Templates** -> **System** -> **Device Guard**.
|
1. From the Group Policy Management Console, go to **Computer Configuration** -> **Administrative Templates** -> **System** -> **Windows Defender Device Guard**.
|
||||||
2. Double-click **Turn On Virtualization Based Security**, and then click the **Enabled** option.
|
2. Double-click **Turn On Virtualization Based Security**, and then click the **Enabled** option.
|
||||||
3. **Select Platform Security Level** box, choose **Secure Boot** or **Secure Boot and DMA Protection**.
|
3. **Select Platform Security Level** box, choose **Secure Boot** or **Secure Boot and DMA Protection**.
|
||||||
4. In the **Credential Guard Configuration** box, click **Enabled with UEFI lock**, and then click **OK**. If you want to be able to turn off Credential Guard remotely, choose **Enabled without lock**.
|
4. In the **Windows Defender Credential Guard Configuration** box, click **Enabled with UEFI lock**, and then click **OK**. If you want to be able to turn off Windows Defender Credential Guard remotely, choose **Enabled without lock**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
5. Close the Group Policy Management Console.
|
5. Close the Group Policy Management Console.
|
||||||
|
|
||||||
To enforce processing of the group policy, you can run ```gpupdate /force```.
|
To enforce processing of the group policy, you can run ```gpupdate /force```.
|
||||||
|
|
||||||
|
|
||||||
### Enable Credential Guard by using the registry
|
### Enable Windows Defender Credential Guard by using the registry
|
||||||
|
|
||||||
If you don't use Group Policy, you can enable Credential Guard by using the registry. Credential Guard uses virtualization-based security features which have to be enabled first on some operating systems.
|
If you don't use Group Policy, you can enable Windows Defender Credential Guard by using the registry. Windows Defender Credential Guard uses virtualization-based security features which have to be enabled first on some operating systems.
|
||||||
|
|
||||||
#### Add the virtualization-based security features
|
#### Add the virtualization-based security features
|
||||||
|
|
||||||
@ -49,7 +49,7 @@ Starting with Windows 10, version 1607 and Windows Server 2016, enabling Windows
|
|||||||
If you are using Windows 10, version 1507 (RTM) or Windows 10, version 1511, Windows features have to be enabled to use virtualization-based security.
|
If you are using Windows 10, version 1507 (RTM) or Windows 10, version 1511, Windows features have to be enabled to use virtualization-based security.
|
||||||
You can do this by using either the Control Panel or the Deployment Image Servicing and Management tool (DISM).
|
You can do this by using either the Control Panel or the Deployment Image Servicing and Management tool (DISM).
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
If you enable Credential Guard by using Group Policy, the steps to enable Windows features through Control Panel or DISM are not required. Group Policy will install Windows features for you.
|
If you enable Windows Defender Credential Guard by using Group Policy, the steps to enable Windows features through Control Panel or DISM are not required. Group Policy will install Windows features for you.
|
||||||
|
|
||||||
|
|
||||||
**Add the virtualization-based security features by using Programs and Features**
|
**Add the virtualization-based security features by using Programs and Features**
|
||||||
@ -75,55 +75,46 @@ If you enable Credential Guard by using Group Policy, the steps to enable Window
|
|||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> You can also add these features to an online image by using either DISM or Configuration Manager.
|
> You can also add these features to an online image by using either DISM or Configuration Manager.
|
||||||
|
|
||||||
#### Enable virtualization-based security and Credential Guard
|
#### Enable virtualization-based security and Windows Defender Credential Guard
|
||||||
|
|
||||||
1. Open Registry Editor.
|
1. Open Registry Editor.
|
||||||
2. Enable virtualization-based security:
|
2. Enable virtualization-based security:
|
||||||
- Go to HKEY\_LOCAL\_MACHINE\\System\\CurrentControlSet\\Control\\DeviceGuard.
|
- Go to HKEY\_LOCAL\_MACHINE\\System\\CurrentControlSet\\Control\\DeviceGuard.
|
||||||
- Add a new DWORD value named **EnableVirtualizationBasedSecurity**. Set the value of this registry setting to 1 to enable virtualization-based security and set it to 0 to disable it.
|
- Add a new DWORD value named **EnableVirtualizationBasedSecurity**. Set the value of this registry setting to 1 to enable virtualization-based security and set it to 0 to disable it.
|
||||||
- Add a new DWORD value named **RequirePlatformSecurityFeatures**. Set the value of this registry setting to 1 to use **Secure Boot** only or set it to 3 to use **Secure Boot and DMA protection**.
|
- Add a new DWORD value named **RequirePlatformSecurityFeatures**. Set the value of this registry setting to 1 to use **Secure Boot** only or set it to 3 to use **Secure Boot and DMA protection**.
|
||||||
3. Enable Credential Guard:
|
3. Enable Windows Defender Credential Guard:
|
||||||
- Go to HKEY\_LOCAL\_MACHINE\\System\\CurrentControlSet\\Control\\LSA.
|
- Go to HKEY\_LOCAL\_MACHINE\\System\\CurrentControlSet\\Control\\LSA.
|
||||||
- Add a new DWORD value named **LsaCfgFlags**. Set the value of this registry setting to 1 to enable Credential Guard with UEFI lock, set it to 2 to enable Credential Guard without lock, and set it to 0 to disable it.
|
- Add a new DWORD value named **LsaCfgFlags**. Set the value of this registry setting to 1 to enable Windows Defender Credential Guard with UEFI lock, set it to 2 to enable Windows Defender Credential Guard without lock, and set it to 0 to disable it.
|
||||||
4. Close Registry Editor.
|
4. Close Registry Editor.
|
||||||
|
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> You can also enable Credential Guard by setting the registry entries in the [FirstLogonCommands](http://msdn.microsoft.com/library/windows/hardware/dn922797.aspx) unattend setting.
|
> You can also enable Windows Defender Credential Guard by setting the registry entries in the [FirstLogonCommands](http://msdn.microsoft.com/library/windows/hardware/dn922797.aspx) unattend setting.
|
||||||
|
|
||||||
<span id="hardware-readiness-tool" />
|
<span id="hardware-readiness-tool" />
|
||||||
### Enable Credential Guard by using the Device Guard and Credential Guard hardware readiness tool
|
### Enable Windows Defender Credential Guard by using the Windows Defender Device Guard and Windows Defender Credential Guard hardware readiness tool
|
||||||
|
|
||||||
You can also enable Credential Guard by using the [Device Guard and Credential Guard hardware readiness tool](https://www.microsoft.com/download/details.aspx?id=53337).
|
You can also enable Windows Defender Credential Guard by using the [Windows Defender Device Guard and Windows Defender Credential Guard hardware readiness tool](https://www.microsoft.com/download/details.aspx?id=53337).
|
||||||
|
|
||||||
```
|
```
|
||||||
DG_Readiness_Tool_v3.2.ps1 -Enable -AutoReboot
|
DG_Readiness_Tool_v3.2.ps1 -Enable -AutoReboot
|
||||||
```
|
```
|
||||||
|
|
||||||
### Credential Guard deployment in virtual machines
|
### Review Windows Defender Credential Guard performance
|
||||||
|
|
||||||
Credential Guard can protect secrets in a Hyper-V virtual machine, just as it would on a physical machine. When Credential Guard is deployed on a VM, secrets are protected from attacks inside the VM. Credential Guard does not provide additional protection from privileged system attacks originating from the host.
|
**Is Windows Defender Credential Guard running?**
|
||||||
|
|
||||||
#### Requirements for running Credential Guard in Hyper-V virtual machines
|
You can view System Information to check that Windows Defender Credential Guard is running on a PC.
|
||||||
|
|
||||||
- The Hyper-V host must have an IOMMU, and run at least Windows Server 2016 or Windows 10 version 1607.
|
|
||||||
- The Hyper-V virtual machine must be Generation 2, have an enabled virtual TPM, and running at least Windows Server 2016 or Windows 10.
|
|
||||||
|
|
||||||
### Review Credential Guard performance
|
|
||||||
|
|
||||||
**Is Credential Guard running?**
|
|
||||||
|
|
||||||
You can view System Information to check that Credential Guard is running on a PC.
|
|
||||||
|
|
||||||
1. Click **Start**, type **msinfo32.exe**, and then click **System Information**.
|
1. Click **Start**, type **msinfo32.exe**, and then click **System Information**.
|
||||||
2. Click **System Summary**.
|
2. Click **System Summary**.
|
||||||
3. Confirm that **Credential Guard** is shown next to **Device Guard Security Services Running**.
|
3. Confirm that **Windows Defender Credential Guard** is shown next to **Windows Defender Device Guard Security Services Running**.
|
||||||
|
|
||||||
Here's an example:
|
Here's an example:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
You can also check that Credential Guard is running by using the [Device Guard and Credential Guard hardware readiness tool](https://www.microsoft.com/download/details.aspx?id=53337).
|
You can also check that Windows Defender Credential Guard is running by using the [Windows Defender Device Guard and Windows Defender Credential Guard hardware readiness tool](https://www.microsoft.com/download/details.aspx?id=53337).
|
||||||
|
|
||||||
```
|
```
|
||||||
DG_Readiness_Tool_v3.2.ps1 -Ready
|
DG_Readiness_Tool_v3.2.ps1 -Ready
|
||||||
@ -133,24 +124,24 @@ DG_Readiness_Tool_v3.2.ps1 -Ready
|
|||||||
|
|
||||||
For client machines that are running Windows 10 1703, LSAIso is running whenever Virtualization based security is enabled for other features.
|
For client machines that are running Windows 10 1703, LSAIso is running whenever Virtualization based security is enabled for other features.
|
||||||
|
|
||||||
- If Credential Guard is enabled on a device after it's joined to a domain, the user and device secrets may already be compromised. We recommend that Credential Guard should be enabled before the PC is joined to a domain.
|
- If Windows Defender Credential Guard is enabled on a device after it's joined to a domain, the user and device secrets may already be compromised. We recommend that Windows Defender Credential Guard should be enabled before the PC is joined to a domain.
|
||||||
|
|
||||||
- You should perform regular reviews of the PCs that have Credential Guard enabled. This can be done with security audit policies or WMI queries. Here's a list of WinInit event IDs to look for:
|
- You should perform regular reviews of the PCs that have Windows Defender Credential Guard enabled. This can be done with security audit policies or WMI queries. Here's a list of WinInit event IDs to look for:
|
||||||
- **Event ID 13** Credential Guard (LsaIso.exe) was started and will protect LSA credentials.
|
- **Event ID 13** Windows Defender Credential Guard (LsaIso.exe) was started and will protect LSA credentials.
|
||||||
- **Event ID 14** Credential Guard (LsaIso.exe) configuration: 0x1, 0
|
- **Event ID 14** Windows Defender Credential Guard (LsaIso.exe) configuration: 0x1, 0
|
||||||
- The first variable: 0x1 means Credential Guard is configured to run. 0x0 means it’s not configured to run.
|
- The first variable: 0x1 means Windows Defender Credential Guard is configured to run. 0x0 means it’s not configured to run.
|
||||||
- The second variable: 0 means it’s configured to run in protect mode. 1 means it's configured to run in test mode. This variable should always be 0.
|
- The second variable: 0 means it’s configured to run in protect mode. 1 means it's configured to run in test mode. This variable should always be 0.
|
||||||
- **Event ID 15** Credential Guard (LsaIso.exe) is configured but the secure kernel is not running; continuing without Credential Guard.
|
- **Event ID 15** Windows Defender Credential Guard (LsaIso.exe) is configured but the secure kernel is not running; continuing without Windows Defender Credential Guard.
|
||||||
- **Event ID 16** Credential Guard (LsaIso.exe) failed to launch: \[error code\]
|
- **Event ID 16** Windows Defender Credential Guard (LsaIso.exe) failed to launch: \[error code\]
|
||||||
- **Event ID 17** Error reading Credential Guard (LsaIso.exe) UEFI configuration: \[error code\]
|
- **Event ID 17** Error reading Windows Defender Credential Guard (LsaIso.exe) UEFI configuration: \[error code\]
|
||||||
You can also verify that TPM is being used for key protection by checking Event ID 51 in the **Microsoft** -> **Windows** -> **Kernel-Boot** event source. If you are running with a TPM, the TPM PCR mask value will be something other than 0.
|
You can also verify that TPM is being used for key protection by checking Event ID 51 in the **Microsoft** -> **Windows** -> **Kernel-Boot** event source. If you are running with a TPM, the TPM PCR mask value will be something other than 0.
|
||||||
- **Event ID 51** VSM Master Encryption Key Provisioning. Using cached copy status: 0x0. Unsealing cached copy status: 0x1. New key generation status: 0x1. Sealing status: 0x1. TPM PCR mask: 0x0.
|
- **Event ID 51** VSM Master Encryption Key Provisioning. Using cached copy status: 0x0. Unsealing cached copy status: 0x1. New key generation status: 0x1. Sealing status: 0x1. TPM PCR mask: 0x0.
|
||||||
|
|
||||||
## Disable Credential Guard
|
## Disable Windows Defender Credential Guard
|
||||||
|
|
||||||
If you have to disable Credential Guard on a PC, you can use the following set of procedures, or you can [use the Device Guard and Credential Guard hardware readiness tool](#turn-off-with-hardware-readiness-tool).
|
If you have to disable Windows Defender Credential Guard on a PC, you can use the following set of procedures, or you can [use the Windows Defender Device Guard and Windows Defender Credential Guard hardware readiness tool](#turn-off-with-hardware-readiness-tool).
|
||||||
|
|
||||||
1. If you used Group Policy, disable the Group Policy setting that you used to enable Credential Guard (**Computer Configuration** -> **Administrative Templates** -> **System** -> **Device Guard** -> **Turn on Virtualization Based Security**).
|
1. If you used Group Policy, disable the Group Policy setting that you used to enable Windows Defender Credential Guard (**Computer Configuration** -> **Administrative Templates** -> **System** -> **Windows Defender Device Guard** -> **Turn on Virtualization Based Security**).
|
||||||
2. Delete the following registry settings:
|
2. Delete the following registry settings:
|
||||||
- HKEY\_LOCAL\_MACHINE\\System\\CurrentControlSet\\Control\\LSA\LsaCfgFlags
|
- HKEY\_LOCAL\_MACHINE\\System\\CurrentControlSet\\Control\\LSA\LsaCfgFlags
|
||||||
- HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\Windows\\DeviceGuard\\EnableVirtualizationBasedSecurity
|
- HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\Windows\\DeviceGuard\\EnableVirtualizationBasedSecurity
|
||||||
@ -159,7 +150,7 @@ If you have to disable Credential Guard on a PC, you can use the following set o
|
|||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> If you manually remove these registry settings, make sure to delete them all. If you don't remove them all, the device might go into BitLocker recovery.
|
> If you manually remove these registry settings, make sure to delete them all. If you don't remove them all, the device might go into BitLocker recovery.
|
||||||
|
|
||||||
3. Delete the Credential Guard EFI variables by using bcdedit. From an elevated command prompt, type the following commands:
|
3. Delete the Windows Defender Credential Guard EFI variables by using bcdedit. From an elevated command prompt, type the following commands:
|
||||||
``` syntax
|
``` syntax
|
||||||
|
|
||||||
mountvol X: /s
|
mountvol X: /s
|
||||||
@ -180,26 +171,26 @@ If you have to disable Credential Guard on a PC, you can use the following set o
|
|||||||
|
|
||||||
```
|
```
|
||||||
2. Restart the PC.
|
2. Restart the PC.
|
||||||
3. Accept the prompt to disable Credential Guard.
|
3. Accept the prompt to disable Windows Defender Credential Guard.
|
||||||
4. Alternatively, you can disable the virtualization-based security features to turn off Credential Guard.
|
4. Alternatively, you can disable the virtualization-based security features to turn off Windows Defender Credential Guard.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> The PC must have one-time access to a domain controller to decrypt content, such as files that were encrypted with EFS. If you want to turn off both Credential Guard and virtualization-based security, run the following bcdedit command after turning off all virtualization-based security Group Policy and registry settings: bcdedit /set {0cb3b571-2f2e-4343-a879-d86a476d7215} loadoptions DISABLE-LSA-ISO,DISABLE-VBS
|
> The PC must have one-time access to a domain controller to decrypt content, such as files that were encrypted with EFS. If you want to turn off both Windows Defender Credential Guard and virtualization-based security, run the following bcdedit command after turning off all virtualization-based security Group Policy and registry settings: bcdedit /set {0cb3b571-2f2e-4343-a879-d86a476d7215} loadoptions DISABLE-LSA-ISO,DISABLE-VBS
|
||||||
|
|
||||||
For more info on virtualization-based security and Device Guard, see [Device Guard deployment guide](/windows/device-security/device-guard/device-guard-deployment-guide).
|
For more info on virtualization-based security and Windows Defender Device Guard, see [Windows Defender Device Guard deployment guide](/windows/device-security/device-guard/device-guard-deployment-guide).
|
||||||
|
|
||||||
<span id="turn-off-with-hardware-readiness-tool" />
|
<span id="turn-off-with-hardware-readiness-tool" />
|
||||||
#### Disable Credential Guard by using the Device Guard and Credential Guard hardware readiness tool
|
#### Disable Windows Defender Credential Guard by using the Windows Defender Device Guard and Windows Defender Credential Guard hardware readiness tool
|
||||||
|
|
||||||
You can also disable Credential Guard by using the [Device Guard and Credential Guard hardware readiness tool](https://www.microsoft.com/download/details.aspx?id=53337).
|
You can also disable Windows Defender Credential Guard by using the [Windows Defender Device Guard and Windows Defender Credential Guard hardware readiness tool](https://www.microsoft.com/download/details.aspx?id=53337).
|
||||||
|
|
||||||
```
|
```
|
||||||
DG_Readiness_Tool_v3.2.ps1 -Disable -AutoReboot
|
DG_Readiness_Tool_v3.2.ps1 -Disable -AutoReboot
|
||||||
```
|
```
|
||||||
|
|
||||||
#### Disable Credential Guard for a virtual machine
|
#### Disable Windows Defender Credential Guard for a virtual machine
|
||||||
|
|
||||||
From the host, you can disable Credential Guard for a virtual machine:
|
From the host, you can disable Windows Defender Credential Guard for a virtual machine:
|
||||||
|
|
||||||
``` PowerShell
|
``` PowerShell
|
||||||
Set-VMSecurity -VMName <VMName> -VirtualizationBasedSecurityOptOut $true
|
Set-VMSecurity -VMName <VMName> -VirtualizationBasedSecurityOptOut $true
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Credential Guard protection limits (Windows 10)
|
title: Windows Defender Credential Guard protection limits (Windows 10)
|
||||||
description: Scenarios not protected by Credential Guard in Windows 10.
|
description: Scenarios not protected by Windows Defender Credential Guard in Windows 10.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: explore
|
ms.mktglfcycl: explore
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
@ -9,38 +9,38 @@ ms.localizationpriority: high
|
|||||||
author: brianlic-msft
|
author: brianlic-msft
|
||||||
---
|
---
|
||||||
|
|
||||||
# Credential Guard protection limits
|
# Windows Defender Credential Guard protection limits
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows Server 2016
|
- Windows Server 2016
|
||||||
|
|
||||||
Prefer video? See [Credentials protected by Credential Guard](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=pdc37LJyC_1204300474)
|
Prefer video? See [Credentials protected by Windows Defender Credential Guard](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=pdc37LJyC_1204300474)
|
||||||
in the Deep Dive into Credential Guard video series.
|
in the Deep Dive into Windows Defender Credential Guard video series.
|
||||||
|
|
||||||
Some ways to store credentials are not protected by Credential Guard, including:
|
Some ways to store credentials are not protected by Windows Defender Credential Guard, including:
|
||||||
|
|
||||||
- Software that manages credentials outside of Windows feature protection
|
- Software that manages credentials outside of Windows feature protection
|
||||||
- Local accounts and Microsoft Accounts
|
- Local accounts and Microsoft Accounts
|
||||||
- Credential Guard does not protect the Active Directory database running on Windows Server 2016 domain controllers. It also does not protect credential input pipelines, such as Windows Server 2016 servers running Remote Desktop Gateway. If you're using a Windows Server 2016 server as a client PC, it will get the same protection as it would when running Windows 10 Enterprise.
|
- Windows Defender Credential Guard does not protect the Active Directory database running on Windows Server 2016 domain controllers. It also does not protect credential input pipelines, such as Windows Server 2016 servers running Remote Desktop Gateway. If you're using a Windows Server 2016 server as a client PC, it will get the same protection as it would when running Windows 10 Enterprise.
|
||||||
- Key loggers
|
- Key loggers
|
||||||
- Physical attacks
|
- Physical attacks
|
||||||
- Does not prevent an attacker with malware on the PC from using the privileges associated with any credential. We recommend using dedicated PCs for high value accounts, such as IT Pros and users with access to high value assets in your organization.
|
- Does not prevent an attacker with malware on the PC from using the privileges associated with any credential. We recommend using dedicated PCs for high value accounts, such as IT Pros and users with access to high value assets in your organization.
|
||||||
- Third-party security packages
|
- Third-party security packages
|
||||||
- Digest and CredSSP credentials
|
- Digest and CredSSP credentials
|
||||||
- When Credential Guard is enabled, neither Digest nor CredSSP have access to users' logon credentials. This implies no Single Sign-On use for these protocols.
|
- When Windows Defender Credential Guard is enabled, neither Digest nor CredSSP have access to users' logon credentials. This implies no Single Sign-On use for these protocols.
|
||||||
- Supplied credentials for NTLM authentication are not protected. If a user is prompted for and enters credentials for NTLM authentication, these credentials are vulnerable to be read from LSASS memory. Note that these same credentials are vulnerable to key loggers as well.-
|
- Supplied credentials for NTLM authentication are not protected. If a user is prompted for and enters credentials for NTLM authentication, these credentials are vulnerable to be read from LSASS memory. Note that these same credentials are vulnerable to key loggers as well.-
|
||||||
- When Credential Guard is deployed on a VM, Credential Guard protects secrets from attacks inside the VM. However, it does not provide additional protection from privileged system attacks originating from the host.
|
- When Windows Defender Credential Guard is deployed on a VM, Windows Defender Credential Guard protects secrets from attacks inside the VM. However, it does not provide additional protection from privileged system attacks originating from the host.
|
||||||
- Windows logon cached password verifiers (commonly called "cached credentials")
|
- Windows logon cached password verifiers (commonly called "cached credentials")
|
||||||
do not qualify as credentials because they cannot be presented to another computer for authentication, and can only be used locally to verify credentials. They are stored in the registry on the local computer and provide validation for credentials when a domain-joined computer cannot connect to AD DS during user logon. These “cached logons”, or more specifically, cached domain account information, can be managed using the security policy setting **Interactive logon: Number of previous logons to cache** if a domain controller is not available.
|
do not qualify as credentials because they cannot be presented to another computer for authentication, and can only be used locally to verify credentials. They are stored in the registry on the local computer and provide validation for credentials when a domain-joined computer cannot connect to AD DS during user logon. These “cached logons”, or more specifically, cached domain account information, can be managed using the security policy setting **Interactive logon: Number of previous logons to cache** if a domain controller is not available.
|
||||||
|
|
||||||
## Additional mitigations
|
## Additional mitigations
|
||||||
|
|
||||||
Credential Guard can provide mitigations against attacks on derived credentials and prevent the use of stolen credentials elsewhere. However, PCs can still be vulnerable to certain attacks, even if the derived credentials are protected by Credential Guard. These attacks can include abusing privileges and use of derived credentials directly from a compromised device, reusing previously stolen credentials prior to Device Guard, and abuse of management tools and weak application configurations. Because of this, additional mitigations also must be deployed to make the domain environment more robust.
|
Windows Defender Credential Guard can provide mitigations against attacks on derived credentials and prevent the use of stolen credentials elsewhere. However, PCs can still be vulnerable to certain attacks, even if the derived credentials are protected by Windows Defender Credential Guard. These attacks can include abusing privileges and use of derived credentials directly from a compromised device, reusing previously stolen credentials prior to Windows Defender Device Guard, and abuse of management tools and weak application configurations. Because of this, additional mitigations also must be deployed to make the domain environment more robust.
|
||||||
|
|
||||||
### Restricting domain users to specific domain-joined devices
|
### Restricting domain users to specific domain-joined devices
|
||||||
|
|
||||||
Credential theft attacks allow the attacker to steal secrets from one device and use them from another device. If a user can sign on to multiple devices then any device could be used to steal credentials. How do you ensure that users only sign on using devices that have Credential Guard enabled? By deploying authentication policies that restrict them to specific domain-joined devices that have been configured with Credential Guard. For the domain controller to know what device a user is signing on from, Kerberos armoring must be used.
|
Credential theft attacks allow the attacker to steal secrets from one device and use them from another device. If a user can sign on to multiple devices then any device could be used to steal credentials. How do you ensure that users only sign on using devices that have Windows Defender Credential Guard enabled? By deploying authentication policies that restrict them to specific domain-joined devices that have been configured with Windows Defender Credential Guard. For the domain controller to know what device a user is signing on from, Kerberos armoring must be used.
|
||||||
|
|
||||||
#### Kerberos armoring
|
#### Kerberos armoring
|
||||||
|
|
||||||
@ -50,11 +50,11 @@ Kerberos armoring is part of RFC 6113. When a device supports Kerberos armoring,
|
|||||||
|
|
||||||
- Users need to be in domains that are running Windows Server 2012 R2 or higher
|
- Users need to be in domains that are running Windows Server 2012 R2 or higher
|
||||||
- All the domain controllers in these domains must be configured to support Kerberos armoring. Set the **KDC support for claims, compound authentication, and Kerberos armoring** Group Policy setting to either **Supported** or **Always provide claims**.
|
- All the domain controllers in these domains must be configured to support Kerberos armoring. Set the **KDC support for claims, compound authentication, and Kerberos armoring** Group Policy setting to either **Supported** or **Always provide claims**.
|
||||||
- All the devices with Credential Guard that the users will be restricted to must be configured to support Kerberos armoring. Enable the **Kerberos client support for claims, compound authentication and Kerberos armoring** Group Policy settings under **Computer Configuration** -> **Administrative Templates** -> **System** -> **Kerberos**.
|
- All the devices with Windows Defender Credential Guard that the users will be restricted to must be configured to support Kerberos armoring. Enable the **Kerberos client support for claims, compound authentication and Kerberos armoring** Group Policy settings under **Computer Configuration** -> **Administrative Templates** -> **System** -> **Kerberos**.
|
||||||
|
|
||||||
#### Protecting domain-joined device secrets
|
#### Protecting domain-joined device secrets
|
||||||
|
|
||||||
Since domain-joined devices also use shared secrets for authentication, attackers can steal those secrets as well. By deploying device certificates with Credential Guard, the private key can be protected. Then authentication policies can require that users sign on devices that authenticate using those certificates. This prevents shared secrets stolen from the device to be used with stolen user credentials to sign on as the user.
|
Since domain-joined devices also use shared secrets for authentication, attackers can steal those secrets as well. By deploying device certificates with Windows Defender Credential Guard, the private key can be protected. Then authentication policies can require that users sign on devices that authenticate using those certificates. This prevents shared secrets stolen from the device to be used with stolen user credentials to sign on as the user.
|
||||||
|
|
||||||
Domain-joined device certificate authentication has the following requirements:
|
Domain-joined device certificate authentication has the following requirements:
|
||||||
- Devices' accounts are in Windows Server 2012 domain functional level or higher.
|
- Devices' accounts are in Windows Server 2012 domain functional level or higher.
|
||||||
@ -84,7 +84,7 @@ For example, let's say you wanted to use the High Assurance policy only on these
|
|||||||
8. Under **Issuance Policies**, click**High Assurance**.
|
8. Under **Issuance Policies**, click**High Assurance**.
|
||||||
9. On the **Subject name** tab, clear the **DNS name** check box, and then select the **User Principal Name (UPN)** check box.
|
9. On the **Subject name** tab, clear the **DNS name** check box, and then select the **User Principal Name (UPN)** check box.
|
||||||
|
|
||||||
Then on the devices that are running Credential Guard, enroll the devices using the certificate you just created.
|
Then on the devices that are running Windows Defender Credential Guard, enroll the devices using the certificate you just created.
|
||||||
|
|
||||||
**Enrolling devices in a certificate**
|
**Enrolling devices in a certificate**
|
||||||
|
|
||||||
@ -636,6 +636,6 @@ write-host $tmp -Foreground Red
|
|||||||
|
|
||||||
## See also
|
## See also
|
||||||
|
|
||||||
**Deep Dive into Credential Guard: Related videos**
|
**Deep Dive into Windows Defender Credential Guard: Related videos**
|
||||||
|
|
||||||
[Protecting privileged users with Credential Guard](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=JNbjYMJyC_8104300474)
|
[Protecting privileged users with Windows Defender Credential Guard](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=JNbjYMJyC_8104300474)
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Credential Guard protection limits (Windows 10)
|
title: Windows Defender Credential Guard protection limits (Windows 10)
|
||||||
description: Scenarios not protected by Credential Guard in Windows 10.
|
description: Scenarios not protected by Windows Defender Credential Guard in Windows 10.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: explore
|
ms.mktglfcycl: explore
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
@ -9,33 +9,33 @@ ms.localizationpriority: high
|
|||||||
author: brianlic-msft
|
author: brianlic-msft
|
||||||
---
|
---
|
||||||
|
|
||||||
# Credential Guard protection limits
|
# Windows Defender Credential Guard protection limits
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows Server 2016
|
- Windows Server 2016
|
||||||
|
|
||||||
Prefer video? See [Credentials protected by Credential Guard](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=pdc37LJyC_1204300474)
|
Prefer video? See [Credentials protected by Windows Defender Credential Guard](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=pdc37LJyC_1204300474)
|
||||||
in the Deep Dive into Credential Guard video series.
|
in the Deep Dive into Windows Defender Credential Guard video series.
|
||||||
|
|
||||||
Some ways to store credentials are not protected by Credential Guard, including:
|
Some ways to store credentials are not protected by Windows Defender Credential Guard, including:
|
||||||
|
|
||||||
- Software that manages credentials outside of Windows feature protection
|
- Software that manages credentials outside of Windows feature protection
|
||||||
- Local accounts and Microsoft Accounts
|
- Local accounts and Microsoft Accounts
|
||||||
- Credential Guard does not protect the Active Directory database running on Windows Server 2016 domain controllers. It also does not protect credential input pipelines, such as Windows Server 2016 servers running Remote Desktop Gateway. If you're using a Windows Server 2016 server as a client PC, it will get the same protection as it would when running Windows 10 Enterprise.
|
- Windows Defender Credential Guard does not protect the Active Directory database running on Windows Server 2016 domain controllers. It also does not protect credential input pipelines, such as Windows Server 2016 servers running Remote Desktop Gateway. If you're using a Windows Server 2016 server as a client PC, it will get the same protection as it would when running Windows 10 Enterprise.
|
||||||
- Key loggers
|
- Key loggers
|
||||||
- Physical attacks
|
- Physical attacks
|
||||||
- Does not prevent an attacker with malware on the PC from using the privileges associated with any credential. We recommend using dedicated PCs for high value accounts, such as IT Pros and users with access to high value assets in your organization.
|
- Does not prevent an attacker with malware on the PC from using the privileges associated with any credential. We recommend using dedicated PCs for high value accounts, such as IT Pros and users with access to high value assets in your organization.
|
||||||
- Third-party security packages
|
- Third-party security packages
|
||||||
- Digest and CredSSP credentials
|
- Digest and CredSSP credentials
|
||||||
- When Credential Guard is enabled, neither Digest nor CredSSP have access to users' logon credentials. This implies no Single Sign-On use for these protocols.
|
- When Windows Defender Credential Guard is enabled, neither Digest nor CredSSP have access to users' logon credentials. This implies no Single Sign-On use for these protocols.
|
||||||
- Supplied credentials for NTLM authentication are not protected. If a user is prompted for and enters credentials for NTLM authentication, these credentials are vulnerable to be read from LSASS memory. Note that these same credentials are vulnerable to key loggers as well.-
|
- Supplied credentials for NTLM authentication are not protected. If a user is prompted for and enters credentials for NTLM authentication, these credentials are vulnerable to be read from LSASS memory. Note that these same credentials are vulnerable to key loggers as well.-
|
||||||
- When Credential Guard is deployed on a VM, Credential Guard protects secrets from attacks inside the VM. However, it does not provide additional protection from privileged system attacks originating from the host.
|
- When Windows Defender Credential Guard is deployed on a VM, Windows Defender Credential Guard protects secrets from attacks inside the VM. However, it does not provide additional protection from privileged system attacks originating from the host.
|
||||||
- Windows logon cached password verifiers (commonly called "cached credentials")
|
- Windows logon cached password verifiers (commonly called "cached credentials")
|
||||||
do not qualify as credentials because they cannot be presented to another computer for authentication, and can only be used locally to verify credentials. They are stored in the registry on the local computer and provide validation for credentials when a domain-joined computer cannot connect to AD DS during user logon. These “cached logons”, or more specifically, cached domain account information, can be managed using the security policy setting **Interactive logon: Number of previous logons to cache** if a domain controller is not available.
|
do not qualify as credentials because they cannot be presented to another computer for authentication, and can only be used locally to verify credentials. They are stored in the registry on the local computer and provide validation for credentials when a domain-joined computer cannot connect to AD DS during user logon. These “cached logons”, or more specifically, cached domain account information, can be managed using the security policy setting **Interactive logon: Number of previous logons to cache** if a domain controller is not available.
|
||||||
|
|
||||||
## See also
|
## See also
|
||||||
|
|
||||||
**Deep Dive into Credential Guard: Related videos**
|
**Deep Dive into Windows Defender Credential Guard: Related videos**
|
||||||
|
|
||||||
[Protecting privileged users with Credential Guard](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=JNbjYMJyC_8104300474)
|
[Protecting privileged users with Windows Defender Credential Guard](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=JNbjYMJyC_8104300474)
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Credential Guard Requirements (Windows 10)
|
title: Windows Defender Credential Guard Requirements (Windows 10)
|
||||||
description: Credential Guard baseline hardware, firmware, and software requirements, and additional protections for improved security associated with available hardware and firmware options.
|
description: Windows Defender Credential Guard baseline hardware, firmware, and software requirements, and additional protections for improved security associated with available hardware and firmware options.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: explore
|
ms.mktglfcycl: explore
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
@ -9,22 +9,22 @@ ms.localizationpriority: high
|
|||||||
author: brianlic-msft
|
author: brianlic-msft
|
||||||
---
|
---
|
||||||
|
|
||||||
# Credential Guard: Requirements
|
# Windows Defender Credential Guard: Requirements
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows Server 2016
|
- Windows Server 2016
|
||||||
|
|
||||||
Prefer video? See
|
Prefer video? See
|
||||||
[Credential Guard Deployment](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=sRcyvLJyC_3304300474)
|
[Windows Defender Credential Guard Deployment](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=sRcyvLJyC_3304300474)
|
||||||
in the Deep Dive into Credential Guard video series.
|
in the Deep Dive into Windows Defender Credential Guard video series.
|
||||||
|
|
||||||
For Credential Guard to provide protections, the computers you are protecting must meet certain baseline hardware, firmware, and software requirements which we will refer to as [Hardware and software requirements](#hardware-and-software-requirements). Additionally, Credential Guard blocks specific authentication capabilities, so applications that require such capabilities will break. We will refer to this as [Application requirements](#application-requirements). Beyond that, computers can meet additional hardware and firmware qualifications, and receive additional protections. Those computers will be more hardened against certain threats. For detailed information on baseline protections, plus protections for improved security that are associated with hardware and firmware options available in 2015, 2016, and 2017, refer to the tables in [Security Considerations](#security-considerations).
|
For Windows Defender Credential Guard to provide protections, the computers you are protecting must meet certain baseline hardware, firmware, and software requirements which we will refer to as [Hardware and software requirements](#hardware-and-software-requirements). Additionally, Windows Defender Credential Guard blocks specific authentication capabilities, so applications that require such capabilities will break. We will refer to this as [Application requirements](#application-requirements). Beyond that, computers can meet additional hardware and firmware qualifications, and receive additional protections. Those computers will be more hardened against certain threats. For detailed information on baseline protections, plus protections for improved security that are associated with hardware and firmware options available in 2015, 2016, and 2017, refer to the tables in [Security Considerations](#security-considerations).
|
||||||
|
|
||||||
|
|
||||||
## Hardware and software requirements
|
## Hardware and software requirements
|
||||||
|
|
||||||
To provide basic protections against OS level attempts to read Credential Manager domain credentials, NTLM and Kerberos derived credentials, Credential Guard uses:
|
To provide basic protections against OS level attempts to read Credential Manager domain credentials, NTLM and Kerberos derived credentials, Windows Defender Credential Guard uses:
|
||||||
- Support for Virtualization-based security (required)
|
- Support for Virtualization-based security (required)
|
||||||
- Secure boot (required)
|
- Secure boot (required)
|
||||||
- TPM 2.0 either discrete or firmware (preferred - provides binding to hardware)
|
- TPM 2.0 either discrete or firmware (preferred - provides binding to hardware)
|
||||||
@ -35,16 +35,29 @@ The Virtualization-based security requires:
|
|||||||
- CPU virtualization extensions plus extended page tables
|
- CPU virtualization extensions plus extended page tables
|
||||||
- Windows hypervisor
|
- Windows hypervisor
|
||||||
|
|
||||||
|
### Windows Defender Credential Guard deployment in virtual machines
|
||||||
|
|
||||||
|
Credential Guard can protect secrets in a Hyper-V virtual machine, just as it would on a physical machine. When Credential Guard is deployed on a VM, secrets are protected from attacks inside the VM. Credential Guard does not provide additional protection from privileged system attacks originating from the host.
|
||||||
|
|
||||||
|
#### Requirements for running Windows Defender Credential Guard in Hyper-V virtual machines
|
||||||
|
|
||||||
|
- The Hyper-V host must have an IOMMU, and run at least Windows Server 2016 or Windows 10 version 1607.
|
||||||
|
- The Hyper-V virtual machine must be Generation 2, have an enabled virtual TPM, and be running at least Windows Server 2016 or Windows 10.
|
||||||
|
|
||||||
|
For information about other host platforms, see [Enabling Windows Server 2016 and Hyper-V virtualization based security features on other platforms](https://blogs.technet.microsoft.com/windowsserver/2016/09/29/enabling-windows-server-2016-and-hyper-v-virtualization-based-security-features-on-other-platforms/)
|
||||||
|
|
||||||
|
For information about Windows Defender Remote Credential Guard hardware and software requirements, see [Windows Defender Remote Credential Guard requirements](https://docs.microsoft.com/en-us/windows/access-protection/remote-credential-guard#hardware-and-software-requirements)
|
||||||
|
|
||||||
## Application requirements
|
## Application requirements
|
||||||
|
|
||||||
When Credential Guard is enabled, specific authentication capabilities are blocked, so applications that require such capabilities will break. Applications should be tested prior to deployment to ensure compatiblity with the reduced functionality.
|
When Windows Defender Credential Guard is enabled, specific authentication capabilities are blocked, so applications that require such capabilities will break. Applications should be tested prior to deployment to ensure compatiblity with the reduced functionality.
|
||||||
|
|
||||||
>[!WARNING]
|
>[!WARNING]
|
||||||
> Enabling Credential Guard on domain controllers is not supported. <br>
|
> Enabling Windows Defender Credential Guard on domain controllers is not supported. <br>
|
||||||
> The domain controller hosts authentication services which integrate with processes isolated when Credential Guard is enabled, causing crashes.
|
> The domain controller hosts authentication services which integrate with processes isolated when Windows Defender Credential Guard is enabled, causing crashes.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
> Credential Guard does not provide protections for the Active Directory database or the Security Accounts Manager (SAM). The credentials protected by Kerberos and NTLM when Credential Guard is enabled are also in the Active Directory database (on domain controllers) and the SAM (for local accounts).
|
> Windows Defender Credential Guard does not provide protections for the Active Directory database or the Security Accounts Manager (SAM). The credentials protected by Kerberos and NTLM when Windows Defender Credential Guard is enabled are also in the Active Directory database (on domain controllers) and the SAM (for local accounts).
|
||||||
|
|
||||||
Applications will break if they require:
|
Applications will break if they require:
|
||||||
- Kerberos DES encryption support
|
- Kerberos DES encryption support
|
||||||
@ -57,20 +70,20 @@ Applications will prompt and expose credentials to risk if they require:
|
|||||||
- Credential delegation
|
- Credential delegation
|
||||||
- MS-CHAPv2
|
- MS-CHAPv2
|
||||||
|
|
||||||
Applications may cause performance issues when they attempt to hook the isolated Credential Guard process.
|
Applications may cause performance issues when they attempt to hook the isolated Windows Defender Credential Guard process.
|
||||||
|
|
||||||
See this video: [Credentials Protected by Credential Guard](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=pdc37LJyC_1204300474)
|
See this video: [Credentials Protected by Windows Defender Credential Guard](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=pdc37LJyC_1204300474)
|
||||||
|
|
||||||
|
|
||||||
## Security considerations
|
## Security considerations
|
||||||
|
|
||||||
All computers that meet baseline protections for hardware, firmware, and software can use Credential Guard.
|
All computers that meet baseline protections for hardware, firmware, and software can use Windows Defender Credential Guard.
|
||||||
Computers that meet additional qualifications can provide additional protections to further reduce the attack surface.
|
Computers that meet additional qualifications can provide additional protections to further reduce the attack surface.
|
||||||
The following tables describe baseline protections, plus protections for improved security that are associated with hardware and firmware options available in 2015, 2016, and 2017.
|
The following tables describe baseline protections, plus protections for improved security that are associated with hardware and firmware options available in 2015, 2016, and 2017.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Beginning with Windows 10, version 1607, Trusted Platform Module (TPM 2.0) must be enabled by default on new shipping computers. <br>
|
> Beginning with Windows 10, version 1607, Trusted Platform Module (TPM 2.0) must be enabled by default on new shipping computers. <br>
|
||||||
> If you are an OEM, see [PC OEM requirements for Device Guard and Credential Guard](https://msdn.microsoft.com/library/windows/hardware/mt767514.aspx).<br>
|
> If you are an OEM, see [PC OEM requirements for Windows Defender Device Guard and Windows Defender Credential Guard](https://msdn.microsoft.com/library/windows/hardware/mt767514.aspx).<br>
|
||||||
|
|
||||||
### Baseline protections
|
### Baseline protections
|
||||||
|
|
||||||
@ -81,10 +94,10 @@ The following tables describe baseline protections, plus protections for improve
|
|||||||
| Hardware: **Trusted Platform Module (TPM)** | **Requirement**: TPM 1.2 or TPM 2.0, either discrete or firmware.<br>[TPM recommendations](https://technet.microsoft.com/itpro/windows/keep-secure/tpm-recommendations) | A TPM provides protection for VBS encryption keys that are stored in the firmware. This helps protect against attacks involving a physically present user with BIOS access. |
|
| Hardware: **Trusted Platform Module (TPM)** | **Requirement**: TPM 1.2 or TPM 2.0, either discrete or firmware.<br>[TPM recommendations](https://technet.microsoft.com/itpro/windows/keep-secure/tpm-recommendations) | A TPM provides protection for VBS encryption keys that are stored in the firmware. This helps protect against attacks involving a physically present user with BIOS access. |
|
||||||
| Firmware: **UEFI firmware version 2.3.1.c or higher with UEFI Secure Boot** | **Requirements**: See the following Windows Hardware Compatibility Program requirement: [System.Fundamentals.Firmware.UEFISecureBoot](http://msdn.microsoft.com/library/windows/hardware/dn932805.aspx#system-fundamentals-firmware-uefisecureboot)| UEFI Secure Boot helps ensure that the device boots only authorized code. This can prevent boot kits and root kits from installing and persisting across reboots. |
|
| Firmware: **UEFI firmware version 2.3.1.c or higher with UEFI Secure Boot** | **Requirements**: See the following Windows Hardware Compatibility Program requirement: [System.Fundamentals.Firmware.UEFISecureBoot](http://msdn.microsoft.com/library/windows/hardware/dn932805.aspx#system-fundamentals-firmware-uefisecureboot)| UEFI Secure Boot helps ensure that the device boots only authorized code. This can prevent boot kits and root kits from installing and persisting across reboots. |
|
||||||
| Firmware: **Secure firmware update process** | **Requirements**: UEFI firmware must support secure firmware update found under the following Windows Hardware Compatibility Program requirement: [System.Fundamentals.Firmware.UEFISecureBoot](http://msdn.microsoft.com/library/windows/hardware/dn932805.aspx#system-fundamentals-firmware-uefisecureboot).| UEFI firmware just like software can have security vulnerabilities that, when found, need to be patched through firmware updates. Patching helps prevent root kits from getting installed. |
|
| Firmware: **Secure firmware update process** | **Requirements**: UEFI firmware must support secure firmware update found under the following Windows Hardware Compatibility Program requirement: [System.Fundamentals.Firmware.UEFISecureBoot](http://msdn.microsoft.com/library/windows/hardware/dn932805.aspx#system-fundamentals-firmware-uefisecureboot).| UEFI firmware just like software can have security vulnerabilities that, when found, need to be patched through firmware updates. Patching helps prevent root kits from getting installed. |
|
||||||
| Software: Qualified **Windows operating system** | **Requirement**: Windows 10 Enterprise, Windows 10 Education, Windows Server 2016, or Windows 10 IoT Enterprise<br><blockquote><p><strong>Important:</strong><br> Windows Server 2016 running as a domain controller does not support Credential Guard. Only Device Guard is supported in this configuration.</p></blockquote> |Support for VBS and for management features that simplify configuration of Credential Guard. |
|
| Software: Qualified **Windows operating system** | **Requirement**: Windows 10 Enterprise, Windows 10 Education, Windows Server 2016, or Windows 10 IoT Enterprise<br><blockquote><p><strong>Important:</strong><br> Windows Server 2016 running as a domain controller does not support Windows Defender Credential Guard. Only Windows Defender Device Guard is supported in this configuration.</p></blockquote> |Support for VBS and for management features that simplify configuration of Windows Defender Credential Guard. |
|
||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> The following tables list additional qualifications for improved security. We strongly recommend meeting the additional qualifications to significantly strengthen the level of security that Credential Guard can provide.
|
> The following tables list additional qualifications for improved security. We strongly recommend meeting the additional qualifications to significantly strengthen the level of security that Windows Defender Credential Guard can provide.
|
||||||
|
|
||||||
|
|
||||||
### 2015 Additional security qualifications starting with Windows 10, version 1507, and Windows Server 2016 Technical Preview 4
|
### 2015 Additional security qualifications starting with Windows 10, version 1507, and Windows Server 2016 Technical Preview 4
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Scripts for Certificate Issuance Policies in Credential Guard (Windows 10)
|
title: Scripts for Certificate Issuance Policies in Windows Defender Credential Guard (Windows 10)
|
||||||
description: Scripts listed in this topic for obtaining the available issuance policies on the certificate authority for Credential Guard on Windows 10.
|
description: Scripts listed in this topic for obtaining the available issuance policies on the certificate authority for Windows Defender Credential Guard on Windows 10.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: explore
|
ms.mktglfcycl: explore
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
@ -9,7 +9,7 @@ ms.localizationpriority: high
|
|||||||
author: brianlic-msft
|
author: brianlic-msft
|
||||||
---
|
---
|
||||||
|
|
||||||
# Credential Guard: Scripts for Certificate Authority Issuance Policies
|
# Windows Defender Credential Guard: Scripts for Certificate Authority Issuance Policies
|
||||||
|
|
||||||
|
|
||||||
Here is a list of scripts mentioned in this topic.
|
Here is a list of scripts mentioned in this topic.
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Protect derived domain credentials with Credential Guard (Windows 10)
|
title: Protect derived domain credentials with Windows Defender Credential Guard (Windows 10)
|
||||||
description: Introduced in Windows 10 Enterprise, Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can access them.
|
description: Introduced in Windows 10 Enterprise, Windows Defender Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can access them.
|
||||||
ms.assetid: 4F1FE390-A166-4A24-8530-EA3369FEB4B1
|
ms.assetid: 4F1FE390-A166-4A24-8530-EA3369FEB4B1
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: explore
|
ms.mktglfcycl: explore
|
||||||
@ -10,21 +10,21 @@ ms.localizationpriority: high
|
|||||||
author: brianlic-msft
|
author: brianlic-msft
|
||||||
---
|
---
|
||||||
|
|
||||||
# Protect derived domain credentials with Credential Guard
|
# Protect derived domain credentials with Windows Defender Credential Guard
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows Server 2016
|
- Windows Server 2016
|
||||||
|
|
||||||
Prefer video? See [Credential Theft and Lateral Traversal](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=cfGBPlIyC_9404300474) in the Deep Dive into Credential Guard video series.
|
Prefer video? See [Credential Theft and Lateral Traversal](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=cfGBPlIyC_9404300474) in the Deep Dive into Windows Defender Credential Guard video series.
|
||||||
|
|
||||||
Introduced in Windows 10 Enterprise and Windows Server 2016, Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can access them. Unauthorized access to these secrets can lead to credential theft attacks, such as Pass-the-Hash or Pass-The-Ticket. Credential Guard prevents these attacks by protecting NTLM password hashes, Kerberos Ticket Granting Tickets, and credentials stored by applications as domain credentials.
|
Introduced in Windows 10 Enterprise and Windows Server 2016, Windows Defender Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can access them. Unauthorized access to these secrets can lead to credential theft attacks, such as Pass-the-Hash or Pass-The-Ticket. Windows Defender Credential Guard prevents these attacks by protecting NTLM password hashes, Kerberos Ticket Granting Tickets, and credentials stored by applications as domain credentials.
|
||||||
|
|
||||||
By enabling Credential Guard, the following features and solutions are provided:
|
By enabling Windows Defender Credential Guard, the following features and solutions are provided:
|
||||||
|
|
||||||
- **Hardware security** NTLM, Kerberos, and Credential Manager take advantage of platform security features, including Secure Boot and virtualization, to protect credentials.
|
- **Hardware security** NTLM, Kerberos, and Credential Manager take advantage of platform security features, including Secure Boot and virtualization, to protect credentials.
|
||||||
- **Virtualization-based security** Windows NTLM and Kerberos derived credentials and other secrets run in a protected environment that is isolated from the running operating system.
|
- **Virtualization-based security** Windows NTLM and Kerberos derived credentials and other secrets run in a protected environment that is isolated from the running operating system.
|
||||||
- **Better protection against advanced persistent threats** When Credential Manager domain credentials, NTLM, and Kerberos derived credentials are protected using virtualization-based security, the credential theft attack techniques and tools used in many targeted attacks are blocked. Malware running in the operating system with administrative privileges cannot extract secrets that are protected by virtualization-based security. While Credential Guard is a powerful mitigation, persistent threat attacks will likely shift to new attack techniques and you should also incorporate Device Guard and other security strategies and architectures.
|
- **Better protection against advanced persistent threats** When Credential Manager domain credentials, NTLM, and Kerberos derived credentials are protected using virtualization-based security, the credential theft attack techniques and tools used in many targeted attacks are blocked. Malware running in the operating system with administrative privileges cannot extract secrets that are protected by virtualization-based security. While Windows Defender Credential Guard is a powerful mitigation, persistent threat attacks will likely shift to new attack techniques and you should also incorporate Windows Defender Device Guard and other security strategies and architectures.
|
||||||
|
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
@ -33,7 +33,7 @@ By enabling Credential Guard, the following features and solutions are provided:
|
|||||||
- [Isolated User Mode Processes and Features in Windows 10 with Logan Gabriel (Channel 9)](http://channel9.msdn.com/Blogs/Seth-Juarez/Isolated-User-Mode-Processes-and-Features-in-Windows-10-with-Logan-Gabriel)
|
- [Isolated User Mode Processes and Features in Windows 10 with Logan Gabriel (Channel 9)](http://channel9.msdn.com/Blogs/Seth-Juarez/Isolated-User-Mode-Processes-and-Features-in-Windows-10-with-Logan-Gabriel)
|
||||||
- [More on Processes and Features in Windows 10 Isolated User Mode with Dave Probert (Channel 9)](https://channel9.msdn.com/Blogs/Seth-Juarez/More-on-Processes-and-Features-in-Windows-10-Isolated-User-Mode-with-Dave-Probert)
|
- [More on Processes and Features in Windows 10 Isolated User Mode with Dave Probert (Channel 9)](https://channel9.msdn.com/Blogs/Seth-Juarez/More-on-Processes-and-Features-in-Windows-10-Isolated-User-Mode-with-Dave-Probert)
|
||||||
- [Mitigating Credential Theft using the Windows 10 Isolated User Mode (Channel 9)](https://channel9.msdn.com/Blogs/Seth-Juarez/Mitigating-Credential-Theft-using-the-Windows-10-Isolated-User-Mode)
|
- [Mitigating Credential Theft using the Windows 10 Isolated User Mode (Channel 9)](https://channel9.msdn.com/Blogs/Seth-Juarez/Mitigating-Credential-Theft-using-the-Windows-10-Isolated-User-Mode)
|
||||||
- [Protecting network passwords with Windows 10 Credential Guard](https://www.microsoft.com/itshowcase/Article/Content/831/Protecting-network-passwords-with-Windows-10-Credential-Guard)
|
- [Protecting network passwords with Windows Defender Credential Guard](https://www.microsoft.com/itshowcase/Article/Content/831/Protecting-network-passwords-with-Windows-10-Credential-Guard)
|
||||||
- [Enabling Strict KDC Validation in Windows Kerberos](http://www.microsoft.com/download/details.aspx?id=6382)
|
- [Enabling Strict KDC Validation in Windows Kerberos](http://www.microsoft.com/download/details.aspx?id=6382)
|
||||||
- [What's New in Kerberos Authentication for Windows Server 2012](http://technet.microsoft.com/library/hh831747.aspx)
|
- [What's New in Kerberos Authentication for Windows Server 2012](http://technet.microsoft.com/library/hh831747.aspx)
|
||||||
- [Authentication Mechanism Assurance for AD DS in Windows Server 2008 R2 Step-by-Step Guide](http://technet.microsoft.com/library/dd378897.aspx)
|
- [Authentication Mechanism Assurance for AD DS in Windows Server 2008 R2 Step-by-Step Guide](http://technet.microsoft.com/library/dd378897.aspx)
|
||||||
@ -42,6 +42,6 @@ By enabling Credential Guard, the following features and solutions are provided:
|
|||||||
|
|
||||||
## See also
|
## See also
|
||||||
|
|
||||||
**Deep Dive into Credential Guard: Related videos**
|
**Deep Dive into Windows Defender Credential Guard: Related videos**
|
||||||
|
|
||||||
[Credentials protected by Credential Guard](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=pdc37LJyC_1204300474)
|
[Credentials protected by Windows Defender Credential Guard](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=pdc37LJyC_1204300474)
|
Before Width: | Height: | Size: 23 KiB After Width: | Height: | Size: 32 KiB |
@ -9,7 +9,7 @@ ms.pagetype: security, mobile
|
|||||||
author: DaniHalfin
|
author: DaniHalfin
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
ms.author: daniha
|
ms.author: daniha
|
||||||
ms.date: 07/07/2017
|
ms.date: 09/08/2017
|
||||||
---
|
---
|
||||||
# Prepare and Deploy Windows Server 2016 Active Directory Federation Services
|
# Prepare and Deploy Windows Server 2016 Active Directory Federation Services
|
||||||
|
|
||||||
@ -36,7 +36,7 @@ Prepare the Active Directory Federation Services deployment by installing and up
|
|||||||
|
|
||||||
Sign-in the federation server with _local admin_ equivalent credentials.
|
Sign-in the federation server with _local admin_ equivalent credentials.
|
||||||
1. Ensure Windows Server 2016 is current by running **Windows Update** from **Settings**. Continue this process until no further updates are needed. If you’re not using Windows Update for updates, please advise the [Windows Server 2016 update history page](https://support.microsoft.com/help/4000825/windows-10-windows-server-2016-update-history) to make sure you have the latest updates available installed.
|
1. Ensure Windows Server 2016 is current by running **Windows Update** from **Settings**. Continue this process until no further updates are needed. If you’re not using Windows Update for updates, please advise the [Windows Server 2016 update history page](https://support.microsoft.com/help/4000825/windows-10-windows-server-2016-update-history) to make sure you have the latest updates available installed.
|
||||||
2. Ensure the latest server updates to the federation server includes [KB4022723](https://support.microsoft.com/en-us/help/4022723).
|
2. Ensure the latest server updates to the federation server includes [KB4034658 (14393.1593)](https://support.microsoft.com/en-us/help/4034658).
|
||||||
|
|
||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
>The above referenced updates are mandatory for Windows Hello for Business all on-premises deployment and hybrid certificate trust deployments for domain joined computers.
|
>The above referenced updates are mandatory for Windows Hello for Business all on-premises deployment and hybrid certificate trust deployments for domain joined computers.
|
||||||
|
@ -36,12 +36,12 @@ Sign-in using _Enterprise Admin_ equivalent credentials on Windows Server 2012 o
|
|||||||
1. Open an elevated Windows PowerShell prompt.
|
1. Open an elevated Windows PowerShell prompt.
|
||||||
2. Use the following command to install the Active Directory Certificate Services role.
|
2. Use the following command to install the Active Directory Certificate Services role.
|
||||||
```PowerShell
|
```PowerShell
|
||||||
Add-WindowsFeature Adcs-Cert-Authority -IncludeManageTools
|
Add-WindowsFeature Adcs-Cert-Authority -IncludeManagementTools
|
||||||
```
|
```
|
||||||
|
|
||||||
3. Use the following command to configure the Certificate Authority using a basic certificate authority configuration.
|
3. Use the following command to configure the Certificate Authority using a basic certificate authority configuration.
|
||||||
```PowerShell
|
```PowerShell
|
||||||
Install-AdcsCertificateAuthority
|
Install-AdcsCertificationAuthority
|
||||||
```
|
```
|
||||||
|
|
||||||
## Configure a Production Public Key Infrastructure
|
## Configure a Production Public Key Infrastructure
|
||||||
|
@ -9,7 +9,7 @@ ms.pagetype: security, mobile
|
|||||||
author: DaniHalfin
|
author: DaniHalfin
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
ms.author: daniha
|
ms.author: daniha
|
||||||
ms.date: 07/07/2017
|
ms.date: 09/08/2017
|
||||||
---
|
---
|
||||||
# Windows Hello for Business Deployment Guide
|
# Windows Hello for Business Deployment Guide
|
||||||
|
|
||||||
@ -47,8 +47,10 @@ Hybrid deployments are for enterprises that use Azure Active Directory. On-prem
|
|||||||
The trust model determines how you want users to authentication to the on-premises Active Directory. Remember hybrid environments use Azure Active Directory and on-premises Active Directory. The key-trust model is for enterprises who do not want to issue end-entity certificates to their users and they have an adequate number of 2016 domain controllers in each site to support the authentication. The certificate-trust model is for enterprise that do want to issue end-entity certificates to their users and have the benefits of certificate expiration and renewal, similar to how smart cards work today. The certificate trust model is also enterprise who are not ready to deploy Windows Server 2016 domain controllers.
|
The trust model determines how you want users to authentication to the on-premises Active Directory. Remember hybrid environments use Azure Active Directory and on-premises Active Directory. The key-trust model is for enterprises who do not want to issue end-entity certificates to their users and they have an adequate number of 2016 domain controllers in each site to support the authentication. The certificate-trust model is for enterprise that do want to issue end-entity certificates to their users and have the benefits of certificate expiration and renewal, similar to how smart cards work today. The certificate trust model is also enterprise who are not ready to deploy Windows Server 2016 domain controllers.
|
||||||
|
|
||||||
Following are the various deployment guides included in this topic:
|
Following are the various deployment guides included in this topic:
|
||||||
|
* [Hybrid Certificate Trust Deployment](hello-hybrid-cert-trust.md)
|
||||||
* [On Premises Certificate Trust Deployment](hello-deployment-cert-trust.md)
|
* [On Premises Certificate Trust Deployment](hello-deployment-cert-trust.md)
|
||||||
|
|
||||||
|
|
||||||
## Provisioning
|
## Provisioning
|
||||||
|
|
||||||
The Windows Hello for Business provisioning begins immediately after the user has signed in, after the user profile is loaded, but before the user receives their desktop. Windows only launches the provisioning experience if all the prerequisite checks pass. You can determine the status of the prerequisite checks by viewing the **User Device Registration** in the **Event Viewer** under **Applications and Services Logs\Microsoft\Windows**.
|
The Windows Hello for Business provisioning begins immediately after the user has signed in, after the user profile is loaded, but before the user receives their desktop. Windows only launches the provisioning experience if all the prerequisite checks pass. You can determine the status of the prerequisite checks by viewing the **User Device Registration** in the **Event Viewer** under **Applications and Services Logs\Microsoft\Windows**.
|
||||||
|
@ -0,0 +1,144 @@
|
|||||||
|
---
|
||||||
|
title: Windows Hello for Business Trust New Installation (Windows Hello for Business)
|
||||||
|
description: Windows Hello for Business Hybrid baseline deployment
|
||||||
|
keywords: identity, PIN, biometric, Hello, passport, WHFB
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security, mobile
|
||||||
|
author: mikestephens-MS
|
||||||
|
ms.author: mstephen
|
||||||
|
localizationpriority: high
|
||||||
|
ms.date: 09/08/2017
|
||||||
|
---
|
||||||
|
# Windows Hello for Business Certificate Trust New Installation
|
||||||
|
|
||||||
|
**Applies to**
|
||||||
|
- Windows 10
|
||||||
|
|
||||||
|
>This guide only applies to Hybrid deployments for Windows 10, version 1703 or higher.
|
||||||
|
|
||||||
|
Windows Hello for Business involves configuring distributed technologies that may or may not exist in your current infrastructure. Hybrid certificate trust deployments of Windows Hello for Business rely on these technolgies
|
||||||
|
|
||||||
|
* [Active Directory](#active-directory)
|
||||||
|
* [Public Key Infrastructure](#public-key-infrastructure)
|
||||||
|
* [Azure Active Directory](#azure-active-directory)
|
||||||
|
* [Directory Synchronization](#directory-synchronization)
|
||||||
|
* [Active Directory Federation Services](#active-directory-federation-services)
|
||||||
|
|
||||||
|
|
||||||
|
New installations are considerably more involved than existing implementations because you are building the entire infrastructure. Microsoft recommends you review the new installation baseline to validate your exsting envrionment has all the needed configurations to support your hybrid certificate trust Windows Hello for Business deployment. If your environment meets these needs, you can read the [Configure Azure Device Registration](hello-hybrid-cert-trust-devreg.md) section to prepare your Windows Hello for Business deployment by configuring Azure device registration.
|
||||||
|
|
||||||
|
The new installation baseline begins with a basic Active Directory deployment and enterprise PKI. This document expects you have Active Directory deployed using Windows Server 2008 R2 or later domain controllers.
|
||||||
|
|
||||||
|
## Active Directory ##
|
||||||
|
Production environments should follow Active Directory best practices regarding the number and placement of domain controllers to ensure adequate authentication throughout the organization.
|
||||||
|
|
||||||
|
Lab environments and isolated proof of concepts may want to limit the number of domain controllers. The purpose of these environments is to experiment and learn. Reducing the number of domain controllers can prevent troubleshooting issue, such as Active Directory replication, which is unrelated to activity's goal.
|
||||||
|
|
||||||
|
### Section Review
|
||||||
|
|
||||||
|
> [!div class="checklist"]
|
||||||
|
> * Minimum Windows Server 2008 R2 domain controllers
|
||||||
|
> * Minimum Windows Server 2008 R2 domain and forest functional level
|
||||||
|
> * Functional networking, name resolution, and Active Directory replication
|
||||||
|
|
||||||
|
## Public Key Infrastructure
|
||||||
|
|
||||||
|
Windows Hello for Business must have a public key infrastructure regardless of the deployment or trust model. All trust models depend on the domain controllers having a certificate. The certificate serves as a root of trust for clients to ensure they are not communicating with a rogue domain controller. The certificate trust model extends certificate issuance to client computers. During Windows Hello for Business provisioning, the user receives a sign-in certificate.
|
||||||
|
|
||||||
|
This guide assumes most enterprises have an existing public key infrastructure. Windows Hello for Business depends on a Windows enterprise public key infrastructure running the Active Directory Certificate Services role from Windows Server 2012 or later.
|
||||||
|
|
||||||
|
### Lab-based public key infrastructure
|
||||||
|
|
||||||
|
The following instructions may be used to deploy simple public key infrastructure that is suitable for a lab environment.
|
||||||
|
|
||||||
|
Sign-in using _Enterprise Admin_ equivalent credentials on Windows Server 2012 or later server where you want the certificate authority installed.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>Never install a certificate authority on a domain controller in a production environment.
|
||||||
|
|
||||||
|
1. Open an elevated Windows PowerShell prompt.
|
||||||
|
2. Use the following command to install the Active Directory Certificate Services role.
|
||||||
|
```PowerShell
|
||||||
|
Add-WindowsFeature Adcs-Cert-Authority -IncludeManageTools
|
||||||
|
```
|
||||||
|
|
||||||
|
3. Use the following command to configure the Certificate Authority using a basic certificate authority configuration.
|
||||||
|
```PowerShell
|
||||||
|
Install-AdcsCertificateAuthority
|
||||||
|
```
|
||||||
|
|
||||||
|
## Configure a Production Public Key Infrastructure
|
||||||
|
|
||||||
|
If you do have an existing public key infrastructure, please review [Certification Authority Guidance](https://technet.microsoft.com/library/hh831574.aspx) from Microsoft TechNet to properly design your infrastructure. Then, consult the [Test Lab Guide: Deploying an AD CS Two-Tier PKI Hierarchy](https://technet.microsoft.com/library/hh831348.aspx) for instructions on how to configure your public key infrastructure using the information from your design session.
|
||||||
|
|
||||||
|
### Section Review ###
|
||||||
|
|
||||||
|
> [!div class="checklist"]
|
||||||
|
> * Miniumum Windows Server 2012 Certificate Authority.
|
||||||
|
> * Enterprise Certificate Authority.
|
||||||
|
> * Functioning public key infrastructure.
|
||||||
|
|
||||||
|
## Azure Active Directory ##
|
||||||
|
You’ve prepared your Active Directory. Hybrid Windows Hello for Business deployment needs Azure Active Directory to host your cloud-based identities.
|
||||||
|
|
||||||
|
The next step of the deployment is to follow the [Creating an Azure AD tenant](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-howto-tenant) process to provision an Azure tenant for your organization.
|
||||||
|
|
||||||
|
### Section Review
|
||||||
|
|
||||||
|
> [!div class="checklist"]
|
||||||
|
> * Review the different ways to establish an Azure Active Directory tenant.
|
||||||
|
> * Create an Azure Active Directory Tenant.
|
||||||
|
> * Purchase the appropriate Azure Active Directory subscription or licenses, if necessary.
|
||||||
|
|
||||||
|
## Multifactor Authentication Services ##
|
||||||
|
Windows Hello for Business uses multifactor authentication during provisioning and during user initiated PIN reset scenarios, such as when a user forgets their PIN. There are two preferred multifactor authentication configurations with hybrid deployments—Azure MFA and AD FS using Azure MFA
|
||||||
|
|
||||||
|
Review the [What is Azure Multi-Factor Authentication](https://docs.microsoft.com/en-us/azure/multi-factor-authentication/multi-factor-authentication) topic to familiarize yourself its purpose and how it works.
|
||||||
|
|
||||||
|
### Azure Multi-Factor Authentication (MFA) Cloud ###
|
||||||
|
> [!IMPORTANT]
|
||||||
|
As long as your users have licenses that include Azure Multi-Factor Authentication, there's nothing that you need to do to turn on Azure MFA. You can start requiring two-step verification on an individual user basis. The licenses that enable Azure MFA are:
|
||||||
|
> * Azure Multi-Factor Authentication
|
||||||
|
> * Azure Active Directory Premium
|
||||||
|
> * Enterprise Mobility + Security
|
||||||
|
>
|
||||||
|
> If you have one of these subscriptions or licenses, skip the Azure MFA Adapter section.
|
||||||
|
|
||||||
|
#### Azure MFA Provider ####
|
||||||
|
If your organization uses Azure MFA on a per-consumption model (no licenses), then review the [Create a Multifactor Authentication Provider](https://docs.microsoft.com/en-us/azure/multi-factor-authentication/multi-factor-authentication-get-started-auth-provider) section to create an Azure MFA Authentication provider and associate it with your Azure tenant.
|
||||||
|
|
||||||
|
#### Configure Azure MFA Settings ####
|
||||||
|
Once you have created your Azure MFA authentication provider and associated it with an Azure tenant, you need to configure the multi-factor authentication settings. Review the [Configure Azure Multi-Factor Authentication settings](https://docs.microsoft.com/en-us/azure/multi-factor-authentication/multi-factor-authentication-whats-next) section to configure your settings.
|
||||||
|
|
||||||
|
#### Azure MFA User States ####
|
||||||
|
After you have completed configuring your Azure MFA settings, you want to review configure [User States](https://docs.microsoft.com/en-us/azure/multi-factor-authentication/multi-factor-authentication-get-started-user-states) to understand user states. User states determine how you enable Azure MFA for your users.
|
||||||
|
|
||||||
|
### Azure MFA via ADFS 2016 ###
|
||||||
|
Alternatively, you can configure Windows Server 2016 Active Directory Federation Services (AD FS) to provide additional multi-factor authentication. To configure, read the [Configure AD FS 2016 and Azure MFA](https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/operations/configure-ad-fs-2016-and-azure-mfa) section
|
||||||
|
|
||||||
|
### Section Review
|
||||||
|
|
||||||
|
> [!div class="checklist"]
|
||||||
|
> * Review the overview and uses of Azure Multifactor Authentication.
|
||||||
|
> * Review your Azure Active Directory subscription for Azure Multifactor Authentication.
|
||||||
|
> * Create an Azure Multifactor Authentication Provider, if necessary.
|
||||||
|
> * Configure Azure Multufactor Authentiation features and settings.
|
||||||
|
> * Understand the different User States and their effect on Azure Multifactor Authentication.
|
||||||
|
> * Consider using Azure Multifactor Authentication or a third-party multifactor authentication provider with Windows Server 2016 Active Directory Federation Services, if necessary.
|
||||||
|
|
||||||
|
> [!div class="nextstepaction"]
|
||||||
|
> [Configure Azure Device Registration](hello-hybrid-cert-trust-devreg.md)
|
||||||
|
|
||||||
|
<br><br>
|
||||||
|
|
||||||
|
<hr>
|
||||||
|
|
||||||
|
## Follow the Windows Hello for Business hybrid certificate trust deployment guide
|
||||||
|
1. [Overview](hello-hybrid-cert-trust.md)
|
||||||
|
2. [Prerequistes](hello-hybrid-cert-trust-prereqs.md)
|
||||||
|
3. New Installation Baseline (*You are here*)
|
||||||
|
4. [Configure Azure Device Registration](hello-hybrid-cert-trust-devreg.md)
|
||||||
|
5. [Configure Windows Hello for Business settings](hello-hybrid-cert-whfb-settings.md)
|
||||||
|
6. [Sign-in and Provision](hello-hybrid-cert-whfb-provision.md)
|
@ -0,0 +1,518 @@
|
|||||||
|
---
|
||||||
|
title: Configure Device Registration for Hybrid Windows Hello for Business
|
||||||
|
description: Azure Device Registration for Hybrid Certificate Trust Deployment (Windows Hello for Business)
|
||||||
|
keywords: identity, PIN, biometric, Hello, passport, WHFB, hybrid, cert-trust, device, registration
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security, mobile
|
||||||
|
author: mikestephens-MS
|
||||||
|
ms.author: mstephen
|
||||||
|
localizationpriority: high
|
||||||
|
ms.date: 09/08/2017
|
||||||
|
---
|
||||||
|
# Configure Device Registration for Hybrid Windows Hello for Business
|
||||||
|
|
||||||
|
**Applies to**
|
||||||
|
- Windows 10
|
||||||
|
|
||||||
|
>[!IMPORTANT]
|
||||||
|
>This guide only applies to Hybrid deployments for Windows 10, version 1703 or higher.
|
||||||
|
|
||||||
|
You're environment is federated and you are ready to configure device registration for your hybrid environment. Hybrid Windows Hello for Business deployment needs device registration and device write-back to enable proper device authentication.
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> If your environment is not federated, review the [New Installation baseline](hello-hybrid-cert-new-install.md) section of this deployment document to learn how to federate your environment for your Windows Hello for Business deployment.
|
||||||
|
|
||||||
|
Use this three phased approach for configuring device registration.
|
||||||
|
1. [Configure devices to register in Azure](#configure-azure-for-device-registration)
|
||||||
|
2. [Synchronize devices to on-premises Active Directory](#configure-active-directory-to-support-azure-device-syncrhonization)
|
||||||
|
3. [Configure AD FS to use cloud devices](#configure-ad-fs-to-use-azure-registered-devices)
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> Before proceeding, you should familiarize yourself with device regisration concepts such as:
|
||||||
|
> * Azure AD registered devices
|
||||||
|
> * Azure AD joined devices
|
||||||
|
> * Hybrid Azure AD joined devices
|
||||||
|
>
|
||||||
|
> You can learn about this and more by reading [Introduction to Device Management in Azure Active Directory.](https://docs.microsoft.com/en-us/azure/active-directory/device-management-introduction)
|
||||||
|
|
||||||
|
## Configure Azure for Device Registration
|
||||||
|
Begin configuring device registration to support Hybrid Windows Hello for Business by configuring device registration capabilities in Azure AD.
|
||||||
|
|
||||||
|
To do this, follow the **Configure device settings** steps under [Setting up Azure AD Join in your organization](https://azure.microsoft.com/en-us/documentation/articles/active-directory-azureadjoin-setup/)
|
||||||
|
|
||||||
|
## Configure Active Directory to support Azure device syncrhonization
|
||||||
|
|
||||||
|
Azure Active Directory is now configured for device registration. Next, you need to configure the on-premises Active Directory to support synchronizing hybrid Azure AD joined devices. Begin with upgrading the Active Directory Schema
|
||||||
|
|
||||||
|
### Upgrading Active Directory to the Windows Server 2016 Schema
|
||||||
|
|
||||||
|
To use Windows Hello for Business with Hybrid Azure AD joined devices, you must first upgrade your Active Directory schema to Windows Server 2016.
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> If you already have a Windows Server 2016 domain controller in your forest, you can skip **Upgrading Active Directory to the Windows Server 2016 Schema** (this section).
|
||||||
|
|
||||||
|
#### Identify the schema role domain controller
|
||||||
|
|
||||||
|
To locate the schema master role holder, open and command prompt and type:
|
||||||
|
|
||||||
|
```Netdom query fsmo | findstr -i schema```
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
The command should return the name of the domain controller where you need to adprep.exe. Update the schema locally on the domain controller hosting the Schema master role.
|
||||||
|
|
||||||
|
#### Updating the Schema
|
||||||
|
|
||||||
|
Windows Hello for Business uses asymmetric keys as user credentials (rather than passwords). During enrollment, the public key is registered in an attribute on the user object in Active Directory. The schema update adds this new attribute to Active Directory.
|
||||||
|
|
||||||
|
Manually updating Active Directory uses the command-line utility **adprep.exe** located at **\<drive>:\support\adprep** on the Windows Server 2016 DVD or ISO. Before running adprep.exe, you must identify the domain controller hosting the schema master role.
|
||||||
|
|
||||||
|
Sign-in to the domain controller hosting the schema master operational role using Enterprise Admin equivalent credentials.
|
||||||
|
|
||||||
|
1. Open an elevated command prompt.
|
||||||
|
2. Type ```cd /d x:\support\adprep``` where *x* is the drive letter of the DVD or mounted ISO.
|
||||||
|
3. To update the schema, type ```adprep /forestprep```.
|
||||||
|
4. Read the Adprep Warning. Type the letter **C*** and press **Enter** to update the schema.
|
||||||
|
5. Close the Command Prompt and sign-out.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> If you installed Azure AD Connect prior to upgrading the schema, you will need to re-run the Azure AD Connect installation and refresh the on-premises AD schema to ensure the synchronization rule for msDS-KeyCredentialLink is configured.
|
||||||
|
|
||||||
|
|
||||||
|
### Setup Active Directory Federation Services
|
||||||
|
If you are new to AD FS and federation services, you should review [Understanding Key AD FS Concepts](https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/technical-reference/understanding-key-ad-fs-concepts) to prior to designing and deploying your federation service.
|
||||||
|
Review the [AD FS Design guide](https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/design/ad-fs-design-guide-in-windows-server-2012-r2) to plan your federation service.
|
||||||
|
|
||||||
|
Once you have your AD FS design ready, review [Deploying a Federation Server farm](https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/deployment/deploying-a-federation-server-farm) to configure AD FS in your environment.
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> During your AD FS deployment, skip the **Configure a federation server with Device Registration Service** and the **Configure Corporate DNS for the Federation Service and DRS** procedures.
|
||||||
|
|
||||||
|
The AD FS farm used with Windows Hello for Business must be Windows Server 2016 with minimum update of [KB4034658 (14393.1593)](https://support.microsoft.com/en-us/help/4034658), which is automatically downloaded and installed through Windows Update. If your AD FS farm is not running the AD FS role with updates from Windows Server 2016, then read [Upgrading to AD FS in Windows Server 2016](https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/deployment/upgrading-to-ad-fs-in-windows-server-2016)
|
||||||
|
|
||||||
|
#### ADFS Web Proxy ###
|
||||||
|
Federation server proxies are computers that run AD FS software that have been configured manually to act in the proxy role. You can use federation server proxies in your organization to provide intermediary services between an Internet client and a federation server that is behind a firewall on your corporate network.
|
||||||
|
Use the [Setting of a Federation Proxy](https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/deployment/checklist--setting-up-a-federation-server-proxy) checklist to configure AD FS proxy servers in your environment.
|
||||||
|
|
||||||
|
### Deploy Azure AD Connect
|
||||||
|
Next, you need to synchronizes the on-premises Active Directory with Azure Active Directory. To do this, first review the [Integrating on-prem directories with Azure Active Directory](https://docs.microsoft.com/en-us/azure/active-directory/connect/active-directory-aadconnect) and [hardware and prerequisites](https://docs.microsoft.com/en-us/azure/active-directory/connect/active-directory-aadconnect-prerequisites) needed and then [download the software](http://go.microsoft.com/fwlink/?LinkId=615771).
|
||||||
|
|
||||||
|
When you are ready to install, follow the **Configuring federation with AD FS** section of [Custom installation of Azure AD Connect](https://docs.microsoft.com/en-us/azure/active-directory/connect/active-directory-aadconnect-get-started-custom). Select the **Federation with AD FS** option on the **User sign-in** page. At the **AD FS Farm** page, select the use an existing option and click **Next**.
|
||||||
|
|
||||||
|
### Create AD objects for AD FS Device Authentication
|
||||||
|
If your AD FS farm is not already configured for Device Authentication (you can see this in the AD FS Management console under Service -> Device Registration), use the following steps to create the correct AD DS objects and configuration.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> The below commands require Active Directory administration tools, so if your federation server is not also a domain controller, first install the tools using step 1 below. Otherwise you can skip step 1.
|
||||||
|
|
||||||
|
1. Run the **Add Roles & Features** wizard and select feature **Remote Server Administration Tools** -> **Role Administration Tools** -> **AD DS and AD LDS Tools** -> Choose both the **Active Directory module for Windows PowerShell** and the **AD DS Tools**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
2. On your AD FS primary server, ensure you are logged in as AD DS user with Enterprise Admin (EA ) privileges and open an elevated Windows PowerShell prompt. Then, run the following commands:
|
||||||
|
|
||||||
|
`Import-module activedirectory`
|
||||||
|
`PS C:\> Initialize-ADDeviceRegistration -ServiceAccountName "<your service account>" `
|
||||||
|
3. On the pop-up window click **Yes**.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> If your AD FS service is configured to use a GMSA account, enter the account name in the format "domain\accountname$"
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
The above PSH creates the following objects:
|
||||||
|
|
||||||
|
|
||||||
|
- RegisteredDevices container under the AD domain partition
|
||||||
|
- Device Registration Service container and object under Configuration --> Services --> Device Registration Configuration
|
||||||
|
- Device Registration Service DKM container and object under Configuration --> Services --> Device Registration Configuration
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
4. Once this is done, you will see a successful completion message.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
### Create Service Connection Point (SCP) in Active Directory
|
||||||
|
If you plan to use Windows 10 domain join (with automatic registration to Azure AD) as described here, execute the following commands to create a service connection point in AD DS
|
||||||
|
1. Open Windows PowerShell and execute the following:
|
||||||
|
|
||||||
|
`PS C:>Import-Module -Name "C:\Program Files\Microsoft Azure Active Directory Connect\AdPrep\AdSyncPrep.psm1" `
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> If necessary, copy the AdSyncPrep.psm1 file from your Azure AD Connect server. This file is located in Program Files\Microsoft Azure Active Directory Connect\AdPrep
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
2. Provide your Azure AD global administrator credentials
|
||||||
|
|
||||||
|
`PS C:>$aadAdminCred = Get-Credential`
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
3. Run the following PowerShell command
|
||||||
|
|
||||||
|
`PS C:>Initialize-ADSyncDomainJoinedComputerSync -AdConnectorAccount [AD connector account name] -AzureADCredentials $aadAdminCred `
|
||||||
|
|
||||||
|
Where the [AD connector account name] is the name of the account you configured in Azure AD Connect when adding your on-premises AD DS directory.
|
||||||
|
|
||||||
|
The above commands enable Windows 10 clients to find the correct Azure AD domain to join by creating the serviceConnectionpoint object in AD DS.
|
||||||
|
|
||||||
|
### Prepare AD for Device Write Back
|
||||||
|
To ensure AD DS objects and containers are in the correct state for write back of devices from Azure AD, do the following.
|
||||||
|
|
||||||
|
1. Open Windows PowerShell and execute the following:
|
||||||
|
|
||||||
|
`PS C:>Initialize-ADSyncDeviceWriteBack -DomainName <AD DS domain name> -AdConnectorAccount [AD connector account name] `
|
||||||
|
|
||||||
|
Where the [AD connector account name] is the name of the account you configured in Azure AD Connect when adding your on-premises AD DS directory in domain\accountname format
|
||||||
|
|
||||||
|
The above command creates the following objects for device write back to AD DS, if they do not exist already, and allows access to the specified AD connector account name
|
||||||
|
|
||||||
|
- RegisteredDevices container in the AD domain partition
|
||||||
|
- Device Registration Service container and object under Configuration --> Services --> Device Registration Configuration
|
||||||
|
|
||||||
|
### Enable Device Write Back in Azure AD Connect
|
||||||
|
If you have not done so before, enable device write back in Azure AD Connect by running the wizard a second time and selecting **"Customize Synchronization Options"**, then checking the box for device write back and selecting the forest in which you have run the above cmdlets
|
||||||
|
|
||||||
|
## Configure AD FS to use Azure registered devices
|
||||||
|
|
||||||
|
### Configure issuance of claims
|
||||||
|
|
||||||
|
In a federated Azure AD configuration, devices rely on Active Directory Federation Services (AD FS) or a 3rd party on-premises federation service to authenticate to Azure AD. Devices authenticate to get an access token to register against the Azure Active Directory Device Registration Service (Azure DRS).
|
||||||
|
|
||||||
|
Windows current devices authenticate using Integrated Windows Authentication to an active WS-Trust endpoint (either 1.3 or 2005 versions) hosted by the on-premises federation service.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> When using AD FS, either **adfs/services/trust/13/windowstransport** or **adfs/services/trust/2005/windowstransport** must be enabled. If you are using the Web Authentication Proxy, also ensure that this endpoint is published through the proxy. You can see what end-points are enabled through the AD FS management console under **Service > Endpoints**.
|
||||||
|
>
|
||||||
|
> If you don't have AD FS as your on-premises federation service, follow the instructions of your vendor to make sure they support WS-Trust 1.3 or 2005 end-points and that these are published through the Metadata Exchange file (MEX).
|
||||||
|
|
||||||
|
The following claims must exist in the token received by Azure DRS for device registration to complete. Azure DRS will create a device object in Azure AD with some of this information which is then used by Azure AD Connect to associate the newly created device object with the computer account on-premises.
|
||||||
|
|
||||||
|
* `http://schemas.microsoft.com/ws/2012/01/accounttype`
|
||||||
|
* `http://schemas.microsoft.com/identity/claims/onpremobjectguid`
|
||||||
|
* `http://schemas.microsoft.com/ws/2008/06/identity/claims/primarysid`
|
||||||
|
|
||||||
|
If you have more than one verified domain name, you need to provide the following claim for computers:
|
||||||
|
|
||||||
|
* `http://schemas.microsoft.com/ws/2008/06/identity/claims/issuerid`
|
||||||
|
|
||||||
|
If you are already issuing an ImmutableID claim (e.g., alternate login ID) you need to provide one corresponding claim for computers:
|
||||||
|
|
||||||
|
* `http://schemas.microsoft.com/LiveID/Federation/2008/05/ImmutableID`
|
||||||
|
|
||||||
|
In the following sections, you find information about:
|
||||||
|
|
||||||
|
- The values each claim should have
|
||||||
|
- How a definition would look like in AD FS
|
||||||
|
|
||||||
|
The definition helps you to verify whether the values are present or if you need to create them.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> If you don't use AD FS for your on-premises federation server, follow your vendor's instructions to create the appropriate configuration to issue these claims.
|
||||||
|
|
||||||
|
#### Issue account type claim
|
||||||
|
|
||||||
|
**`http://schemas.microsoft.com/ws/2012/01/accounttype`** - This claim must contain a value of **DJ**, which identifies the device as a domain-joined computer. In AD FS, you can add an issuance transform rule that looks like this:
|
||||||
|
|
||||||
|
@RuleName = "Issue account type for domain-joined computers"
|
||||||
|
c:[
|
||||||
|
Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid",
|
||||||
|
Value =~ "-515$",
|
||||||
|
Issuer =~ "^(AD AUTHORITY|SELF AUTHORITY|LOCAL AUTHORITY)$"
|
||||||
|
]
|
||||||
|
=> issue(
|
||||||
|
Type = "http://schemas.microsoft.com/ws/2012/01/accounttype",
|
||||||
|
Value = "DJ"
|
||||||
|
);
|
||||||
|
|
||||||
|
#### Issue objectGUID of the computer account on-premises
|
||||||
|
|
||||||
|
**`http://schemas.microsoft.com/identity/claims/onpremobjectguid`** - This claim must contain the **objectGUID** value of the on-premises computer account. In AD FS, you can add an issuance transform rule that looks like this:
|
||||||
|
|
||||||
|
@RuleName = "Issue object GUID for domain-joined computers"
|
||||||
|
c1:[
|
||||||
|
Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid",
|
||||||
|
Value =~ "-515$",
|
||||||
|
Issuer =~ "^(AD AUTHORITY|SELF AUTHORITY|LOCAL AUTHORITY)$"
|
||||||
|
]
|
||||||
|
&&
|
||||||
|
c2:[
|
||||||
|
Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname",
|
||||||
|
Issuer =~ "^(AD AUTHORITY|SELF AUTHORITY|LOCAL AUTHORITY)$"
|
||||||
|
]
|
||||||
|
=> issue(
|
||||||
|
store = "Active Directory",
|
||||||
|
types = ("http://schemas.microsoft.com/identity/claims/onpremobjectguid"),
|
||||||
|
query = ";objectguid;{0}",
|
||||||
|
param = c2.Value
|
||||||
|
);
|
||||||
|
|
||||||
|
#### Issue objectSID of the computer account on-premises
|
||||||
|
|
||||||
|
**`http://schemas.microsoft.com/ws/2008/06/identity/claims/primarysid`** - This claim must contain the the **objectSid** value of the on-premises computer account. In AD FS, you can add an issuance transform rule that looks like this:
|
||||||
|
|
||||||
|
@RuleName = "Issue objectSID for domain-joined computers"
|
||||||
|
c1:[
|
||||||
|
Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid",
|
||||||
|
Value =~ "-515$",
|
||||||
|
Issuer =~ "^(AD AUTHORITY|SELF AUTHORITY|LOCAL AUTHORITY)$"
|
||||||
|
]
|
||||||
|
&&
|
||||||
|
c2:[
|
||||||
|
Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/primarysid",
|
||||||
|
Issuer =~ "^(AD AUTHORITY|SELF AUTHORITY|LOCAL AUTHORITY)$"
|
||||||
|
]
|
||||||
|
=> issue(claim = c2);
|
||||||
|
|
||||||
|
#### Issue issuerID for computer when multiple verified domain names in Azure AD
|
||||||
|
|
||||||
|
**`http://schemas.microsoft.com/ws/2008/06/identity/claims/issuerid`** - This claim must contain the Uniform Resource Identifier (URI) of any of the verified domain names that connect with the on-premises federation service (AD FS or 3rd party) issuing the token. In AD FS, you can add issuance transform rules that look like the ones below in that specific order after the ones above. Please note that one rule to explicitly issue the rule for users is necessary. In the rules below, a first rule identifying user vs. computer authentication is added.
|
||||||
|
|
||||||
|
@RuleName = "Issue account type with the value User when its not a computer"
|
||||||
|
NOT EXISTS(
|
||||||
|
[
|
||||||
|
Type == "http://schemas.microsoft.com/ws/2012/01/accounttype",
|
||||||
|
Value == "DJ"
|
||||||
|
]
|
||||||
|
)
|
||||||
|
=> add(
|
||||||
|
Type = "http://schemas.microsoft.com/ws/2012/01/accounttype",
|
||||||
|
Value = "User"
|
||||||
|
);
|
||||||
|
|
||||||
|
@RuleName = "Capture UPN when AccountType is User and issue the IssuerID"
|
||||||
|
c1:[
|
||||||
|
Type == "http://schemas.xmlsoap.org/claims/UPN"
|
||||||
|
]
|
||||||
|
&&
|
||||||
|
c2:[
|
||||||
|
Type == "http://schemas.microsoft.com/ws/2012/01/accounttype",
|
||||||
|
Value == "User"
|
||||||
|
]
|
||||||
|
=> issue(
|
||||||
|
Type = "http://schemas.microsoft.com/ws/2008/06/identity/claims/issuerid",
|
||||||
|
Value = regexreplace(
|
||||||
|
c1.Value,
|
||||||
|
".+@(?<domain>.+)",
|
||||||
|
"http://${domain}/adfs/services/trust/"
|
||||||
|
)
|
||||||
|
);
|
||||||
|
|
||||||
|
@RuleName = "Issue issuerID for domain-joined computers"
|
||||||
|
c:[
|
||||||
|
Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid",
|
||||||
|
Value =~ "-515$",
|
||||||
|
Issuer =~ "^(AD AUTHORITY|SELF AUTHORITY|LOCAL AUTHORITY)$"
|
||||||
|
]
|
||||||
|
=> issue(
|
||||||
|
Type = "http://schemas.microsoft.com/ws/2008/06/identity/claims/issuerid",
|
||||||
|
Value = "http://<verified-domain-name>/adfs/services/trust/"
|
||||||
|
);
|
||||||
|
|
||||||
|
|
||||||
|
In the claim above,
|
||||||
|
|
||||||
|
- `$<domain>` is the AD FS service URL
|
||||||
|
- `<verified-domain-name>` is a placeholder you need to replace with one of your verified domain names in Azure AD
|
||||||
|
|
||||||
|
For more details about verified domain names, see [Add a custom domain name to Azure Active Directory](https://docs.microsoft.com/en-us/azure/active-directory/active-directory-add-domain).
|
||||||
|
To get a list of your verified company domains, you can use the [Get-MsolDomain](https://docs.microsoft.com/en-us/powershell/module/msonline/get-msoldomain?view=azureadps-1.0) cmdlet.
|
||||||
|
|
||||||
|
#### Issue ImmutableID for computer when one for users exist (e.g. alternate login ID is set)
|
||||||
|
|
||||||
|
**`http://schemas.microsoft.com/LiveID/Federation/2008/05/ImmutableID`** - This claim must contain a valid value for computers. In AD FS, you can create an issuance transform rule as follows:
|
||||||
|
|
||||||
|
@RuleName = "Issue ImmutableID for computers"
|
||||||
|
c1:[
|
||||||
|
Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid",
|
||||||
|
Value =~ "-515$",
|
||||||
|
Issuer =~ "^(AD AUTHORITY|SELF AUTHORITY|LOCAL AUTHORITY)$"
|
||||||
|
]
|
||||||
|
&&
|
||||||
|
c2:[
|
||||||
|
Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname",
|
||||||
|
Issuer =~ "^(AD AUTHORITY|SELF AUTHORITY|LOCAL AUTHORITY)$"
|
||||||
|
]
|
||||||
|
=> issue(
|
||||||
|
store = "Active Directory",
|
||||||
|
types = ("http://schemas.microsoft.com/LiveID/Federation/2008/05/ImmutableID"),
|
||||||
|
query = ";objectguid;{0}",
|
||||||
|
param = c2.Value
|
||||||
|
);
|
||||||
|
|
||||||
|
#### Helper script to create the AD FS issuance transform rules
|
||||||
|
|
||||||
|
The following script helps you with the creation of the issuance transform rules described above.
|
||||||
|
|
||||||
|
$multipleVerifiedDomainNames = $false
|
||||||
|
$immutableIDAlreadyIssuedforUsers = $false
|
||||||
|
$oneOfVerifiedDomainNames = 'example.com' # Replace example.com with one of your verified domains
|
||||||
|
|
||||||
|
$rule1 = '@RuleName = "Issue account type for domain-joined computers"
|
||||||
|
c:[
|
||||||
|
Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid",
|
||||||
|
Value =~ "-515$",
|
||||||
|
Issuer =~ "^(AD AUTHORITY|SELF AUTHORITY|LOCAL AUTHORITY)$"
|
||||||
|
]
|
||||||
|
=> issue(
|
||||||
|
Type = "http://schemas.microsoft.com/ws/2012/01/accounttype",
|
||||||
|
Value = "DJ"
|
||||||
|
);'
|
||||||
|
|
||||||
|
$rule2 = '@RuleName = "Issue object GUID for domain-joined computers"
|
||||||
|
c1:[
|
||||||
|
Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid",
|
||||||
|
Value =~ "-515$",
|
||||||
|
Issuer =~ "^(AD AUTHORITY|SELF AUTHORITY|LOCAL AUTHORITY)$"
|
||||||
|
]
|
||||||
|
&&
|
||||||
|
c2:[
|
||||||
|
Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname",
|
||||||
|
Issuer =~ "^(AD AUTHORITY|SELF AUTHORITY|LOCAL AUTHORITY)$"
|
||||||
|
]
|
||||||
|
=> issue(
|
||||||
|
store = "Active Directory",
|
||||||
|
types = ("http://schemas.microsoft.com/identity/claims/onpremobjectguid"),
|
||||||
|
query = ";objectguid;{0}",
|
||||||
|
param = c2.Value
|
||||||
|
);'
|
||||||
|
|
||||||
|
$rule3 = '@RuleName = "Issue objectSID for domain-joined computers"
|
||||||
|
c1:[
|
||||||
|
Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid",
|
||||||
|
Value =~ "-515$",
|
||||||
|
Issuer =~ "^(AD AUTHORITY|SELF AUTHORITY|LOCAL AUTHORITY)$"
|
||||||
|
]
|
||||||
|
&&
|
||||||
|
c2:[
|
||||||
|
Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/primarysid",
|
||||||
|
Issuer =~ "^(AD AUTHORITY|SELF AUTHORITY|LOCAL AUTHORITY)$"
|
||||||
|
]
|
||||||
|
=> issue(claim = c2);'
|
||||||
|
|
||||||
|
$rule4 = ''
|
||||||
|
if ($multipleVerifiedDomainNames -eq $true) {
|
||||||
|
$rule4 = '@RuleName = "Issue account type with the value User when it is not a computer"
|
||||||
|
NOT EXISTS(
|
||||||
|
[
|
||||||
|
Type == "http://schemas.microsoft.com/ws/2012/01/accounttype",
|
||||||
|
Value == "DJ"
|
||||||
|
]
|
||||||
|
)
|
||||||
|
=> add(
|
||||||
|
Type = "http://schemas.microsoft.com/ws/2012/01/accounttype",
|
||||||
|
Value = "User"
|
||||||
|
);
|
||||||
|
|
||||||
|
@RuleName = "Capture UPN when AccountType is User and issue the IssuerID"
|
||||||
|
c1:[
|
||||||
|
Type == "http://schemas.xmlsoap.org/claims/UPN"
|
||||||
|
]
|
||||||
|
&&
|
||||||
|
c2:[
|
||||||
|
Type == "http://schemas.microsoft.com/ws/2012/01/accounttype",
|
||||||
|
Value == "User"
|
||||||
|
]
|
||||||
|
=> issue(
|
||||||
|
Type = "http://schemas.microsoft.com/ws/2008/06/identity/claims/issuerid",
|
||||||
|
Value = regexreplace(
|
||||||
|
c1.Value,
|
||||||
|
".+@(?<domain>.+)",
|
||||||
|
"http://${domain}/adfs/services/trust/"
|
||||||
|
)
|
||||||
|
);
|
||||||
|
|
||||||
|
@RuleName = "Issue issuerID for domain-joined computers"
|
||||||
|
c:[
|
||||||
|
Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid",
|
||||||
|
Value =~ "-515$",
|
||||||
|
Issuer =~ "^(AD AUTHORITY|SELF AUTHORITY|LOCAL AUTHORITY)$"
|
||||||
|
]
|
||||||
|
=> issue(
|
||||||
|
Type = "http://schemas.microsoft.com/ws/2008/06/identity/claims/issuerid",
|
||||||
|
Value = "http://' + $oneOfVerifiedDomainNames + '/adfs/services/trust/"
|
||||||
|
);'
|
||||||
|
}
|
||||||
|
|
||||||
|
$rule5 = ''
|
||||||
|
if ($immutableIDAlreadyIssuedforUsers -eq $true) {
|
||||||
|
$rule5 = '@RuleName = "Issue ImmutableID for computers"
|
||||||
|
c1:[
|
||||||
|
Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid",
|
||||||
|
Value =~ "-515$",
|
||||||
|
Issuer =~ "^(AD AUTHORITY|SELF AUTHORITY|LOCAL AUTHORITY)$"
|
||||||
|
]
|
||||||
|
&&
|
||||||
|
c2:[
|
||||||
|
Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname",
|
||||||
|
Issuer =~ "^(AD AUTHORITY|SELF AUTHORITY|LOCAL AUTHORITY)$"
|
||||||
|
]
|
||||||
|
=> issue(
|
||||||
|
store = "Active Directory",
|
||||||
|
types = ("http://schemas.microsoft.com/LiveID/Federation/2008/05/ImmutableID"),
|
||||||
|
query = ";objectguid;{0}",
|
||||||
|
param = c2.Value
|
||||||
|
);'
|
||||||
|
}
|
||||||
|
|
||||||
|
$existingRules = (Get-ADFSRelyingPartyTrust -Identifier urn:federation:MicrosoftOnline).IssuanceTransformRules
|
||||||
|
|
||||||
|
$updatedRules = $existingRules + $rule1 + $rule2 + $rule3 + $rule4 + $rule5
|
||||||
|
|
||||||
|
$crSet = New-ADFSClaimRuleSet -ClaimRule $updatedRules
|
||||||
|
|
||||||
|
Set-AdfsRelyingPartyTrust -TargetIdentifier urn:federation:MicrosoftOnline -IssuanceTransformRules $crSet.ClaimRulesString
|
||||||
|
|
||||||
|
#### Remarks
|
||||||
|
|
||||||
|
- This script appends the rules to the existing rules. Do not run the script twice because the set of rules would be added twice. Make sure that no corresponding rules exist for these claims (under the corresponding conditions) before running the script again.
|
||||||
|
|
||||||
|
- If you have multiple verified domain names (as shown in the Azure AD portal or via the Get-MsolDomains cmdlet), set the value of **$multipleVerifiedDomainNames** in the script to **$true**. Also make sure that you remove any existing issuerid claim that might have been created by Azure AD Connect or via other means. Here is an example for this rule:
|
||||||
|
|
||||||
|
|
||||||
|
c:[Type == "http://schemas.xmlsoap.org/claims/UPN"]
|
||||||
|
=> issue(Type = "http://schemas.microsoft.com/ws/2008/06/identity/claims/issuerid", Value = regexreplace(c.Value, ".+@(?<domain>.+)", "http://${domain}/adfs/services/trust/"));
|
||||||
|
|
||||||
|
- If you have already issued an **ImmutableID** claim for user accounts, set the value of **$immutableIDAlreadyIssuedforUsers** in the script to **$true**.
|
||||||
|
|
||||||
|
#### Configure Device Authentication in AD FS
|
||||||
|
Using an elevated PowerShell command window, configure AD FS policy by executing the following command
|
||||||
|
|
||||||
|
`PS C:>Set-AdfsGlobalAuthenticationPolicy -DeviceAuthenticationEnabled $true -DeviceAuthenticationMethod All`
|
||||||
|
|
||||||
|
#### Check your configuration
|
||||||
|
For your reference, below is a comprehensive list of the AD DS devices, containers and permissions required for device write-back and authentication to work
|
||||||
|
|
||||||
|
- object of type ms-DS-DeviceContainer at CN=RegisteredDevices,DC=<domain>
|
||||||
|
- read access to the AD FS service account
|
||||||
|
- read/write access to the Azure AD Connect sync AD connector account
|
||||||
|
- Container CN=Device Registration Configuration,CN=Services,CN=Configuration,DC=<domain>
|
||||||
|
- Container Device Registration Service DKM under the above container
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
- object of type serviceConnectionpoint at CN=<guid>, CN=Device Registration
|
||||||
|
- Configuration,CN=Services,CN=Configuration,DC=<domain>
|
||||||
|
- read/write access to the specified AD connector account name on the new object
|
||||||
|
- object of type msDS-DeviceRegistrationServiceContainer at CN=Device Registration Services,CN=Device Registration Configuration,CN=Services,CN=Configuration,DC=<domain>
|
||||||
|
- object of type msDS-DeviceRegistrationService in the above container
|
||||||
|
|
||||||
|
>[!div class="nextstepaction"]
|
||||||
|
[Configure Windows Hello for Business settings](hello-hybrid-cert-whfb-settings.md)
|
||||||
|
|
||||||
|
<br><br>
|
||||||
|
|
||||||
|
<hr>
|
||||||
|
|
||||||
|
## Follow the Windows Hello for Business hybrid certificate trust deployment guide
|
||||||
|
1. [Overview](hello-hybrid-cert-trust.md)
|
||||||
|
2. [Prerequistes](hello-hybrid-cert-trust-prereqs.md)
|
||||||
|
3. [New Installation Baseline](hello-hybrid-cert-new-install.md)
|
||||||
|
4. Configure Azure Device Registration (*You are here*)
|
||||||
|
5. [Configure Windows Hello for Business settings](hello-hybrid-cert-whfb-settings.md)
|
||||||
|
6. [Sign-in and Provision](hello-hybrid-cert-whfb-provision.md)
|
@ -0,0 +1,139 @@
|
|||||||
|
---
|
||||||
|
title: Hybrid Windows Hello for Business Prerequistes (Windows Hello for Business)
|
||||||
|
description: Prerequisites for Hybrid Windows Hello for Business Deployments
|
||||||
|
keywords: identity, PIN, biometric, Hello, passport, WHFB, hybrid, certificate-trust
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security, mobile
|
||||||
|
author: mikestephens-MS
|
||||||
|
ms.author: mstephen
|
||||||
|
localizationpriority: high
|
||||||
|
ms.date: 09/08/2017
|
||||||
|
---
|
||||||
|
# Hybrid Windows Hello for Business Prerequisites
|
||||||
|
|
||||||
|
**Applies to**
|
||||||
|
- Windows 10
|
||||||
|
|
||||||
|
|
||||||
|
>This guide only applies to Hybrid deployments for Windows 10, version 1703 or higher.
|
||||||
|
|
||||||
|
Hybrid environments are distributed systems that enable organizations to use on-premises and Azure-based identities and resources. Windows Hello for Business uses the existing distributed system as a foundation on which organizations can provide two-factor authentication that provides a single sign-in like experience to modern resources.
|
||||||
|
|
||||||
|
The distributed systems on which these technologies were built involved several pieces of on-premises and cloud infrastructure. High-level pieces of the infrastructure include:
|
||||||
|
* [Directories](#directories)
|
||||||
|
* [Public Key Infrastucture](#public-key-infastructure)
|
||||||
|
* [Directory Synchronization](#directory-synchronization)
|
||||||
|
* [Federation](#federation)
|
||||||
|
* [MultiFactor Authetication](#multifactor-authentication)
|
||||||
|
* [Device Registration](#device-registration)
|
||||||
|
|
||||||
|
## Directories ##
|
||||||
|
Hybrid Windows Hello for Business needs two directories: on-premises Active Directory and a cloud Azure Active Directory. The minimum required domain controller, domain functional level, and forest functional level for Windows Hello for Business deployment is Windows Server 2008 R2.
|
||||||
|
|
||||||
|
A hybrid Windows Hello for Busines deployment needs an Azure Active Directory subscription. Different deployment configurations are supported by different Azure subscriptions. The hybrid-certificate trust deployment needs an Azure Active Directory premium subscription because it uses the device write-back synchronization feature. Other deployments, such as the hybrid key-trust deployment, may not require Azure Active Directory premium subscription.
|
||||||
|
|
||||||
|
Windows Hello for Business can be deployed in any environment with Windows Server 2008 R2 or later domain controllers. Azure device registration and Windows Hello for Business require the Windows Server 2016 Active Directory schema.
|
||||||
|
|
||||||
|
Review these requirements and those from the Windows Hello for Business planning guide and worksheet. Based on your deployment decisions you may need to upgrade your on-premises Active Directory or your Azure Active Directory subscription to meet your needs.
|
||||||
|
|
||||||
|
### Section Review ###
|
||||||
|
|
||||||
|
> [!div class="checklist"]
|
||||||
|
> * Active Directory Domain Functional Level
|
||||||
|
> * Active Directory Forest Functional Level
|
||||||
|
> * Domain Controller version
|
||||||
|
> * Windows Server 2016 Schema
|
||||||
|
> * Azure Active Directory subscription
|
||||||
|
> * Correct subscription for desired features and outcomes
|
||||||
|
|
||||||
|
<br>
|
||||||
|
|
||||||
|
## Public Key Infrastructure ##
|
||||||
|
The Windows Hello for Business deployment depends on an enterprise public key infrastructure as trust anchor for authentication. Domain controllers for hybrid deployments need a certificate in order for Windows 10 devices to trust the domain controller.
|
||||||
|
|
||||||
|
Certificate trust deployments need an enterprise public key infrastructure and a certificate registration authority to issue authentication certificates to users. When using Group Policy, hybrid certificate trust deployment use the Windows Server 2016 Active Directory Federation Server (AS FS) as a certificate registration authority.
|
||||||
|
|
||||||
|
The minimum required enterprise certificate authority that can be used with Windows Hello for Business is Windows Server 2012.
|
||||||
|
|
||||||
|
### Section Review
|
||||||
|
> [!div class="checklist"]
|
||||||
|
> * Windows Server 2012 Issuing Certificate Authority
|
||||||
|
> * Windows Server 2016 Active Directory Federation Services
|
||||||
|
|
||||||
|
<br>
|
||||||
|
|
||||||
|
## Directory Synchronization ##
|
||||||
|
The two directories used in hybrid deployments must be synchronized. You need Azure Active Directory Connect to synchronize user accounts in the on-premises Active Directory with Azure Active Directory.
|
||||||
|
|
||||||
|
Organizations using older directory synchronization technology, such as DirSync or Azure AD sync need to upgrade to Azure AD Connect
|
||||||
|
|
||||||
|
### Section Review
|
||||||
|
> [!div class="checklist"]
|
||||||
|
> * Azure Active Directory Connect directory synchronization
|
||||||
|
> * [Upgrade from DirSync](https://docs.microsoft.com/en-us/azure/active-directory/connect/active-directory-aadconnect-dirsync-upgrade-get-started)
|
||||||
|
> * [Upgrade from Azure AD Sync](https://docs.microsoft.com/en-us/azure/active-directory/connect/active-directory-aadconnect-upgrade-previous-version)
|
||||||
|
|
||||||
|
<br>
|
||||||
|
|
||||||
|
## Federation ##
|
||||||
|
Federating your on-premises Active Directory with Azure Active Directory ensures all identities have access to all resources regardless if they reside in cloud or on-premises. Windows Hello for Business hybrid certificate trust needs Windows Server 2016 Active Directory Federation Services. All nodes in the AD FS farm must run the same version of AD FS. Additionally, you need to configure your AD FS farm to support Azure registered devices.
|
||||||
|
|
||||||
|
The AD FS farm used with Windows Hello for Business must be Windows Server 2016 with minimum update of [KB4034658 (14393.1593)](https://support.microsoft.com/en-us/help/4034658), which is automatically downloaded and installed through Windows Update. If your AD FS farm is not running the AD FS role with updates from Windows Server 2016, then read [Upgrading to AD FS in Windows Server 2016](https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/deployment/upgrading-to-ad-fs-in-windows-server-2016)
|
||||||
|
|
||||||
|
### Section Review ###
|
||||||
|
> [!div class="checklist"]
|
||||||
|
> * Windows Server 2016 Active Directory Federation Services
|
||||||
|
> * Minimum update of [KB4034658 (14393.1593)](https://support.microsoft.com/en-us/help/4034658)
|
||||||
|
|
||||||
|
<br>
|
||||||
|
|
||||||
|
## Multifactor Authentication ##
|
||||||
|
Windows Hello for Business is a strong, two-factor credential the helps organizations reduce their dependency on passwords. The provisioning process lets a user enroll in Windows Hello for Business using their username and password as one factor. but needs a second factor of authentication.
|
||||||
|
|
||||||
|
Hybrid Windows Hello for Business deployments can use Azure’s Multifactor Authentication service or they can use multifactor authentication provides by Windows Server 2016 Active Directory Federation Services, which includes an adapter model that enables third parties to integrate their multifactor authentication into AD FS.
|
||||||
|
|
||||||
|
### Section Review
|
||||||
|
> [!div class="checklist"]
|
||||||
|
> * Azure MFA Service
|
||||||
|
> * Windows Server 2016 AD FS and Azure
|
||||||
|
> * Windows Server 2016 AD FS and third party MFA Adapter
|
||||||
|
|
||||||
|
<br>
|
||||||
|
|
||||||
|
## Device Registration ##
|
||||||
|
Organizations wanting to deploy hybrid certificate trust need thier domain joined devices to register to Azure Active Directory. Just as a computer has an identity in Active Directory, that same computer has an identity in the cloud. This ensures that only approved computers are used with that Azure Active Directory. Each computer registers its identity in Azure Active Directory.
|
||||||
|
|
||||||
|
Hybrid certificate trust deployments need the device write back feature. Authentication to the Windows Server 2016 Active Directory Federation Services needs both the user and the computer to authenticate. Typically the users are synchronized, but not devices. This prevents AD FS from authenticating the computer and results in Windows Hello for Business certificate enrollment failures. For this reason, Windows Hello for Business deployments need device writeback, which is an Azure Active Directory premium feature.
|
||||||
|
|
||||||
|
### Section Checklist ###
|
||||||
|
> [!div class="checklist"]
|
||||||
|
> * Azure Active Directory Device writeback
|
||||||
|
> * Azure Active Directory Premium subscription
|
||||||
|
|
||||||
|
<br>
|
||||||
|
|
||||||
|
### Next Steps ###
|
||||||
|
Follow the Windows Hello for Business hybrid certificate trust deployment guide. For proof-of-concepts, labs, and new installations, choose the **New Installation Basline**.
|
||||||
|
|
||||||
|
If your environment is already federated, but does not include Azure device registration, choose **Configure Azure Device Registration**.
|
||||||
|
|
||||||
|
If your environment is already federated and supports Azure device registration, choose **Configure Windows Hello for Business settings**.
|
||||||
|
|
||||||
|
> [!div class="op_single_selector"]
|
||||||
|
> - [New Installation Baseline](hello-hybrid-cert-new-install.md)
|
||||||
|
> - [Configure Azure Device Registration](hello-hybrid-cert-trust-devreg.md)
|
||||||
|
> - [Configure Windows Hello for Business settings](hello-hybrid-cert-whfb-settings.md)
|
||||||
|
|
||||||
|
<br><br>
|
||||||
|
|
||||||
|
<hr>
|
||||||
|
|
||||||
|
## Follow the Windows Hello for Business hybrid certificate trust deployment guide
|
||||||
|
1. [Overview](hello-hybrid-cert-trust.md)
|
||||||
|
2. Prerequistes (*You are here*)
|
||||||
|
3. [New Installation Baseline](hello-hybrid-cert-new-install.md)
|
||||||
|
4. [Configure Azure Device Registration](hello-hybrid-cert-trust-devreg.md)
|
||||||
|
5. [Configure Windows Hello for Business settings](hello-hybrid-cert-whfb-settings.md)
|
||||||
|
6. [Sign-in and Provision](hello-hybrid-cert-whfb-provision.md)
|
@ -0,0 +1,51 @@
|
|||||||
|
---
|
||||||
|
title: Hybrid Certificate Trust Deployment (Windows Hello for Business)
|
||||||
|
description: Hybrid Certificate Trust Deployment Overview
|
||||||
|
keywords: identity, PIN, biometric, Hello, passport, WHFB, hybrid, cert-trust
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security, mobile
|
||||||
|
author: mikestephens-MS
|
||||||
|
ms.author: mstephen
|
||||||
|
localizationpriority: high
|
||||||
|
ms.date: 09/08/2017
|
||||||
|
---
|
||||||
|
# Hybrid Azure AD joined Certificate Trust Deployment
|
||||||
|
|
||||||
|
**Applies to**
|
||||||
|
- Windows 10
|
||||||
|
|
||||||
|
>This guide only applies to Hybrid deployments for Windows 10, version 1703 or higher.
|
||||||
|
|
||||||
|
|
||||||
|
Windows Hello for Business replaces username and password sign-in to Windows with strong user authentication based on asymmetric key pair. The following deployment guide provides the information needed to successfully deploy Windows Hello for Business in a hybrid certificate trust scenario.
|
||||||
|
|
||||||
|
It is recommended that you review the Windows Hello for Business planning guide prior to using the deployment guide. The planning guide helps you make decisions by explaining the available options with each aspect of the deployment and explains the potential outcomes based on each of these decisions. You can review the [planning guide](https://docs.microsoft.com/en-us/windows/access-protection/hello-for-business/hello-planning-guide) and download the [planning worksheet](https://go.microsoft.com/fwlink/?linkid=852514).
|
||||||
|
|
||||||
|
This deployment guide provides guidance for new deployments and customers who are already federated with Office 365. These two scenarios provide a baseline from which you can begin your deployment.
|
||||||
|
|
||||||
|
## New Deployment Baseline ##
|
||||||
|
The new deployment baseline helps organizations who are moving to Azure and Office 365 to include Windows Hello for Business as part of their deployments. This baseline is good for organizations who are looking to deploy proof of concepts as well as IT professionals who want to familiarize themselves Windows Hello for Business by deploying a lab environment.
|
||||||
|
|
||||||
|
This baseline provides detailed procedures to move your environment from an on-premises only environment to a hybrid environment using Windows Hello for Business to authenticate to Azure Active Directory and to your on-premises Active Directory using a single Windows sign-in.
|
||||||
|
|
||||||
|
## Federated Baseline ##
|
||||||
|
The federated baseline helps organizations that have completed their federation with Azure Active Directory and Office 365 and enables them to introduce Windows Hello for Business into their hybrid environment. This baseline exclusively focuses on the procedures needed to add Azure Device Registration and Windows Hello for Business to an existing hybrid deployment.
|
||||||
|
|
||||||
|
Regardless of the baseline you choose, you’re next step is to familiarize yourself with the prerequisites needed for the deployment. Many of the prerequisites will be new for organizations and individuals pursuing the new deployment baseline. Organizations and individuals starting from the federated baseline will likely be familiar with most of the prerequisites, but should validate they are using the proper versions that include the latest updates.
|
||||||
|
|
||||||
|
> [!div class="nextstepaction"]
|
||||||
|
> [Prerequistes](hello-hybrid-cert-trust-prereqs.md)
|
||||||
|
|
||||||
|
<br><br>
|
||||||
|
|
||||||
|
<hr>
|
||||||
|
|
||||||
|
## Follow the Windows Hello for Business hybrid certificate trust deployment guide
|
||||||
|
1. Overview (*You are here*)
|
||||||
|
2. [Prerequistes](hello-hybrid-cert-trust-prereqs.md)
|
||||||
|
3. [New Installation Baseline](hello-hybrid-cert-new-install.md)
|
||||||
|
4. [Device Registration](hello-hybrid-cert-trust-devreg.md)
|
||||||
|
5. [Configure Windows Hello for Business settings](hello-hybrid-cert-whfb-settings.md)
|
||||||
|
6. [Sign-in and Provision](hello-hybrid-cert-whfb-provision.md)
|
@ -0,0 +1,75 @@
|
|||||||
|
---
|
||||||
|
title: Hybrid Windows Hello for Business Provisioning (Windows Hello for Business)
|
||||||
|
description: Provisioning for Hybrid Windows Hello for Business Deployments
|
||||||
|
keywords: identity, PIN, biometric, Hello, passport, WHFB, hybrid, certificate-trust
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security, mobile
|
||||||
|
author: mikestephens-MS
|
||||||
|
ms.author: mstephen
|
||||||
|
localizationpriority: high
|
||||||
|
ms.date: 09/08/2017
|
||||||
|
---
|
||||||
|
# Hybrid Windows Hello for Business Provisioning
|
||||||
|
|
||||||
|
**Applies to**
|
||||||
|
- Windows 10
|
||||||
|
|
||||||
|
|
||||||
|
>This guide only applies to Hybrid deployments for Windows 10, version 1703 or higher.
|
||||||
|
|
||||||
|
## Provisioning
|
||||||
|
The Windows Hello for Business provisioning begins immediately after the user has signed in, after the user profile is loaded, but before the user receives their desktop. Windows only launches the provisioning experience if all the prerequisite checks pass. You can determine the status of the prerequisite checks by viewing the **User Device Registration** in the **Event Viewer** under **Applications and Services Logs\Microsoft\Windows**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
The first thing to validate is the computer has processed device registration. You can view this from the User device registration logs where the check **Device is AAD joined (AADJ or DJ++): Yes** appears. Additionally, you can validate this using the **dsregcmd /status** command from a console prompt where the value for **EnterpriseJoined** reads **Yes**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
|
||||||
|
Windows Hello for Business provisioning begins with a full screen page with the title **Setup a PIN** and button with the same name. The user clicks **Setup a PIN**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
The provisioning flow proceeds to the Multi-Factor authentication portion of the enrollment. Provisioning informs the user that it is actively attempting to contact the user through their configured form of MFA. The provisioning process does not proceed until authentication succeeds, fails or times out. A failed or timeout MFA results in an error and asks the user to retry.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
After a successful MFA, the provisioning flow asks the user to create and validate a PIN. This PIN must observe any PIN complexity requirements that you deployed to the environment.
|
||||||
|
|
||||||
|
<createaPin.png>
|
||||||
|
|
||||||
|
The provisioning flow has all the information it needs to complete the Windows Hello for Business enrollment.
|
||||||
|
* A successful single factor authentication (username and password at sign-in)
|
||||||
|
* A device that has successfully completed device registration
|
||||||
|
* A fresh, successful multi-factor authentication
|
||||||
|
* A validated PIN that meets the PIN complexity requirements
|
||||||
|
|
||||||
|
The remainder of the provisioning includes Windows Hello for Business requesting an asymmetric key pair for the user, preferably from the TPM (or required if explicitly set through policy). Once the key pair is acquired, Windows communicates with Azure Active Directory to register the public key. AAD Connect syncrhonizes the user's key to the on-prem Active Directory.
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> The minimum time needed to syncrhonize the user's public key from Azure Active Directory to the on-premises Active Directory is 30 minutes. This synchronization latency delays the certificate enrollment for the user. After the user's public key has synchronized to Active Directory, the user's certificate enrolls automatically as long as the user's session is active (actively working or locked, but still signed-in). Also, the Action Center notifies the user thier PIN is ready for use.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> Microsoft is actively investigating ways to reduce the syncrhonization latency and delays in certificate enrollment with the goal to make certificate enrollment occur real-time.
|
||||||
|
|
||||||
|
After a successful key registration, Windows creates a certificate request using the same key pair to request a certificate. Windows send the certificate request to the AD FS server for certificate enrollment.
|
||||||
|
|
||||||
|
The AD FS registration authority verifies the key used in the certificate request matches the key that was previously registered. On a successful match, the AD FS registration authority signs the certificate request using its enrollment agent certificate and sends it to the certificate authority.
|
||||||
|
|
||||||
|
The certificate authority validates the certificate was signed by the registration authority. On successful validation of the signature, it issues a certificate based on the request and returns the certificate to the AD FS registration authority. The registration authority returns the certificate to Windows where it then installs the certificate in the current user’s certificate store. Once this process completes, the Windows Hello for Business provisioning workflow informs the user they can use their PIN to sign-in through the Windows Action Center.
|
||||||
|
|
||||||
|
<br><br>
|
||||||
|
|
||||||
|
<hr>
|
||||||
|
|
||||||
|
## Follow the Windows Hello for Business hybrid certificate trust deployment guide
|
||||||
|
1. [Overview](hello-hybrid-cert-trust.md)
|
||||||
|
2. [Prerequistes](hello-hybrid-cert-trust-prereqs.md)
|
||||||
|
3. [New Installation Baseline](hello-hybrid-cert-new-install.md)
|
||||||
|
4. [Configure Azure Device Registration](hello-hybrid-cert-trust-devreg.md)
|
||||||
|
5. [Configure Windows Hello for Business policy settings](hello-hybrid-cert-whfb-settings-policy.md)
|
||||||
|
6. Sign-in and Provision(*You are here*)
|
||||||
|
|
@ -0,0 +1,81 @@
|
|||||||
|
---
|
||||||
|
title: Configuring Hybrid Windows Hello for Business - Active Directory (AD)
|
||||||
|
description: Discussing the configuration of Active Directory (AD) in a Hybrid deployment of Windows Hello for Business
|
||||||
|
keywords: identity, PIN, biometric, Hello, passport, WHFB, ad
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security, mobile
|
||||||
|
localizationpriority: high
|
||||||
|
author: mikestephens-MS
|
||||||
|
ms.author: mstephen
|
||||||
|
ms.date: 09/08/2017
|
||||||
|
---
|
||||||
|
# Configuring Windows Hello for Business: Active Directory
|
||||||
|
|
||||||
|
**Applies to**
|
||||||
|
- Windows 10
|
||||||
|
|
||||||
|
>[!div class="step-by-step"]
|
||||||
|
[< Configure Windows Hello for Business](hello-hybrid-cert-whfb-settings.md)
|
||||||
|
[Configure Azure AD Connect >](hello-hybrid-cert-whfb-settings-dir-sync.md)
|
||||||
|
|
||||||
|
The key synchronization process for the hybrid deployment of Windows Hello for Business needs the Windows Server 2016 Active Directory schema.
|
||||||
|
|
||||||
|
>[!IMPORTANT]
|
||||||
|
>This guide only applies to Hybrid deployments for Windows 10, version 1703 or higher.
|
||||||
|
|
||||||
|
### Creating Security Groups
|
||||||
|
|
||||||
|
Windows Hello for Business uses several security groups to simplify the deployment and managment.
|
||||||
|
|
||||||
|
> [!Important]
|
||||||
|
> If your environment has one or more Windows Server 2016 domain controllers in the domain to which you are deploying Windows Hello for Business, then skip the **Create the KeyCredentials Admins Security Group**. Domains that include Windows Server 2016 domain controllers use the KeyAdmins group, which is created during the installation of the first Windows Server 2016 domain controller.
|
||||||
|
|
||||||
|
#### Create the KeyCredential Admins Security Group
|
||||||
|
|
||||||
|
Azure Active Directory Connect synchronizes the public key on the user object created during provisioning. You assign write and read permission to this group to the Active Directory attribute to ensure the Azure AD Connect service can add and remove keys as part of its normal workflow.
|
||||||
|
|
||||||
|
Sign-in a domain controller or management workstation with *Domain Admin* equivalent credentials.
|
||||||
|
|
||||||
|
1. Open **Active Directory Users and Computers**.
|
||||||
|
2. Click **View** and click **Advance Features**.
|
||||||
|
3. Expand the domain node from the navigation pane.
|
||||||
|
4. Right-click the **Users** container. Click **New**. Click **Group**.
|
||||||
|
5. Type **KeyCredential Admins** in the **Group Name** text box.
|
||||||
|
6. Click **OK**.
|
||||||
|
|
||||||
|
#### Create the Windows Hello for Business Users Security Group
|
||||||
|
|
||||||
|
The Windows Hello for Business Users group is used to make it easy to deploy Windows Hello for Business in phases. You assign Group Policy and Certificate template permissions to this group to simplify the deployment by simply adding the users to the group. This provides users with the proper permissions to provision Windows Hello for Business and to enroll in the Windows Hello for Business authentication certificate.
|
||||||
|
|
||||||
|
Sign-in a domain controller or management workstation with *Domain Admin* equivalent credentials.
|
||||||
|
|
||||||
|
1. Open **Active Directory Users and Computers**.
|
||||||
|
2. Click **View** and click **Advanced Features**.
|
||||||
|
3. Expand the domain node from the navigation pane.
|
||||||
|
4. Right-click the **Users** container. Click **New**. Click **Group**.
|
||||||
|
5. Type **Windows Hello for Business Users** in the **Group Name** text box.
|
||||||
|
6. Click **OK**.
|
||||||
|
|
||||||
|
### Section Review
|
||||||
|
|
||||||
|
> [!div class="checklist"]
|
||||||
|
> * Create the KeyCredential Admins Security group (optional)
|
||||||
|
> * Create the Windows Hello for Business Users group
|
||||||
|
|
||||||
|
>[!div class="step-by-step"]
|
||||||
|
[< Configure Windows Hello for Business](hello-hybrid-cert-whfb-settings.md)
|
||||||
|
[Configure Azure AD Connect >](hello-hybrid-cert-whfb-settings-dir-sync.md)
|
||||||
|
|
||||||
|
<br><br>
|
||||||
|
|
||||||
|
<hr>
|
||||||
|
|
||||||
|
## Follow the Windows Hello for Business hybrid certificate trust deployment guide
|
||||||
|
1. [Overview](hello-hybrid-cert-trust.md)
|
||||||
|
2. [Prerequistes](hello-hybrid-cert-trust-prereqs.md)
|
||||||
|
3. [New Installation Baseline](hello-hybrid-cert-new-install.md)
|
||||||
|
4. [Configure Azure Device Registration](hello-hybrid-cert-trust-devreg.md)
|
||||||
|
5. Configure Windows Hello for Business settings: Active Directory (*You are here*)
|
||||||
|
6. [Sign-in and Provision](hello-hybrid-cert-whfb-provision.md)
|
@ -0,0 +1,89 @@
|
|||||||
|
---
|
||||||
|
title: Configuring Hybrid Windows Hello for Business - Active Directory Federation Services (ADFS)
|
||||||
|
description: Discussing the configuration of Active Directory Federation Services (ADFS) in a Hybrid deployment of Windows Hello for Business
|
||||||
|
keywords: identity, PIN, biometric, Hello, passport, WHFB, adfs
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security, mobile
|
||||||
|
localizationpriority: high
|
||||||
|
author: mikestephens-MS
|
||||||
|
ms.author: mstephen
|
||||||
|
ms.date: 09/08/2017
|
||||||
|
---
|
||||||
|
# Configure Windows Hello for Business: Active Directory Federation Services
|
||||||
|
|
||||||
|
**Applies to**
|
||||||
|
- Windows10
|
||||||
|
|
||||||
|
## Federation Services
|
||||||
|
|
||||||
|
>[!IMPORTANT]
|
||||||
|
>This guide only applies to Hybrid deployments for Windows 10, version 1703 or higher.
|
||||||
|
|
||||||
|
>[!div class="step-by-step"]
|
||||||
|
[< Configure PKI >](hello-hybrid-cert-whfb-settings-pki.md)
|
||||||
|
[Configure policy settings >](hello-hybrid-cert-whfb-settings-policy.md)
|
||||||
|
|
||||||
|
|
||||||
|
The Windows Server 2016 Active Directory Fedeartion Server Certificate Registration Authority (AD FS RA) enrolls for an enrollment agent certificate. Once the registration authority verifies the certificate request, it signs the certificate request using its enrollment agent certificate and sends it to the certificate authority.
|
||||||
|
|
||||||
|
The Windows Hello for Business Authentication certificate template is configured to only issue certificates to certificate requests that have been signed with an enrollment agent certificate.
|
||||||
|
|
||||||
|
### Configure the Registration Authority
|
||||||
|
|
||||||
|
Sign-in the AD FS server with *Domain Admin* equivalent credentials.
|
||||||
|
|
||||||
|
1. Open a **Windows PowerShell** prompt.
|
||||||
|
2. Type the following command
|
||||||
|
|
||||||
|
```PowerShell
|
||||||
|
Set-AdfsCertificateAuthority -EnrollmentAgent -EnrollmentAgentCertificateTemplate WHFBEnrollmentAgent -WindowsHelloCertificateTemplate WHFBAuthentication
|
||||||
|
```
|
||||||
|
|
||||||
|
|
||||||
|
The `Set-AdfsCertificateAuthority` cmdlet should show the following warning:
|
||||||
|
>WARNING: PS0343: Issuing Windows Hello certificates requires enabling a permitted strong authentication provider, but no usable providers are currently configured. These authentication providers are not supported for Windows Hello certificates: CertificateAuthentication,MicrosoftPassportAuthentication. Windows Hello certificates will not be issued until a permitted strong authentication provider is configured.
|
||||||
|
|
||||||
|
This warning indicates that you have not configured multi-factor authentication in AD FS and until it is configured, the AD FS server will not issue Windows Hello certificates. Windows 10, version 1703 clients check this configuration during prerequisite checks. If detected, the prerequisite check will not succeed and the user will not provision Windows Hello for Business on sign-in.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
> If you gave your Windows Hello for Business Enrollment Agent and Windows Hello for Business Authentication certificate templates different names, then replace **WHFBEnrollmentAgent** and WHFBAuthentication in the above command with the name of your certificate templates. It's important that you use the template name rather than the template display name. You can view the template name on the **General** tab of the certificate template using the **Certificate Template** management console (certtmpl.msc). Or, you can view the template name using the **Get-CATemplate** ADCS Administration Windows PowerShell cmdlet on a Windows Server 2012 or later certificate authority.
|
||||||
|
|
||||||
|
|
||||||
|
### Group Memberships for the AD FS Service Account
|
||||||
|
|
||||||
|
The Windows Hello for Business group provides the AD FS service with the permissions needed to enroll a Windows Hello for Business authentication certificate on behalf of the provisioning user.
|
||||||
|
|
||||||
|
Sign-in a domain controller or management workstation with _Domain Admin_ equivalent credentials.
|
||||||
|
|
||||||
|
1. Open **Active Directory Users and Computers**.
|
||||||
|
2. Click the **Users** container in the navigation pane.
|
||||||
|
3. Right-click **Windows Hello for Business Users** group
|
||||||
|
4. Click the **Members** tab and click **Add**
|
||||||
|
5. In the **Enter the object names to select** text box, type **adfssvc**. Click **OK**.
|
||||||
|
6. Click **OK** to return to **Active Directory Users and Computers**.
|
||||||
|
7. Restart the AD FS server.
|
||||||
|
|
||||||
|
### Section Review
|
||||||
|
> [!div class="checklist"]
|
||||||
|
> * Configure the registration authority
|
||||||
|
> * Update group memberships for the AD FS service account
|
||||||
|
|
||||||
|
|
||||||
|
>[!div class="step-by-step"]
|
||||||
|
[< Configure PKI >](hello-hybrid-cert-whfb-settings-pki.md)
|
||||||
|
[Configure policy settings >](hello-hybrid-cert-whfb-settings-policy.md)
|
||||||
|
|
||||||
|
<br><br>
|
||||||
|
|
||||||
|
<hr>
|
||||||
|
|
||||||
|
## Follow the Windows Hello for Business hybrid certificate trust deployment guide
|
||||||
|
1. [Overview](hello-hybrid-cert-trust.md)
|
||||||
|
2. [Prerequistes](hello-hybrid-cert-trust-prereqs.md)
|
||||||
|
3. [New Installation Baseline](hello-hybrid-cert-new-install.md)
|
||||||
|
4. [Configure Azure Device Registration](hello-hybrid-cert-trust-devreg.md)
|
||||||
|
5. Configure Windows Hello for Business settings: AD FS (*You are here*)
|
||||||
|
6. [Sign-in and Provision](hello-hybrid-cert-whfb-provision.md)
|
||||||
|
|
@ -0,0 +1,86 @@
|
|||||||
|
---
|
||||||
|
title: Configuring Hybrid Windows Hello for Business - Directory Synchronization
|
||||||
|
description: Discussing Directory Synchronization in a Hybrid deployment of Windows Hello for Business
|
||||||
|
keywords: identity, PIN, biometric, Hello, passport, WHFB, dirsync, connect
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security, mobile
|
||||||
|
localizationpriority: high
|
||||||
|
author: mikestephens-MS
|
||||||
|
ms.author: mstephen
|
||||||
|
ms.date: 09/08/2017
|
||||||
|
---
|
||||||
|
# Configure Hybrid Windows Hello for Business: Directory Synchronization
|
||||||
|
|
||||||
|
**Applies to**
|
||||||
|
- Windows 10
|
||||||
|
|
||||||
|
>[!div class="step-by-step"]
|
||||||
|
[< Configure Active Directory](hello-hybrid-cert-whfb-settings-ad.md)
|
||||||
|
[Configure PKI >](hello-hybrid-cert-whfb-settings-pki.md)
|
||||||
|
|
||||||
|
## Directory Syncrhonization
|
||||||
|
|
||||||
|
>[!IMPORTANT]
|
||||||
|
>This guide only applies to Hybrid deployments for Windows 10, version 1703 or higher.
|
||||||
|
|
||||||
|
In hybrid deployments, users register the public portion of their Windows Hello for Business crednetial with Azure. Azure AD Connect syncrhonizes the Windows Hello for Business public key to Active Directory.
|
||||||
|
|
||||||
|
The key-trust model needs Windows Server 2016 domain controllers, which configures the key registration permissions automatically; however, the certificate-trust model does not and requires you to add the permissions manually.
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> If you already have a Windows Server 2016 domain controller in your domain, you can skip **Configure Permissions for Key Synchronization**.
|
||||||
|
|
||||||
|
### Configure Permissions for Key Syncrhonization
|
||||||
|
|
||||||
|
Sign-in a domain controller or management workstations with *Domain Admin* equivalent credentials.
|
||||||
|
|
||||||
|
1. Open **Active Directory Users and Computers**.
|
||||||
|
2. Right-click your domain name from the navigation pane and click **Properties**.
|
||||||
|
3. Click **Security** (if the Security tab is missing, turn on Advanced Features from the View menu).
|
||||||
|
4. Click **Advanced**. Click **Add**. Click **Select a principal**.
|
||||||
|
5. The **Select User, Computer, Service Account, or Group** dialog box appears. In the **Enter the object name to select** text box, type **KeyCredential Admins**. Click **OK**.
|
||||||
|
6. In the **Applies to** list box, select **Descendant User objects**.
|
||||||
|
7. Using the scroll bar, scroll to the bottom of the page and click **Clear all**.
|
||||||
|
8. In the **Properties** section, select **Read msDS-KeyCredentialLink** and **Write msDS-KeyCrendentialLink**.
|
||||||
|
9. Click **OK** three times to complete the task.
|
||||||
|
|
||||||
|
|
||||||
|
### Group Memberships for the Azure AD Connect Service Account
|
||||||
|
|
||||||
|
The KeyAdmins or KeyCredential Admins global group provides the Azure AD Connect service with the permissions needed to read and write the public key to Active Directory.
|
||||||
|
|
||||||
|
Sign-in a domain controller or management workstation with _Domain Admin_ equivalent credentials.
|
||||||
|
|
||||||
|
1. Open **Active Directory Users and Computers**.
|
||||||
|
2. Click the **Users** container in the navigation pane.
|
||||||
|
>[!IMPORTANT]
|
||||||
|
> If you already have a Windows Server 2016 domain controller in your domain, use the Keyadmins group in the next step, otherwise use the KeyCredential admins group you previously created.
|
||||||
|
|
||||||
|
3. Right-click either the **KeyAdmins** or **KeyCredential Admins** in the details pane and click **Properties**.
|
||||||
|
4. Click the **Members** tab and click **Add**
|
||||||
|
5. In the **Enter the object names to select** text box, type the name of the Azure AD Connect service account. Click **OK**.
|
||||||
|
6. Click **OK** to return to **Active Directory Users and Computers**.
|
||||||
|
|
||||||
|
### Section Review
|
||||||
|
|
||||||
|
> [!div class="checklist"]
|
||||||
|
> * Configure Permissions for Key Synchronization
|
||||||
|
> * Configure group membership for Azure AD Connect
|
||||||
|
|
||||||
|
>[!div class="step-by-step"]
|
||||||
|
[< Configure Active Directory](hello-hybrid-cert-whfb-settings-ad.md)
|
||||||
|
[Configure PKI >](hello-hybrid-cert-whfb-settings-pki.md)
|
||||||
|
|
||||||
|
<br><br>
|
||||||
|
|
||||||
|
<hr>
|
||||||
|
|
||||||
|
## Follow the Windows Hello for Business hybrid certificate trust deployment guide
|
||||||
|
1. [Overview](hello-hybrid-cert-trust.md)
|
||||||
|
2. [Prerequistes](hello-hybrid-cert-trust-prereqs.md)
|
||||||
|
3. [New Installation Baseline](hello-hybrid-cert-new-install.md)
|
||||||
|
4. [Configure Azure Device Registration](hello-hybrid-cert-trust-devreg.md)
|
||||||
|
5. Configure Windows Hello for Business settings: Directory Syncrhonization (*You are here*)
|
||||||
|
6. [Sign-in and Provision](hello-hybrid-cert-whfb-provision.md)
|
@ -0,0 +1,199 @@
|
|||||||
|
---
|
||||||
|
title: Configuring Hybrid Windows Hello for Business - Public Key Infrastructure (PKI)
|
||||||
|
description: Discussing the configuration of the Public Key Infrastructure (PKI) in a Hybrid deployment of Windows Hello for Business
|
||||||
|
keywords: identity, PIN, biometric, Hello, passport, WHFB, PKI
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security, mobile
|
||||||
|
localizationpriority: high
|
||||||
|
author: mikestephens-MS
|
||||||
|
ms.author: mstephen
|
||||||
|
ms.date: 09/08/2017
|
||||||
|
---
|
||||||
|
|
||||||
|
# Configure Hybrid Windows Hello for Business: Public Key Infrastructure
|
||||||
|
|
||||||
|
**Applies to**
|
||||||
|
- Windows 10
|
||||||
|
|
||||||
|
> [!div class="step-by-step"]
|
||||||
|
[< Configure Azure AD Connect](hello-hybrid-cert-whfb-settings-dir-sync.md)
|
||||||
|
[Configure AD FS >](hello-hybrid-cert-whfb-settings-adfs.md)
|
||||||
|
|
||||||
|
>[!IMPORTANT]
|
||||||
|
>This guide only applies to Hybrid deployments for Windows 10, version 1703 or higher.
|
||||||
|
|
||||||
|
Windows Hello for Business deployments rely on certificates. Hybrid deployments uses publicly issued server authentication certifcates to validate the name of the server to which they are connecting and to encyrpt the data that flows them and the client computer.
|
||||||
|
|
||||||
|
All deployments use enterprise issed certificates for domain controllers as a root of trust. Hybrid certificate trust deployments issue users sign-in certificate that enables them to authenticate using Windows Hello for Business credentials to non-Windows Server 2016 domain controllers. Additionally, hybrid certificate trust deployments issue certificate to registration authorites to provide defenese-in-depth security for issueing user authentication certificates.
|
||||||
|
|
||||||
|
## Certifcate Templates
|
||||||
|
|
||||||
|
This section has you configure certificate templates on your Windows Server 2012 or later issuing certificate authtority.
|
||||||
|
|
||||||
|
### Domain Controller certificate template
|
||||||
|
|
||||||
|
Clients need to trust domain controllers and the best way to do this is to ensure each domain controller has a Kerberos Authentication certificate. Installing a certificate on the domain controller enables the Key Distribution Center (KDC) to prove its identity to other members of the domain. This provides clients a root of trust external to the domain - namely the enterprise certificate authority.
|
||||||
|
|
||||||
|
Domain controllers automatically request a domain controller certificate (if published) when they discover an enterprise certificate authority is added to Active Directory. However, certificates based on the *Domain Controller* and *Domain Controller Authentication* certificate templates do not include the **KDC Authentication** object identifier (OID), which was later added to the Kerberos RFC. Therefore, domain controllers need to request a certificate based on the Kerberos Authentication certificate template.
|
||||||
|
|
||||||
|
By default, the Active Directory Certificate Authority provides and publishes the Kerberos Authentication certificate template. However, the cryptography configuration included in the provided template is based on older and less performant cryptography APIs. To ensure domain controllers request the proper certificate with the best available cryptography, use the **Kerberos Authentication** certificate template a baseline to create an updated domain controller certificate template.
|
||||||
|
|
||||||
|
#### Create a Domain Controller Authentication (Kerberos) Certificate Template
|
||||||
|
|
||||||
|
Sign-in a certificate authority or management workstations with _Domain Admin_ equivalent credentials.
|
||||||
|
|
||||||
|
1. Open the **Certificate Authority** management console.
|
||||||
|
2. Right-click **Certificate Templates** and click **Manage**.
|
||||||
|
3. In the **Certificate Template Console**, right-click the **Kerberos Authentication** template in the details pane and click **Duplicate Template**.
|
||||||
|
4. On the **Compatibility** tab, clear the **Show resulting changes** check box. Select **Windows Server 2012** or **Windows Server 2012 R2** from the **Certification Authority** list. Select **Windows Server 2012** or **Windows Server 2012 R2** from the **Certification Recipient** list.
|
||||||
|
5. On the **General** tab, type **Domain Controller Authentication (Kerberos)** in Template display name. Adjust the validity and renewal period to meet your enterprise's needs.
|
||||||
|
**Note**If you use different template names, you'll need to remember and substitute these names in different portions of the lab.
|
||||||
|
6. On the **Subject** tab, select the **Build from this Active Directory information** button if it is not already selected. Select **None** from the **Subject name format** list. Select **DNS name** from the **Include this information in alternate subject** list. Clear all other items.
|
||||||
|
7. On the **Cryptography** tab, select **Key Storage Provider** from the **Provider Category** list. Select **RSA** from the **Algorithm name** list. Type **2048** in the **Minimum key size** text box. Select **SHA256** from the **Request hash** list. Click **OK**.
|
||||||
|
8. Close the console.
|
||||||
|
|
||||||
|
#### Configure Certificate Suspeding for the Domain Controller Authentication (Kerberos) Certificate Template
|
||||||
|
|
||||||
|
Many domain controllers may have an existing domain controller certificate. The Active Directory Certificate Services provides a default certificate template for domain controllers--the domain controller certificate template. Later releases provided a new certificate template--the domain controller authentication certificate template. These certificate templates were provided prior to update of the Kerberos specification that stated Key Distribution Centers (KDCs) performing certificate authentication needed to include the **KDC Authentication** extension.
|
||||||
|
|
||||||
|
The Kerberos Authentication certificate template is the most current certificate template designated for domain controllers and should be the one you deploy to all your domain controllers (2008 or later).
|
||||||
|
|
||||||
|
The autoenrollment feature in Windows enables you to effortlessly replace these domain controller certificates. You can use the following configuration to replace older domain controller certificates with a new certificate using the Kerberos Authentication certificate template.
|
||||||
|
|
||||||
|
Sign-in a certificate authority or management workstations with _Enterprise Admin_ equivalent credentials.
|
||||||
|
|
||||||
|
1. Open the **Certificate Authority** management console.
|
||||||
|
2. Right-click **Certificate Templates** and click **Manage**.
|
||||||
|
3. In the **Certificate Template Console**, right-click the **Domain Controller Authentication (Kerberos)** (or the name of the certificate template you created in the previous section) template in the details pane and click **Properties**.
|
||||||
|
4. Click the **Superseded Templates** tab. Click **Add**.
|
||||||
|
5. From the **Add Superseded Template** dialog, select the **Domain Controller** certificate template and click **OK**. Click **Add**.
|
||||||
|
6. From the **Add Superseded Template** dialog, select the **Domain Controller Authentication** certificate template and click **OK**.
|
||||||
|
7. From the **Add Superseded Template dialog**, select the **Kerberos Authentication** certificate template and click **OK**.
|
||||||
|
8. Add any other enterprise certificate templates that were previously configured for domain controllers to the **Superseded Templates** tab.
|
||||||
|
9. Click **OK** and close the **Certificate Templates** console.
|
||||||
|
|
||||||
|
The certificate template is configured to supersede all the certificate templates provided in the certificate templates superseded templates list. However, the certificate template and the superseding of certificate templates is not active until you publish the certificate template to one or more certificate authorities.
|
||||||
|
|
||||||
|
### Enrollment Agent certificate template
|
||||||
|
|
||||||
|
Active Directory Federation Server used for Windows Hello for Business certificate enrollment performs its own certificate lifecycle management. Once the registration authority is configured with the proper certificate template, the AD FS server attempts to enroll the certificate on the first certificate request or when the service first starts.
|
||||||
|
|
||||||
|
Approximately 60 days prior to enrollment agent certificate's expiration, the AD FS service attempts to renew the certificate until it is successful. If the certificate fails to renew, and the certificate expires, the AD FS server will request a new enrollment agent certificate. You can view the AD FS event logs to determine the status of the enrollment agent certificate.
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Follow the procedures below based on the AD FS service account used in your environment.
|
||||||
|
|
||||||
|
#### Creating an Enrollment Agent certificate for Group Managed Service Accounts
|
||||||
|
|
||||||
|
Sign-in a certificate authority or management workstations with _Domain Admin_ equivalent credentials.
|
||||||
|
|
||||||
|
1. Open the **Certificate Authority Management** console.
|
||||||
|
2. Right-click **Certificate Templates** and click **Manage**.
|
||||||
|
3. In the **Certificate Template Console**, right click on the **Exchange Enrollment Agent (Offline request)** template details pane and click **Duplicate Template**.
|
||||||
|
4. On the **Compatibility** tab, clear the **Show resulting changes** check box. Select **Windows Server 2012** or **Windows Server 2012 R2** from the **Certification Authority** list. Select **Windows Server 2012** or **Windows Server 2012 R2** from the **Certification Recipient** list.
|
||||||
|
5. On the **General** tab, type **WHFB Enrollment Agent** in **Template display name**. Adjust the validity and renewal period to meet your enterprise's needs.
|
||||||
|
6. On the **Subject** tab, select the **Supply in the request** button if it is not already selected.
|
||||||
|
**Note:** The preceding step is very important. Group Managed Service Accounts (GMSA) do not support the Build from this Active Directory information option and will result in the AD FS server failing to enroll the enrollment agent certificate. You must configure the certificate template with Supply in the request to ensure that AD FS servers can perform the automatic enrollment and renewal of the enrollment agent certificate.
|
||||||
|
|
||||||
|
7. On the **Cryptography** tab, select **Key Storage Provider** from the **Provider Category** list. Select **RSA** from the **Algorithm name** list. Type **2048** in the **Minimum key size** text box. Select **SHA256** from the **Request hash** list.
|
||||||
|
8. On the **Security** tab, click **Add**.
|
||||||
|
9. Click **Object Types**. Select the **Service Accounts** check box and click **OK**.
|
||||||
|
10. Type **adfssvc** in the **Enter the object names to select** text box and click **OK**.
|
||||||
|
11. Click the **adfssvc** from the **Group or users names** list. In the **Permissions for adfssvc** section, In the **Permissions for adfssvc** section, select the **Allow** check box for the **Enroll** permission. Excluding the **adfssvc** user, clear the **Allow** check box for the **Enroll** and **Autoenroll** permissions for all other items in the **Group or users names** list if the check boxes are not already cleared. Click **OK**.
|
||||||
|
12. Close the console.
|
||||||
|
|
||||||
|
#### Creating an Enrollment Agent certificate for typical Service Acconts
|
||||||
|
|
||||||
|
Sign-in a certificate authority or management workstations with *Domain Admin* equivalent credentials.
|
||||||
|
|
||||||
|
1. Open the **Certificate Authority** management console.
|
||||||
|
2. Right-click **Certificate Templates** and click **Manage**.
|
||||||
|
3. In the **Certificate Template** console, right-click the **Exchange Enrollment Agent** template in the details pane and click **Duplicate Template**.
|
||||||
|
4. On the **Compatibility** tab, clear the **Show resulting changes** check box. Select **Windows Server 2012** or **Windows Server 2012 R2** from the **Certification Authority** list. Select **Windows Server 2012** or **Windows Server 2012 R2** from the **Certification Recipient** list.
|
||||||
|
5. On the **General** tab, type **WHFB Enrollment Agent** in **Template display name**. Adjust the validity and renewal period to meet your enterprise's needs.
|
||||||
|
6. On the **Subject** tab, select the **Build from this Active Directory information** button if it is not already selected. Select **Fully distinguished name** from the **Subject name format** list if **Fully distinguished name** is not already selected. Select the **User Principal Name (UPN)** check box under **Include this information in alternative subject name**.
|
||||||
|
7. On the **Cryptography** tab, select **Key Storage Provider** from the **Provider Category** list. Select **RSA** from the **Algorithm name** list. Type **2048** in the **Minimum key size** text box. Select **SHA256** from the **Request hash** list.
|
||||||
|
8. On the **Security** tab, click **Add**. Type **adfssvc** in the **Enter the object names to select text box** and click **OK**.
|
||||||
|
9. Click the **adfssvc** from the **Group or users names** list. In the **Permissions for adfssvc** section, select the **Allow** check box for the **Enroll** permission. Excluding the **adfssvc** user, clear the **Allow** check boxes for the **Enroll** and **Autoenroll** permissions for all other items in the **Group or users names** list if the check boxes are not already cleared. Click **OK**.
|
||||||
|
10. Close the console.
|
||||||
|
|
||||||
|
### Creating Windows Hello for Business authentication certificate template
|
||||||
|
|
||||||
|
During Windows Hello for Business provisioning, the Windows 10, version 1703 client requests an authentication certificate from the Active Directory Federation Service, which requests the authentication certificate on behalf of the user. This task configures the Windows Hello for Business authentication certificate template. You use the name of the certificate template when configuring.
|
||||||
|
|
||||||
|
Sign-in a certificate authority or management workstations with _Domain Admin equivalent_ credentials.
|
||||||
|
|
||||||
|
1. Open the **Certificate Authority** management console.
|
||||||
|
2. Right-click **Certificate Templates** and click **Manage**.
|
||||||
|
3. Right-click the **Smartcard Logon** template and choose **Duplicate Template**.
|
||||||
|
4. On the **Compatibility** tab, clear the **Show resulting changes** check box. Select **Windows Server 2012** or **Windows Server 2012 R2** from the **Certification Authority** list. Select **Windows Server 2012** or **Windows Server 2012 R2** from the **Certification Recipient** list.
|
||||||
|
5. On the **General** tab, type **WHFB Authentication** in **Template display name**. Adjust the validity and renewal period to meet your enterprise's needs.
|
||||||
|
**Note:** If you use different template names, you'll need to remember and substitute these names in different portions of the deployment.
|
||||||
|
6. On the **Cryptography** tab, select **Key Storage Provider** from the **Provider Category** list. Select **RSA** from the **Algorithm name** list. Type **2048** in the **Minimum key size** text box. Select **SHA256** from the **Request hash** list.
|
||||||
|
7. On the **Extensions** tab, verify the **Application Policies** extension includes **Smart Card Logon**.
|
||||||
|
8. On the **Issuance Requirements** tab, select the T**his number of authorized signatures** check box. Type **1** in the text box.
|
||||||
|
* Select **Application policy** from the **Policy type required in signature**. Select **Certificate Request Agent** from in the **Application policy** list. Select the **Valid existing certificate** option.
|
||||||
|
9. On the **Subject** tab, select the **Build from this Active Directory information** button if it is not already selected. Select **Fully distinguished name** from the **Subject name format** list if **Fully distinguished name** is not already selected. Select the **User Principal Name (UPN)** check box under **Include this information in alternative subject name**.
|
||||||
|
10. On the **Request Handling** tab, select the **Renew with same key** check box.
|
||||||
|
11. On the **Security** tab, click **Add**. Type **Window Hello for Business Users** in the **Enter the object names to select** text box and click **OK**.
|
||||||
|
12. Click the **Windows Hello for Business Users** from the **Group or users names** list. In the **Permissions for Windows Hello for Business Users** section, select the **Allow** check box for the **Enroll** permission. Excluding the **Windows Hello for Business Users** group, clear the **Allow** check box for the **Enroll** and **Autoenroll** permissions for all other entries in the **Group or users names** section if the check boxes are not already cleared. Click **OK**.
|
||||||
|
13. If you previously issued Windows Hello for Business sign-in certificates using Configuration Manger and are switching to an AD FS registration authority, then on the **Superseded Templates** tab, add the previously used **Windows Hello for Business Authentication** template(s), so they will be superseded by this template for the users that have Enroll permission for this template.
|
||||||
|
14. Click on the **Apply** to save changes and close the console.
|
||||||
|
|
||||||
|
#### Mark the template as the Windows Hello Sign-in template
|
||||||
|
|
||||||
|
Sign-in to an **AD FS Windows Server 2016** computer with _Enterprise Admin_ equivalent credentials.
|
||||||
|
1. Open an elevated command prompt.
|
||||||
|
2. Run `certutil -dsTemplate WHFBAuthentication msPKI-Private-Key-Flag +CTPRIVATEKEY_FLAG_HELLO_LOGON_KEY`
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>If you gave your Windows Hello for Business Authentication certificate template a different name, then replace **WHFBAuthentication** in the above command with the name of your certificate template. It's important that you use the template name rather than the template display name. You can view the template name on the **General** tab of the certificate template using the Certificate Template management console (certtmpl.msc). Or, you can view the template name using the **Get-CATemplate** ADCS Administration Windows PowerShell cmdlet on our Windows Server 2012 or later certificate authority.
|
||||||
|
Publish Templates
|
||||||
|
|
||||||
|
### Publish Certificate Templates to a Certificate Authority
|
||||||
|
|
||||||
|
The certificate authority may only issue certificates for certificate templates that are published to that certificate authority. If you have more than one certificate authority and you want that certificate authority to issue certificates based on a specific certificate template, then you must publish the certificate template to all certificate authorities that are expected to issue the certificate.
|
||||||
|
|
||||||
|
### Unpublish Superseded Certificate Templates
|
||||||
|
|
||||||
|
The certificate authority only issues certificates based on published certificate templates. For defense in depth security, it is a good practice to unpublish certificate templates that the certificate authority is not configured to issue. This includes the pre-published certificate template from the role installation and any superseded certificate templates.
|
||||||
|
|
||||||
|
The newly created domain controller authentication certificate template supersedes previous domain controller certificate templates. Therefore, you need to unpublish these certificate templates from all issuing certificate authorities.
|
||||||
|
|
||||||
|
Sign-in to the certificate authority or management workstation with _Enterprise Admin_ equivalent credentials.
|
||||||
|
|
||||||
|
1. Open the **Certificate Authority** management console.
|
||||||
|
2. Expand the parent node from the navigation pane.
|
||||||
|
3. Click **Certificate Templates** in the navigation pane.
|
||||||
|
4. Right-click the **Domain Controller** certificate template in the content pane and select **Delete**. Click **Yes** on the **Disable certificate templates** window.
|
||||||
|
5. Repeat step 4 for the **Domain Controller Authentication** and **Kerberos Authentication** certificate templates.
|
||||||
|
|
||||||
|
### Section Review
|
||||||
|
> [!div class="checklist"]
|
||||||
|
> * Domain Controller certificate template
|
||||||
|
> * Configure superseded domain controller certificate templates
|
||||||
|
> * Enrollment Agent certifcate template
|
||||||
|
> * Windows Hello for Business Authentication certificate template
|
||||||
|
> * Mark the certifcate template as Windows Hello for Business sign-in template
|
||||||
|
> * Publish Certificate templates to certificate authorities
|
||||||
|
> * Unpublish superseded certificate templates
|
||||||
|
|
||||||
|
|
||||||
|
> [!div class="step-by-step"]
|
||||||
|
[< Configure Azure AD Connect](hello-hybrid-cert-whfb-settings-dir-sync.md)
|
||||||
|
[Configure AD FS >](hello-hybrid-cert-whfb-settings-adfs.md)
|
||||||
|
|
||||||
|
<br><br>
|
||||||
|
|
||||||
|
<hr>
|
||||||
|
|
||||||
|
## Follow the Windows Hello for Business hybrid certificate trust deployment guide
|
||||||
|
1. [Overview](hello-hybrid-cert-trust.md)
|
||||||
|
2. [Prerequistes](hello-hybrid-cert-trust-prereqs.md)
|
||||||
|
3. [New Installation Baseline](hello-hybrid-cert-new-install.md)
|
||||||
|
4. [Configure Azure Device Registration](hello-hybrid-cert-trust-devreg.md)
|
||||||
|
5. Configure Windows Hello for Business settings: PKI (*You are here*)
|
||||||
|
6. [Sign-in and Provision](hello-hybrid-cert-whfb-provision.md)
|
||||||
|
|
@ -0,0 +1,204 @@
|
|||||||
|
---
|
||||||
|
title: Configuring Hybrid Windows Hello for Business - Group Policy
|
||||||
|
description: Discussing the configuration of Group Policy in a Hybrid deployment of Windows Hello for Business
|
||||||
|
keywords: identity, PIN, biometric, Hello, passport, WHFB
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security, mobile
|
||||||
|
localizationpriority: high
|
||||||
|
author: mikestephens-MS
|
||||||
|
ms.author: mstephen
|
||||||
|
ms.date: 09/08/2017
|
||||||
|
---
|
||||||
|
# Configure Hybrid Windows Hello for Business: Group Policy
|
||||||
|
|
||||||
|
**Applies to**
|
||||||
|
- Windows 10
|
||||||
|
|
||||||
|
> [!div class="step-by-step"]
|
||||||
|
[< Configure AD FS](hello-hybrid-cert-whfb-settings-adfs.md)
|
||||||
|
|
||||||
|
|
||||||
|
## Policy Configuration
|
||||||
|
|
||||||
|
>[!IMPORTANT]
|
||||||
|
>This guide only applies to Hybrid deployments for Windows 10, version 1703 or higher.
|
||||||
|
|
||||||
|
You need a Windows 10, version 1703 workstation to run the Group Policy Management Console, which provides the latest Windows Hello for Business and PIN Complexity Group Policy settings. To run the Group Policy Management Console, you need to install the Remote Server Administration Tools for Windows 10. You can download these tools from the [Microsoft Download Center](https://www.microsoft.com/en-us/download/details.aspx?id=45520).
|
||||||
|
Install the Remote Server Administration Tools for Windows 10 on a computer running Windows 10, version 1703.
|
||||||
|
|
||||||
|
Alternatively, you can create copy the .ADMX and .ADML files from a Windows 10 Creators Edition (1703) to their respective language folder on a Windows Server or you can create a Group Policy Central Store and copy them their respective language folder. See [How to create and manage the Central Store for Group Policy Administrative Templates in Windows](https://support.microsoft.com/help/3087759/how-to-create-and-manage-the-central-store-for-group-policy-administrative-templates-in-windows) for more information.
|
||||||
|
|
||||||
|
Domain controllers of Windows Hello for Business deployments need one Group Policy setting, which enables automatic certificate enrollment for the newly create domain controller authentication certificate. This policy setting ensures domain controllers (new and existing) autoamtically request and renew the correct domain controller certifcate.
|
||||||
|
|
||||||
|
Domain joined clients of hybrid certificate-based deployments of Windows Hello for Business needs three Group Policy settings:
|
||||||
|
* Enable Windows Hello for Business
|
||||||
|
* Use certificate for on-premises authentication
|
||||||
|
* Enable automatic enrollment of certificates
|
||||||
|
|
||||||
|
### Configure Domain Controllers for Automatic Certificate Enrollment
|
||||||
|
|
||||||
|
Domain controllers automatically request a certificate from the *Domain Controller* certificate template. However, the domain controller is unaware of newer certificate templates or superseded configurations on certificate templates.
|
||||||
|
|
||||||
|
To continue automatic enrollment and renewal of domain controller certificates that understand newer certificate template and superseded certificate template configurations, create and configure a Group Policy object for automatic certificate enrollment and link the Group Policy object to the Domain Controllers OU.
|
||||||
|
|
||||||
|
#### Create a Domain Controller Automatic Certifiacte Enrollment Group Policy object
|
||||||
|
|
||||||
|
Sign-in a domain controller or management workstations with _Domain Admin_ equivalent credentials.
|
||||||
|
|
||||||
|
1. Start the **Group Policy Management Console** (gpmc.msc)
|
||||||
|
2. Expand the domain and select the **Group Policy Object** node in the navigation pane.
|
||||||
|
3. Right-click **Group Policy object** and select **New**
|
||||||
|
4. Type *Domain Controller Auto Certificate Enrollment* in the name box and click **OK**.
|
||||||
|
5. Right-click the **Domain Controller Auto Certificate Enrollment** Group Policy object and click **Edit**.
|
||||||
|
6. In the navigation pane, expand **Policies** under **Computer Configuration**.
|
||||||
|
7. Expand **Windows Settings**, **Security Settings**, and click **Public Key Policies**.
|
||||||
|
8. In the details pane, right-click **Certificate Services Client <20> Auto-Enrollment** and select **Properties**.
|
||||||
|
9. Select **Enabled** from the **Configuration Model** list.
|
||||||
|
10. Select the **Renew expired certificates**, **update pending certificates**, and **remove revoked certificates** check box.
|
||||||
|
11. Select the **Update certificates that use certificate templates** check box.
|
||||||
|
12. Click **OK**. Close the **Group Policy Management Editor**.
|
||||||
|
|
||||||
|
#### Deploy the Domain Controller Auto Certificate Enrollment Group Policy Object
|
||||||
|
|
||||||
|
Sign-in a domain controller or management workstations with _Domain Admin_ equivalent credentials.
|
||||||
|
|
||||||
|
1. Start the **Group Policy Management Console** (gpmc.msc)
|
||||||
|
2. In the navigation pane, expand the domain and expand the node that has your Active Directory domain name. Right-click the **Domain Controllers** organizational unit and click **Link an existing GPO<50>**
|
||||||
|
3. In the **Select GPO** dialog box, select **Domain Controller Auto Certificate Enrollment** or the name of the domain controller certificate enrollment Group Policy object you previously created and click **OK**.
|
||||||
|
|
||||||
|
### Windows Hello for Business Group Policy
|
||||||
|
|
||||||
|
The Windows Hello for Business Group Policy object delivers the correct Group Policy settings to the user, which enables them to enroll and use Windows Hello for Business to authenticate to Azure and Active Directory
|
||||||
|
|
||||||
|
#### Enable Windows Hello for Business
|
||||||
|
|
||||||
|
The Enable Windows Hello for Business Group Policy setting is the configuration needed for Windows to determine if a user should be attempt to enroll for Windows Hello for Business. A user will only attempt enrollment if this policy setting is configured to enabled.
|
||||||
|
|
||||||
|
You can configure the Enable Windows Hello for Business Group Policy setting for computer or users. Deploying this policy setting to computers results in ALL users that sign-in that computer to attempt a Windows Hello for Business enrollment. Deploying this policy setting to a user results in only that user attempting a Windows Hello for Business enrollment. Additionally, you can deploy the policy setting to a group of users so only those users attempt a Windows Hello for Business enrollment. If both user and computer policy settings are deployed, the user policy setting has precedence.
|
||||||
|
|
||||||
|
#### Use certificate for on-premises authentication
|
||||||
|
|
||||||
|
The Use certificate for on-premises authentication Group Policy setting determines if the on-premises deployment uses the key-trust or certificate trust on-premises authentication model. You must configure this Group Policy setting to configure Windows to enroll for a Windows Hello for Business authentication certificate. If you do not configure this policy setting, Windows considers the deployment to use key-trust on-premises authentication, which requires a sufficient number of Windows Server 2016 domain controllers to handle the Windows Hello for Business key-trust authentication requests.
|
||||||
|
|
||||||
|
You can configure this Group Policy setting for computer or users. Deploying this policy setting to computers results in ALL users requesting a Windows Hello for Business authentication certificate. Deploying this policy setting to a user results in only that user requesting a Windows Hello for Business authentication certificate. Additionally, you can deploy the policy setting to a group of users so only those users request a Windows Hello for Business authentication certificate. If both user and computer policy settings are deployed, the user policy setting has precedence.
|
||||||
|
|
||||||
|
#### Enable automatic enrollment of certificates
|
||||||
|
|
||||||
|
Windows Hello for Business provisioning performs the initial enrollment of the Windows Hello for Business authentication certificate. This certificate expires based on the duration configured in the Windows Hello for Business authentication certificate template. The Windows 10, version 1703 certificate auto enrollment was updated to renew these certificates before they expire, which significantly reduces user authentication failures from expired user certificates.
|
||||||
|
|
||||||
|
The process requires no user interaction provided the user signs-in using Windows Hello for Business. The certificate is renewed in the background before it expires.
|
||||||
|
|
||||||
|
#### Create the Windows Hello for Business Group Policy object
|
||||||
|
|
||||||
|
The Group Policy object contains the policy settings needed to trigger Windows Hello for Business provisioning and to ensure Windows Hello for Business authentication certificates are automatically renewed.
|
||||||
|
|
||||||
|
Sign-in a domain controller or management workstations with _Domain Admin_ equivalent credentials.
|
||||||
|
|
||||||
|
1. Start the **Group Policy Management Console** (gpmc.msc)
|
||||||
|
2. Expand the domain and select the **Group Policy Object** node in the navigation pane.
|
||||||
|
3. Right-click **Group Policy object** and select **New**.
|
||||||
|
4. Type *Enable Windows Hello for Business* in the name box and click **OK**.
|
||||||
|
5. In the content pane, right-click the **Enable Windows Hello for Business** Group Policy object and click **Edit**.
|
||||||
|
6. In the navigation pane, expand **Policies** under **User Configuration**.
|
||||||
|
7. Expand **Administrative Templates > Windows Component**, and select **Windows Hello for Business**.
|
||||||
|
8. In the content pane, double-click **Use Windows Hello for Business**. Click **Enable** and click **OK**.
|
||||||
|
9. Double-click **Use certificate for on-premises authentication**. Click **Enable** and click **OK**. Close the **Group Policy Management Editor**.
|
||||||
|
|
||||||
|
#### Configure Automatic Certificate Enrollment
|
||||||
|
|
||||||
|
1. Start the **Group Policy Management Console** (gpmc.msc).
|
||||||
|
2. Expand the domain and select the **Group Policy Object** node in the navigation pane.
|
||||||
|
3. Right-click the **Enable Windows Hello for Business** Group Policy object and click **Edit**.
|
||||||
|
4. In the navigation pane, expand **Policies** under **User Configuration**.
|
||||||
|
5. Expand **Windows Settings > Security Settings**, and click **Public Key Policies**.
|
||||||
|
6. In the details pane, right-click **Certificate Services Client <20> Auto-Enrollment** and select **Properties**.
|
||||||
|
7. Select **Enabled** from the **Configuration Model** list.
|
||||||
|
8. Select the **Renew expired certificates**, **update pending certificates**, and **remove revoked certificates** check box.
|
||||||
|
9. Select the **Update certificates that use certificate templates** check box.
|
||||||
|
10. Click **OK**. Close the **Group Policy Management Editor**.
|
||||||
|
|
||||||
|
#### Configure Security in the Windows Hello for Business Group Policy object
|
||||||
|
|
||||||
|
The best way to deploy the Windows Hello for Business Group Policy object is to use security group filtering. The enables you to easily manage the users that should receive Windows Hello for Business by simply adding them to a group. This enables you to deploy Windows Hello for Business in phases.
|
||||||
|
1. Start the **Group Policy Management Console** (gpmc.msc)
|
||||||
|
2. Expand the domain and select the **Group Policy Object** node in the navigation pane.
|
||||||
|
3. Double-click the **Enable Windows Hello for Business** Group Policy object.
|
||||||
|
4. In the **Security Filtering** section of the content pane, click **Add**. Type *Windows Hello for Business Users* or the name of the security group you previously created and click **OK**.
|
||||||
|
5. Click the **Delegation** tab. Select **Authenticated Users** and click **Advanced**.
|
||||||
|
6. In the **Group or User names** list, select **Authenticated Users**. In the **Permissions for Authenticated Users** list, clear the **Allow** check box for the **Apply Group Policy** permission. Click **OK**.
|
||||||
|
|
||||||
|
#### Deploy the Windows Hello for Business Group Policy object
|
||||||
|
|
||||||
|
The application of the Windows Hello for Business Group Policy object uses security group filtering. This enables you to link the Group Policy object at the domain, ensuring the Group Policy object is within scope to all users. However, the security group filtering ensures only the users included in the *Windows Hello for Business Users* global group receive and apply the Group Policy object, which results in the provisioning of Windows Hello for Business.
|
||||||
|
1. Start the **Group Policy Management Console** (gpmc.msc)
|
||||||
|
2. In the navigation pane, expand the domain and right-click the node that has your Active Directory domain name and click **Link an existing GPO<50>**
|
||||||
|
3. In the **Select GPO** dialog box, select **Enable Windows Hello for Business** or the name of the Windows Hello for Business Group Policy object you previously created and click **OK**.
|
||||||
|
|
||||||
|
Just to reassure, linking the **Windows Hello for Business** Group Policy object to the domain ensures the Group Policy object is in scope for all domain users. However, not all users will have the policy settings applied to them. Only users who are members of the Windows Hello for Business group receive the policy settings. All others users ignore the Group Policy object.
|
||||||
|
|
||||||
|
## Other Related Group Policy settings
|
||||||
|
|
||||||
|
### Windows Hello for Business
|
||||||
|
|
||||||
|
There are other Windows Hello for Business policy settings you can configure to manage your Windows Hello for Business deployment. These policy settings are computer-based policy setting; so they are applicable to any user that sign-in from a computer with these policy settings.
|
||||||
|
|
||||||
|
#### Use a hardware security device
|
||||||
|
|
||||||
|
The default configuration for Windows Hello for Business is to prefer hardware protected credentials; however, not all computers are able to create hardware protected credentials. When Windows Hello for Business enrollment encounters a computer that cannot create a hardware protected credential, it will create a software-based credential.
|
||||||
|
|
||||||
|
You can enable and deploy the **Use a hardware security device** Group Policy Setting to force Windows Hello for Business to only create hardware protected credentials. Users that sign-in from a computer incapable of creating a hardware protected credential do not enroll for Windows Hello for Business.
|
||||||
|
|
||||||
|
Another policy setting becomes available when you enable the **Use a hardware security device** Group Policy setting that enables you to prevent Windows Hello for Business enrollment from using version 1.2 Trusted Platform Modules (TPM). Version 1.2 TPMs typically perform cryptographic operations slower than version 2.0 TPMs and are more unforgiven during anti-hammering and PIN lockout activities. Therefore, some organization may want not want slow sign-in performance and management overhead associated with version 1.2 TPMs. To prevent Windows Hello for Business from using version 1.2 TPMs, simply select the TPM 1.2 check box after you enable the Use a hardware security device Group Policy object.
|
||||||
|
|
||||||
|
#### Use biometrics
|
||||||
|
|
||||||
|
Windows Hello for Business provides a great user experience when combined with the use of biometrics. Rather than providing a PIN to sign-in, a user can use a fingerprint or facial recognition to sign-in to Windows, without sacrificing security.
|
||||||
|
|
||||||
|
The default Windows Hello for Business enables users to enroll and use biometrics. However, some organization may want more time before using biometrics and want to disable their use until they are ready. To not allow users to use biometrics, configure the **Use biometrics** Group Policy setting to disabled and apply it to your computers. The policy setting disabled all biometrics. Currently, Windows does not provide granular policy setting that enable you to disable specific modalities of biometrics such as allow facial recognition, but disallow fingerprint.
|
||||||
|
|
||||||
|
### PIN Complexity
|
||||||
|
|
||||||
|
PIN complexity is not specific to Windows Hello for Business. Windows 10 enables users to use PINs outside of Windows Hello for Business. PIN Complexity Group Policy settings apply to all uses of PINs, even when Windows Hello for Business is not deployed.
|
||||||
|
|
||||||
|
Windows 10 provides eight PIN Complexity Group Policy settings that give you granular control over PIN creation and management. You can deploy these policy settings to computers, where they affect all users creating PINs on that computer; or, you can deploy these settings to users, where they affect those users creating PINs regardless of the computer they use. If you deploy both computer and user PIN complexity Group Policy settings, the user policy settings have precedence over computer policy settings. Also, this conflict resolution is based on the last applied policy. Windows does not merge the policy settings automatically; however, you can deploy Group Policy to provide to accomplish a variety of configurations. The policy settings included are:
|
||||||
|
* Require digits
|
||||||
|
* Require lowercase letters
|
||||||
|
* Maximum PIN length
|
||||||
|
* Minimum PIN length
|
||||||
|
* Expiration
|
||||||
|
* History
|
||||||
|
* Require special characters
|
||||||
|
* Require uppercase letters
|
||||||
|
|
||||||
|
Starting with Windows 10, version 1703, the PIN complexity Group Policy settings have moved to remove misunderstanding that PIN complexity policy settings were exclusive to Windows Hello for Business. The new location of these Group Policy settings is under **Computer Configuration\Administrative Templates\System\PIN Complexity** of the Group Policy editor.
|
||||||
|
|
||||||
|
## Add users to the Windows Hello for Business Users group
|
||||||
|
|
||||||
|
Users must receive the Windows Hello for Business group policy settings and have the proper permission to enroll for the Wwindows Hello for Business Authentication certificate. You can provide users with these settings and permissions by adding the group used synchronize users to the Windows Hello for Business Users group. Users and groups who are not members of this group will not attempt to enroll for Windows Hello for Business.
|
||||||
|
|
||||||
|
### Section Review
|
||||||
|
> [!div class="checklist"]
|
||||||
|
> * Configure domain controllers for automatic certificate enrollment.
|
||||||
|
> * Create Windows Hello for Business Group Policy object.
|
||||||
|
> * Enable the Use Windows Hello for Business policy setting.
|
||||||
|
> * Enable the Use certificate for on-premises authentication policy setting.
|
||||||
|
> * Enable user automatic certificate enrollment.
|
||||||
|
> * Add users or groups to the Windows Hello for Business group
|
||||||
|
|
||||||
|
|
||||||
|
> [!div class="nextstepaction"]
|
||||||
|
[Sign-in and Provision](hello-hybrid-cert-whfb-provision.md)
|
||||||
|
|
||||||
|
<br><br>
|
||||||
|
|
||||||
|
<hr>
|
||||||
|
|
||||||
|
## Follow the Windows Hello for Business hybrid certificate trust deployment guide
|
||||||
|
1. [Overview](hello-hybrid-cert-trust.md)
|
||||||
|
2. [Prerequistes](hello-hybrid-cert-trust-prereqs.md)
|
||||||
|
3. [New Installation Baseline](hello-hybrid-cert-new-install.md)
|
||||||
|
4. [Configure Azure Device Registration](hello-hybrid-cert-trust-devreg.md)
|
||||||
|
5. Configure Windows Hello for Business policy settings (*You are here*)
|
||||||
|
6. [Sign-in and Provision](hello-hybrid-cert-whfb-provision.md)
|
@ -0,0 +1,50 @@
|
|||||||
|
---
|
||||||
|
title: Configure Hybrid Windows Hello for Business Settings (Windows Hello for Business)
|
||||||
|
description: Configuring Windows Hello for Business Settings in Hybrid deployment
|
||||||
|
keywords: identity, PIN, biometric, Hello, passport, WHFB, hybrid, certificate-trust
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security, mobile
|
||||||
|
localizationpriority: high
|
||||||
|
author: mikestephens-MS
|
||||||
|
ms.author: mstephen
|
||||||
|
ms.date: 09/08/2017
|
||||||
|
---
|
||||||
|
# Configure Windows Hello for Business
|
||||||
|
|
||||||
|
**Applies to**
|
||||||
|
- Windows 10
|
||||||
|
|
||||||
|
> [!div class="step-by-step"]
|
||||||
|
[Configure Active Directory >](hello-hybrid-cert-whfb-settings-ad.md)
|
||||||
|
|
||||||
|
>[!IMPORTANT]
|
||||||
|
>This guide only applies to Hybrid deployments for Windows 10, version 1703 or higher.
|
||||||
|
|
||||||
|
You're environment is federated and you are ready to configure your hybrid environment for Windows Hello for business using the certificate trust model.
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> If your environment is not federated, review the [New Installation baseline](hello-hybrid-cert-new-install.md) section of this deployment document to learn how to federate your environment for your Windows Hello for Business deployment.
|
||||||
|
|
||||||
|
The configuration for Windows Hello for Business is grouped in four categories. These categories are:
|
||||||
|
* [Active Directory](hello-hybrid-cert-whfb-settings-ad.md)
|
||||||
|
* [Public Key Infrastructure](hello-hybrid-cert-whfb-settings-pki.md)
|
||||||
|
* [Active Directory Federation Services](hello-hybrid-cert-whfb-settings-adfs.md)
|
||||||
|
* [Group Policy](hello-hybrid-cert-whfb-settings-policy.md)
|
||||||
|
|
||||||
|
For the most efficent deployment, configure these technologies in order beginning with the Active Directory configuration
|
||||||
|
|
||||||
|
> [!div class="step-by-step"]
|
||||||
|
[Configure Active Directory >](hello-hybrid-cert-whfb-settings-ad.md)
|
||||||
|
|
||||||
|
<br><br>
|
||||||
|
|
||||||
|
<hr>
|
||||||
|
|
||||||
|
## Follow the Windows Hello for Business hybrid certificate trust deployment guide
|
||||||
|
1. [Overview](hello-hybrid-cert-trust.md)
|
||||||
|
2. [Prerequistes](hello-hybrid-cert-trust-prereqs.md)
|
||||||
|
3. [New Installation Baseline](hello-hybrid-cert-new-install.md)
|
||||||
|
4. [Configure Azure Device Registration](hello-hybrid-cert-trust-devreg.md)
|
||||||
|
5. Configure Windows Hello for Business settings (*You are here*)
|
||||||
|
6. [Sign-in and Provision](hello-hybrid-cert-whfb-provision.md)
|
@ -10,7 +10,7 @@ ms.pagetype: security, mobile
|
|||||||
author: DaniHalfin
|
author: DaniHalfin
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
ms.author: daniha
|
ms.author: daniha
|
||||||
ms.date: 07/07/2017
|
ms.date: 09/08/2017
|
||||||
---
|
---
|
||||||
# Windows Hello for Business
|
# Windows Hello for Business
|
||||||
|
|
||||||
@ -78,7 +78,7 @@ There are many deployment options from which to choose. Some of those options re
|
|||||||
Windows Hello for Business is two-factor authentication based the observed authentication factors of: something you have, something you know, and something part of you. Windows Hello for Business incorporates two of these factors: something you have (the user's private key protected by the device's security module) and something you know (your PIN). With the proper hardware, you can enhance the user experience by introducing biometrics. Using biometrics, you can replace the "something you know" authentication factor with the "something that is part of you" factor, with the assurances that users can fall back to the "something you know factor".
|
Windows Hello for Business is two-factor authentication based the observed authentication factors of: something you have, something you know, and something part of you. Windows Hello for Business incorporates two of these factors: something you have (the user's private key protected by the device's security module) and something you know (your PIN). With the proper hardware, you can enhance the user experience by introducing biometrics. Using biometrics, you can replace the "something you know" authentication factor with the "something that is part of you" factor, with the assurances that users can fall back to the "something you know factor".
|
||||||
|
|
||||||
### Can I use PIN and biometrics to unlock my device?
|
### Can I use PIN and biometrics to unlock my device?
|
||||||
No. Windows Hello for Business provides two-factor authentication. However, we are investigating the ability to unlock the device with multiple factors.
|
No. Windows Hello for Business provides two-factor authentication. However, we are investigating the ability to unlock the desktop with additional factors.
|
||||||
|
|
||||||
### What is the difference between Windows Hello and Windows Hello for Business
|
### What is the difference between Windows Hello and Windows Hello for Business
|
||||||
Windows Hello represents the biometric framework provided in Windows 10. Windows Hello enables users to use biometrics to sign into their devices by securely storing their username and password and releasing it for authentication when the user successfully identifies themselves using biometrics. Windows Hello for Business uses asymmetric keys protected by the device's security module that requires a user gesture (PIN or biometrics) to authenticate.
|
Windows Hello represents the biometric framework provided in Windows 10. Windows Hello enables users to use biometrics to sign into their devices by securely storing their username and password and releasing it for authentication when the user successfully identifies themselves using biometrics. Windows Hello for Business uses asymmetric keys protected by the device's security module that requires a user gesture (PIN or biometrics) to authenticate.
|
||||||
@ -86,6 +86,28 @@ Windows Hello represents the biometric framework provided in Windows 10. Window
|
|||||||
### I have extended Active Directory to Azure Active Directory. Can I use the on-prem deployment model?
|
### I have extended Active Directory to Azure Active Directory. Can I use the on-prem deployment model?
|
||||||
No. If your organization is federated or using online services, such as Office 365 or OneDrive, then you must use a hybrid deployment model. On-premises deployments are exclusive to organization who need more time before moving to the cloud and exclusively use Active Directory.
|
No. If your organization is federated or using online services, such as Office 365 or OneDrive, then you must use a hybrid deployment model. On-premises deployments are exclusive to organization who need more time before moving to the cloud and exclusively use Active Directory.
|
||||||
|
|
||||||
|
### Does Windows Hello for Business prevent the use of simple PINs?
|
||||||
|
Yes. Our simple PIN algorithm looks for and disallows any PIN that has a constant delta from one digit to the next. This prevents repeating numbers, sequential numbers and simple patterns.
|
||||||
|
So, for example:
|
||||||
|
* 1111 has a constant delta of 0, so it is not allowed
|
||||||
|
* 1234 has a constant delta of 1, so it is not allowed
|
||||||
|
* 1357 has a constant delta of 2, so it is not allowed
|
||||||
|
* 9630 has a constant delta of -3, so it is not allowed
|
||||||
|
* 1231 does not have a constant delta, so it is okay
|
||||||
|
* 1593 does not have a constant delta, so it is okay
|
||||||
|
|
||||||
|
This algorithm does not apply to alphanumeric PINs.
|
||||||
|
|
||||||
|
### How does PIN caching work with Windows Hello for Business?
|
||||||
|
Windows Hello for Business provides a PIN caching user experience using a ticketing system. Rather than caching a PIN, processes cache a ticket they can use to request private key operations. Azure AD and Active Directory sign-in keys are cached under lock. This means the keys remain available for use without prompting as long as the user is interactively signed-in. Microsoft Account sign-in keys are considered transactional keys, which means the user is always prompted when accessing the key.
|
||||||
|
|
||||||
|
Beginning with Windows 10, Fall Creators Update, Windows Hello for Business used as a smart card (smart card emulation that is enabled by default) provides the same user experience of default smart card PIN caching. Each process requesting a private key operation will prompt the user for the PIN on first use. Subsequent private key operations will not prompt the user for the PIN.
|
||||||
|
|
||||||
|
The smart card emulation feature of Windows Hello for Business verifies the PIN and then discards the PIN in exchange for a ticket. The process does not receive the PIN, but rather the ticket that grants them private key operations. Windows 10 does not provide any Group Policy settings to adjust this caching.
|
||||||
|
|
||||||
|
### Can I disable the PIN while using Windows Hello for Business?
|
||||||
|
No. The movement away from passwords is accomplished by gradually reducing the use of the password. In the occurence where you cannot authenticate with biometrics, you need a fall back mechansim that is not a password. The PIN is the fall back mechansim. Disabling or hiding the PIN credential provider disabled the use of biometrics.
|
||||||
|
|
||||||
### Does Windows Hello for Business work with third party federation servers?
|
### Does Windows Hello for Business work with third party federation servers?
|
||||||
Windows Hello for Business can work with any third-party federation servers that support the protocols used during provisioning experience. Interested third-parties can inquiry at [whfbfeedback@microsoft.com](mailto:whfbfeedback@microsoft.com?subject=collaboration)
|
Windows Hello for Business can work with any third-party federation servers that support the protocols used during provisioning experience. Interested third-parties can inquiry at [whfbfeedback@microsoft.com](mailto:whfbfeedback@microsoft.com?subject=collaboration)
|
||||||
|
|
||||||
@ -98,3 +120,4 @@ Windows Hello for Business can work with any third-party federation servers that
|
|||||||
|
|
||||||
### Does Windows Hello for Business work with Mac and Linux clients?
|
### Does Windows Hello for Business work with Mac and Linux clients?
|
||||||
Windows Hello for Business is a feature of Windows 10. At this time, Microsoft is not developing clients for other platforms. However, Microsoft is open to third parties who are interested in moving these platforms away from passwords. Interested third parties can inqury at [whfbfeedback@microsoft.com](mailto:whfbfeedback@microsoft.com?subject=collaboration)
|
Windows Hello for Business is a feature of Windows 10. At this time, Microsoft is not developing clients for other platforms. However, Microsoft is open to third parties who are interested in moving these platforms away from passwords. Interested third parties can inqury at [whfbfeedback@microsoft.com](mailto:whfbfeedback@microsoft.com?subject=collaboration)
|
||||||
|
|
||||||
|
@ -25,7 +25,7 @@ You can create a Group Policy or mobile device management (MDM) policy that will
|
|||||||
>
|
>
|
||||||
>Beginning in version 1607, Windows Hello as a convenience PIN is disabled by default on all domain-joined computers. To enable a convenience PIN for Windows 10, version 1607, enable the Group Policy setting **Turn on convenience PIN sign-in**.
|
>Beginning in version 1607, Windows Hello as a convenience PIN is disabled by default on all domain-joined computers. To enable a convenience PIN for Windows 10, version 1607, enable the Group Policy setting **Turn on convenience PIN sign-in**.
|
||||||
>
|
>
|
||||||
>Use **Windows Hello for Business** policy settings to manage PINs for Windows Hello for Business.
|
>Use **PIN Complexity** policy settings to manage PINs for Windows Hello for Business.
|
||||||
|
|
||||||
## Group Policy settings for Windows Hello for Business
|
## Group Policy settings for Windows Hello for Business
|
||||||
|
|
||||||
@ -292,71 +292,6 @@ The following table lists the MDM policy settings that you can configure for Win
|
|||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
> If policy is not configured to explicitly require letters or special characters, users will be restricted to creating a numeric PIN.
|
> If policy is not configured to explicitly require letters or special characters, users will be restricted to creating a numeric PIN.
|
||||||
|
|
||||||
## Prerequisites
|
|
||||||
|
|
||||||
To deploy Windows Hello for Business, in some modes you must add Windows Server 2016 domain controllers to your Active Directory environment, but you don’t have to replace or remove your existing Active Directory servers — the servers required for Windows Hello for Business build on and add capability to your existing infrastructure. You don’t have to change the domain or forest functional level, and you can either add on-premises servers or use Azure Active Directory to deploy Windows Hello for Business in your network.
|
|
||||||
|
|
||||||
You’ll need this software to set Windows Hello for Business policies in your enterprise.
|
|
||||||
<table>
|
|
||||||
<colgroup>
|
|
||||||
<col width="25%" />
|
|
||||||
<col width="25%" />
|
|
||||||
<col width="25%" />
|
|
||||||
<col width="25%" />
|
|
||||||
</colgroup>
|
|
||||||
<thead>
|
|
||||||
<tr class="header">
|
|
||||||
<th align="left">Windows Hello for Business mode</th>
|
|
||||||
<th align="left">Azure AD</th>
|
|
||||||
<th align="left">Active Directory (AD) on-premises (only supported with Windows 10, version 1703 clients)</th>
|
|
||||||
<th align="left">Azure AD/AD hybrid (available with production release of Windows Server 2016)</th>
|
|
||||||
</tr>
|
|
||||||
</thead>
|
|
||||||
<tbody>
|
|
||||||
<tr class="odd">
|
|
||||||
<td align="left">Key-based authentication</td>
|
|
||||||
<td align="left">Azure AD subscription</td>
|
|
||||||
<td align="left"><ul>
|
|
||||||
<li>Active Directory Federation Service (AD FS) (Windows Server 2016)</li>
|
|
||||||
<li>A few Windows Server 2016 domain controllers on-site</li>
|
|
||||||
</ul></td>
|
|
||||||
<td align="left"><ul>
|
|
||||||
<li>Azure AD subscription</li>
|
|
||||||
<li>[Azure AD Connect](https://go.microsoft.com/fwlink/p/?LinkId=616792)</li>
|
|
||||||
<li>A few Windows Server 2016 domain controllers on-site</li>
|
|
||||||
<li>A management solution, such as Configuration Manager, Group Policy, or MDM</li>
|
|
||||||
<li>Active Directory Certificate Services (AD CS) without Network Device Enrollment Service (NDES)</li>
|
|
||||||
</ul></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="even">
|
|
||||||
<td align="left">Certificate-based authentication</td>
|
|
||||||
<td align="left"><ul>
|
|
||||||
<li>Azure AD subscription</li>
|
|
||||||
<li>Intune or non-Microsoft mobile device management (MDM) solution</li>
|
|
||||||
<li>PKI infrastructure</li>
|
|
||||||
</ul></td>
|
|
||||||
<td align="left"><ul>
|
|
||||||
<li>ADFS (Windows Server 2016)</li>
|
|
||||||
<li>Active Directory Domain Services (AD DS) Windows Server 2016 schema</li>
|
|
||||||
<li>PKI infrastructure</li>
|
|
||||||
</ul></td>
|
|
||||||
<td align="left"><ul>
|
|
||||||
<li>Azure AD subscription</li>
|
|
||||||
<li>[Azure AD Connect](https://go.microsoft.com/fwlink/p/?LinkId=616792)</li>
|
|
||||||
<li>AD CS with NDES</li>
|
|
||||||
<li>Configuration Manager for domain-joined certificate enrollment, or InTune for non-domain-joined devices, or a non-Microsoft MDM service that supports Windows Hello for Business</li>
|
|
||||||
</ul></td>
|
|
||||||
</tr>
|
|
||||||
</tbody>
|
|
||||||
</table>
|
|
||||||
|
|
||||||
Configuration Manager and MDM provide the ability to manage Windows Hello for Business policy and to deploy and manage certificates protected by Windows Hello for Business.
|
|
||||||
|
|
||||||
Azure AD provides the ability to register devices with your enterprise and to provision Windows Hello for Business for organization accounts.
|
|
||||||
|
|
||||||
>[!IMPORTANT]
|
|
||||||
>Active Directory on-premises deployment **is not currently available** and will become available with a future update of ADFS on Windows Server 2016. The requirements listed in the above table will apply when this deployment type becomes available.
|
|
||||||
|
|
||||||
|
|
||||||
## How to use Windows Hello for Business with Azure Active Directory
|
## How to use Windows Hello for Business with Azure Active Directory
|
||||||
|
|
||||||
|
@ -68,7 +68,7 @@ It’s fundamentally important to understand which deployment model to use for a
|
|||||||
|
|
||||||
#### Trust types
|
#### Trust types
|
||||||
|
|
||||||
A deployments trust type defines how each Windows Hello for Business client authenticates to the on-premises Active Directory. There are two trusts types, key trust and certificate trust.
|
A deployments trust type defines how each Windows Hello for Business client authenticates to the on-premises Active Directory. There are two trusts types, key trust and certificate trust.
|
||||||
|
|
||||||
The key trust type does not require issuing authentication certificates to end users. Users authenticate using a hardware-bound key created during an in-box provisioning experience, which requires an adequate distribution of Windows Server 2016 domain controllers relative to your existing authentication and the number of users included in your Windows Hello for Business deployment.
|
The key trust type does not require issuing authentication certificates to end users. Users authenticate using a hardware-bound key created during an in-box provisioning experience, which requires an adequate distribution of Windows Server 2016 domain controllers relative to your existing authentication and the number of users included in your Windows Hello for Business deployment.
|
||||||
|
|
||||||
@ -88,7 +88,7 @@ The goal of Windows Hello for Business is to move organizations away from passwo
|
|||||||
|
|
||||||
Cloud only and hybrid deployments provide many choices for multifactor authentication. On-premises deployments must use a multifactor authentication that provides an AD FS multifactor adapter to be used in conjunction with the on-premises Windows Server 2016 AD FS server role. Organizations can use from the on-premises Azure Multifactor Authentication server, or choose from several third parties (Read [Microsoft and third-party additional authentication methods](https://docs.microsoft.com/windows-server/identity/ad-fs/operations/configure-additional-authentication-methods-for-ad-fs#microsoft-and-third-party-additional-authentication-methods) for more information).
|
Cloud only and hybrid deployments provide many choices for multifactor authentication. On-premises deployments must use a multifactor authentication that provides an AD FS multifactor adapter to be used in conjunction with the on-premises Windows Server 2016 AD FS server role. Organizations can use from the on-premises Azure Multifactor Authentication server, or choose from several third parties (Read [Microsoft and third-party additional authentication methods](https://docs.microsoft.com/windows-server/identity/ad-fs/operations/configure-additional-authentication-methods-for-ad-fs#microsoft-and-third-party-additional-authentication-methods) for more information).
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
> Azure Multi-Factor Authentication is available through a:
|
> Azure Multi-Factor Authentication is available through:
|
||||||
>* Microsoft Enterprise Agreement
|
>* Microsoft Enterprise Agreement
|
||||||
>* Open Volume License Program
|
>* Open Volume License Program
|
||||||
>* Cloud Solution Providers program
|
>* Cloud Solution Providers program
|
||||||
@ -127,11 +127,11 @@ Hybrid and on-premises deployments include Active Directory as part of their inf
|
|||||||
|
|
||||||
### Public Key Infrastructure
|
### Public Key Infrastructure
|
||||||
|
|
||||||
The Windows Hello for Business deployment depends on an enterprise public key infrastructure a trust anchor for authentication. Domain controllers for hybrid and on-prem deployments need a certificate in order for Windows 10 devices to trust the domain controller is a legitimate. Deployments using the certificate trust type need an enterprise public key infrastructure and a certificate registration authority to issue authentication certificates to users. Hybrid deployments may need to issue VPN certificates to users to enable connectivity on-premises resources.
|
The Windows Hello for Business deployment depends on an enterprise public key infrastructure a trust anchor for authentication. Domain controllers for hybrid and on-prem deployments need a certificate in order for Windows 10 devices to trust the domain controller as legitimate. Deployments using the certificate trust type need an enterprise public key infrastructure and a certificate registration authority to issue authentication certificates to users. Hybrid deployments may need to issue VPN certificates to users to enable connectivity on-premises resources.
|
||||||
|
|
||||||
### Cloud
|
### Cloud
|
||||||
|
|
||||||
Some deployment combinations require an Azure account and some require Azure Active Directory for user identities. These cloud requirements can may only need an Azure account while other features need an Azure Active Directory Premium subscription. The planning process identifies and differentiate the components that are needed from the those that are optional.
|
Some deployment combinations require an Azure account and some require Azure Active Directory for user identities. These cloud requirements may only need an Azure account while other features need an Azure Active Directory Premium subscription. The planning process identifies and differentiate the components that are needed from the those that are optional.
|
||||||
|
|
||||||
## Planning a Deployment
|
## Planning a Deployment
|
||||||
|
|
||||||
@ -160,6 +160,10 @@ If your organization does not have cloud resources, write **On-Premises** in box
|
|||||||
|
|
||||||
Choose a trust type that is best suited for your organizations. Remember, the trust type determines two things. Whether you issue authentication certificates to your users and if your deployment needs Windows Server 2016 domain controllers.
|
Choose a trust type that is best suited for your organizations. Remember, the trust type determines two things. Whether you issue authentication certificates to your users and if your deployment needs Windows Server 2016 domain controllers.
|
||||||
|
|
||||||
|
One trust model is not more secure than the other. The major difference is based on the organization comfort with deploying Windows Server 2016 domain controllers and not enrolling users with end enetity certificates (key-trust) against using existing domain controllers (Windows Server 2008R2 or later) and needing to enroll certificates for all their users (certificate trust).
|
||||||
|
|
||||||
|
Because the certificate trust tyoes issues certificates, there is more configuration and infrastrucutre needed to accomodate user certificate enrollment, which could also be a factor to consider in your decision. Additional infrastructure needed for certificatat-trust deployements includes a certificate registration authority. Hybrid Azure AD joined devices managed by Group Policy need the Windows Server 2016 AD FS role to issue certificates. Hybrid Azure AD joined devices and Azure AD joined devices managed by Intune or a compatible MDM need the Windows Server NDES server role to issue certificates.
|
||||||
|
|
||||||
If your organization wants to use the key trust type, write **key trust** in box **1b** on your planning worksheet. Write **Windows Server 2016** in box **4d**. Write **N/A** in box **5b**.
|
If your organization wants to use the key trust type, write **key trust** in box **1b** on your planning worksheet. Write **Windows Server 2016** in box **4d**. Write **N/A** in box **5b**.
|
||||||
|
|
||||||
If your organization wants to use the certificate trust type, write **certificate trust** in box **1b** on your planning worksheet. Write **Windows Server 2008 R2 or later** in box **4d**. In box **5c**, write **smart card logon** under the **Template Name** column and write **users** under the **Issued To** column on your planning worksheet.
|
If your organization wants to use the certificate trust type, write **certificate trust** in box **1b** on your planning worksheet. Write **Windows Server 2008 R2 or later** in box **4d**. In box **5c**, write **smart card logon** under the **Template Name** column and write **users** under the **Issued To** column on your planning worksheet.
|
||||||
@ -188,7 +192,7 @@ If box **1a** on your planning worksheet reads **cloud only**, write **N/A** in
|
|||||||
|
|
||||||
If box **1a** on your planning worksheet reads **hybrid**, then write **Azure AD Connect** in box **1e** on your planning worksheet.
|
If box **1a** on your planning worksheet reads **hybrid**, then write **Azure AD Connect** in box **1e** on your planning worksheet.
|
||||||
|
|
||||||
If box **1a** on your planning worksheet reads **on-premises**, then write **Azure MFA Server**. This deployment exclusive uses Active Directory for user information with the exception of the multifactor authentication. The on-premises Azure MFA server synchronizes a subset of the user information, such as phone number, to provide multifactor authentication while the user’s credential remain on the on-premises network.
|
If box **1a** on your planning worksheet reads **on-premises**, then write **Azure MFA Server**. This deployment exclusively uses Active Directory for user information with the exception of the multifactor authentication. The on-premises Azure MFA server synchronizes a subset of the user information, such as phone number, to provide multifactor authentication while the user’s credential remain on the on-premises network.
|
||||||
|
|
||||||
### Multifactor Authentication
|
### Multifactor Authentication
|
||||||
|
|
||||||
@ -204,13 +208,13 @@ If box **1a** on your planning worksheet reads **hybrid**, then you have a few o
|
|||||||
|
|
||||||
You can directly use the Azure MFA cloud service for the second factor of authentication. Users contacting the service must authenticate to Azure prior to using the service.
|
You can directly use the Azure MFA cloud service for the second factor of authentication. Users contacting the service must authenticate to Azure prior to using the service.
|
||||||
|
|
||||||
If your Azure AD Connect is configured to synchronize identities (usernames only), then your users are redirected to your local on-premises federation server for authentication and then redirected back to the Azure MFA cloud service. Otherwise, your Azure AD Connect is configured to synchronize credentials (username and passwords), which enables your users to authenticate to Azure Active and use the Azure MFA cloud service. If you choose to use the Azure MFA cloud service directly, write **Azure MFA** in box **1f** on your planning worksheet.
|
If your Azure AD Connect is configured to synchronize identities (usernames only), then your users are redirected to your local on-premises federation server for authentication and then redirected back to the Azure MFA cloud service. Otherwise, your Azure AD Connect is configured to synchronize credentials (username and passwords), which enables your users to authenticate to Azure Active Directory and use the Azure MFA cloud service. If you choose to use the Azure MFA cloud service directly, write **Azure MFA** in box **1f** on your planning worksheet.
|
||||||
|
|
||||||
You can configure your on-premises Windows Server 2016 AD FS role to use the Azure MFA service adapter. In this configuration, users are redirected to the on premises AD FS server (synchronizing identities only). The AD FS server uses the MFA adapter to communicate to the Azure MFA service to perform the second factor of authentication. If you choose to use AD FS with the Azure MFA cloud service adapter, write **AD FS with Azure MFA cloud adapter** in box **1f** on your planning worksheet.
|
You can configure your on-premises Windows Server 2016 AD FS role to use the Azure MFA service adapter. In this configuration, users are redirected to the on premises AD FS server (synchronizing identities only). The AD FS server uses the MFA adapter to communicate to the Azure MFA service to perform the second factor of authentication. If you choose to use AD FS with the Azure MFA cloud service adapter, write **AD FS with Azure MFA cloud adapter** in box **1f** on your planning worksheet.
|
||||||
|
|
||||||
Alternatively, you can use AD FS with an on-premises Azure MFA server adapter. Rather than AD FS communicating directly with the Azure MFA cloud service, it communicates with an on-premises AD FS server that synchronizes user information with the on-premises Active Directory. The Azure MFA server communicates with Azure MFA cloud services to perform the second factor of authentication. If you choose to use AD FS with the Azure MFA server adapter, write **AD FS with Azure MFA server adapter** in box **1f** on your planning worksheet.
|
Alternatively, you can use AD FS with an on-premises Azure MFA server adapter. Rather than AD FS communicating directly with the Azure MFA cloud service, it communicates with an on-premises Azure MFA server that synchronizes user information with the on-premises Active Directory. The Azure MFA server communicates with Azure MFA cloud services to perform the second factor of authentication. If you choose to use AD FS with the Azure MFA server adapter, write **AD FS with Azure MFA server adapter** in box **1f** on your planning worksheet.
|
||||||
|
|
||||||
The last option is for you to use AD FS with a third-party adapter to as the second factor of authentication. If you choose to use AD FS with a third-party MFA adapter, write **AD FS with third party** in box **1f** on your planning worksheet.
|
The last option is for you to use AD FS with a third-party adapter as the second factor of authentication. If you choose to use AD FS with a third-party MFA adapter, write **AD FS with third party** in box **1f** on your planning worksheet.
|
||||||
|
|
||||||
If box **1a** on your planning worksheet reads **on-premises**, then you have two second factor authentication options. You must use Windows Server 2016 AD FS with your choice of the on-premises Azure MFA server or with a third-party MFA adapter.
|
If box **1a** on your planning worksheet reads **on-premises**, then you have two second factor authentication options. You must use Windows Server 2016 AD FS with your choice of the on-premises Azure MFA server or with a third-party MFA adapter.
|
||||||
|
|
||||||
@ -261,15 +265,15 @@ Review the trust type portion of this section if box **4d** on your planning wor
|
|||||||
|
|
||||||
### Public Key Infrastructure
|
### Public Key Infrastructure
|
||||||
|
|
||||||
Public key infrastructure prerequisites already exist on your planning worksheet. These conditions are the minimum requirements for any hybrid our on-premises deployment. Additional conditions may be needed based on your trust type.
|
Public key infrastructure prerequisites already exist in your planning worksheet. These conditions are the minimum requirements for any hybrid or on-premises deployment. Additional conditions may be needed based on your trust type.
|
||||||
|
|
||||||
If box **1a** on your planning worksheet reads **cloud only**, ignore the public key infrastructure section of your planning worksheet. Cloud only deployments do not use a public key infrastructure.
|
If box **1a** on your planning worksheet reads **cloud only**, ignore the public key infrastructure section of your planning worksheet. Cloud only deployments do not use a public key infrastructure.
|
||||||
|
|
||||||
If box **1b** on your planning worksheet reads **key trust**, write **N/A** in box **5b** on your planning worksheet.
|
If box **1b** on your planning worksheet reads **key trust**, write **N/A** in box **5b** on your planning worksheet.
|
||||||
|
|
||||||
The registration authority only relates to certificate trust deployments and the management used for domain and non-domain joined devices.
|
The registration authority only relates to certificate trust deployments and the management used for domain and non-domain joined devices. Hybrid Azure AD joined devices managed by Group Policy need the Windows Server 2016 AD FS role to issue certificates. Hybrid Azure AD joined devices and Azure AD joined devices managed by Intune or a compatible MDM need the Windows Server NDES server role to issue certificates.
|
||||||
|
|
||||||
If box **3a** reads **GP** and box **3b** reads **modern management**, write **AD FS RA and NDES** in box **5b** on your planning worksheet. In box **5c**, write the following certificate templates names and issuances:
|
If box **2a** reads **GP** and box **2b** reads **modern management**, write **AD FS RA and NDES** in box **5b** on your planning worksheet. In box **5c**, write the following certificate templates names and issuances:
|
||||||
|
|
||||||
| Certificate Template Name | Issued To |
|
| Certificate Template Name | Issued To |
|
||||||
| --- | --- |
|
| --- | --- |
|
||||||
@ -279,14 +283,14 @@ If box **3a** reads **GP** and box **3b** reads **modern management**, write **A
|
|||||||
| Web Server | NDES |
|
| Web Server | NDES |
|
||||||
| CEP Encryption | NDES |
|
| CEP Encryption | NDES |
|
||||||
|
|
||||||
If box **3a** reads **GP** and box **3b** reads **N/A**, write **AD FA RA** in box **5b** and write the following certificate template names and issuances in box **5c** on your planning worksheet.
|
If box **2a** reads **GP** and box **2b** reads **N/A**, write **AD FA RA** in box **5b** and write the following certificate template names and issuances in box **5c** on your planning worksheet.
|
||||||
|
|
||||||
| Certificate Template Name | Issued To |
|
| Certificate Template Name | Issued To |
|
||||||
| --- | --- |
|
| --- | --- |
|
||||||
| Exchange Enrollment Agent | AD FS RA |
|
| Exchange Enrollment Agent | AD FS RA |
|
||||||
| Web Server | AD FS RA |
|
| Web Server | AD FS RA |
|
||||||
|
|
||||||
If box **3a** or **3b** reads modern management, write **NDES** in box **5b** and write the following certificate template names and issuances in box 5c on your planning worksheet.
|
If box **2a** or **2b** reads modern management, write **NDES** in box **5b** and write the following certificate template names and issuances in box 5c on your planning worksheet.
|
||||||
|
|
||||||
| Certificate Template Name | Issued To |
|
| Certificate Template Name | Issued To |
|
||||||
| --- | --- |
|
| --- | --- |
|
||||||
|
After Width: | Height: | Size: 52 KiB |
BIN
windows/access-protection/hello-for-business/images/dsregcmd.png
Normal file
After Width: | Height: | Size: 81 KiB |
BIN
windows/access-protection/hello-for-business/images/event358.png
Normal file
After Width: | Height: | Size: 80 KiB |
After Width: | Height: | Size: 87 KiB |
After Width: | Height: | Size: 177 KiB |
After Width: | Height: | Size: 49 KiB |
After Width: | Height: | Size: 28 KiB |
After Width: | Height: | Size: 8.8 KiB |
After Width: | Height: | Size: 55 KiB |
After Width: | Height: | Size: 79 KiB |
After Width: | Height: | Size: 350 KiB |
BIN
windows/access-protection/hello-for-business/images/mfa.png
Normal file
After Width: | Height: | Size: 106 KiB |
@ -1,4 +1,4 @@
|
|||||||
# [Windows Hello for Business](hello-identity-verification.md)
|
# [Windows Hello for Business](hello-identity-verification.md)
|
||||||
|
|
||||||
## [Windows Hello for Business Overview](hello-overview.md)
|
## [Windows Hello for Business Overview](hello-overview.md)
|
||||||
## [How Windows Hello for Business works](hello-how-it-works.md)
|
## [How Windows Hello for Business works](hello-how-it-works.md)
|
||||||
@ -13,6 +13,12 @@
|
|||||||
## [Planning a Windows Hello for Business Deployment](hello-planning-guide.md)
|
## [Planning a Windows Hello for Business Deployment](hello-planning-guide.md)
|
||||||
|
|
||||||
## [Windows Hello for Business Deployment Guide](hello-deployment-guide.md)
|
## [Windows Hello for Business Deployment Guide](hello-deployment-guide.md)
|
||||||
|
### [Hybrid Azure AD Joined Certificate Trust Deployment](hello-hybrid-cert-trust.md)
|
||||||
|
#### [Prerequistes](hello-hybrid-cert-trust-prereqs.md)
|
||||||
|
#### [New Installation Baseline](hello-hybrid-cert-new-install.md)
|
||||||
|
#### [Configure Azure Device Registration](hello-hybrid-cert-trust-devreg.md)
|
||||||
|
#### [Configure Windows Hello for Business policy settings](hello-hybrid-cert-whfb-settings.md)
|
||||||
|
#### [Sign-in and Provision](hello-hybrid-cert-whfb-provision.md)
|
||||||
|
|
||||||
### [On Premises Certificate Trust Deployment](hello-deployment-cert-trust.md)
|
### [On Premises Certificate Trust Deployment](hello-deployment-cert-trust.md)
|
||||||
#### [Validate Active Directory prerequisites](hello-cert-trust-validate-ad-prereq.md)
|
#### [Validate Active Directory prerequisites](hello-cert-trust-validate-ad-prereq.md)
|
||||||
|
After Width: | Height: | Size: 15 KiB |
After Width: | Height: | Size: 26 KiB |
@ -1,96 +1,145 @@
|
|||||||
---
|
---
|
||||||
title: Protect Remote Desktop credentials with Remote Credential Guard (Windows 10)
|
title: Protect Remote Desktop credentials with Windows Defender Remote Credential Guard (Windows 10)
|
||||||
description: Remote Credential Guard helps to secure your Remote Desktop credentials by never sending them to the target device.
|
description: Windows Defender Remote Credential Guard helps to secure your Remote Desktop credentials by never sending them to the target device.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: explore
|
ms.mktglfcycl: explore
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
author: brianlic-msft
|
author: brianlic-msft
|
||||||
---
|
---
|
||||||
# Protect Remote Desktop credentials with Remote Credential Guard
|
# Protect Remote Desktop credentials with Windows Defender Remote Credential Guard
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows Server 2016
|
- Windows Server 2016
|
||||||
|
|
||||||
Introduced in Windows 10, version 1607, Remote Credential Guard helps you protect your credentials over a Remote Desktop connection by redirecting the Kerberos requests back to the device that's requesting the connection. It also provides single sign on experiences for Remote Desktop sessions. If the target device is compromised, your credentials are not exposed because both credential and credential derivatives are never sent to the target device.
|
Introduced in Windows 10, version 1607, Windows Defender Remote Credential Guard helps you protect your credentials over a Remote Desktop connection by redirecting Kerberos requests back to the device that's requesting the connection. It also provides single sign-on experiences for Remote Desktop sessions.
|
||||||
|
|
||||||
You can use Remote Credential Guard in the following ways:
|
Administrator credentials are highly privileged and must be protected. By using Windows Defender Remote Credential Guard to connect during Remote Desktop sessions, if the target device is compromised, your credentials are not exposed because both credential and credential derivatives are never passed over the network to the target device.
|
||||||
|
|
||||||
- Administrator credentials are highly privileged and must be protected. By using Remote Credential Guard to connect, you can be assured that your credentials are not passed over the network to the target device.
|
> [!IMPORTANT]
|
||||||
|
> For information on Remote Desktop connection scenarios involving helpdesk support, see [Remote Desktop connections and helpdesk support scenarios](#helpdesk) in this article.
|
||||||
|
|
||||||
- Helpdesk employees in your organization must connect to domain-joined devices that could be compromised. With Remote Credential Guard, the helpdesk employee can use RDP to connect to the target device without compromising their credentials to malware.
|
<a id="comparing-remote-credential-guard-with-other-remote-desktop-connection-options"></a>
|
||||||
|
|
||||||
## Comparing Remote Credential Guard with a server protected with Credential Guard
|
## Comparing Windows Defender Remote Credential Guard with other Remote Desktop connection options
|
||||||
|
|
||||||
Use the following diagrams to help understand how Remote Credential Guard works, what it helps protect against, and how it compares with using a server protected with Credential Guard. As the diagram shows, Remote Credential Guard blocks NTLM (allowing only Kerberos), prevents Pass the Hash, and prevents usage of a credential after disconnection.
|
The following diagram helps you to understand how a standard Remote Desktop session to a server without Windows Defender Remote Credential Guard works:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
## Comparing Remote Credential Guard with other options for Remote Desktop connections
|
<br />
|
||||||
|
|
||||||
Use the following table to compare different security options for Remote Desktop connections.
|
The following diagram helps you to understand how Windows Defender Remote Credential Guard works, what it helps to protect against, and compares it with the [Restricted Admin mode](http://social.technet.microsoft.com/wiki/contents/articles/32905.how-to-enable-restricted-admin-mode-for-remote-desktop.aspx) option:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
<br />
|
||||||
|
As illustrated, Windows Defender Remote Credential Guard blocks NTLM (allowing only Kerberos), prevents Pass-the-Hash (PtH) attacks, and also prevents use of credentials after disconnection.
|
||||||
|
|
||||||
|
<br />
|
||||||
|
<br />
|
||||||
|
Use the following table to compare different Remote Desktop connection security options:
|
||||||
|
|
||||||
|
<br />
|
||||||
|
<br />
|
||||||
|
|
||||||
|
|**Feature** | **Remote Desktop** | **Windows Defender Remote Credential Guard** | **Restricted Admin mode** |
|
||||||
|
|---|---|---|---|
|
||||||
|
| **Protection benefits** | Credentials on the server are not protected from Pass-the-Hash attacks. |User credentials remain on the client. An attacker can act on behalf of the user *only* when the session is ongoing | User logs on to the server as local administrator, so an attacker cannot act on behalf of the “domain user”. Any attack is local to the server|
|
||||||
|
| **Version support** | The remote computer can run any Windows operating system|Both the client and the remote computer must be running **at least Windows 10, version 1607, or Windows Server 2016**.|The remote computer must be running **at least patched Windows 7 or patched Windows Server 2008 R2**. <br /><br />For more information about patches (software updates) related to Restricted Admin mode, see [Microsoft Security Advisory 2871997](https://technet.microsoft.com/library/security/2871997.aspx).
|
||||||
|
|**Helps prevent** | N/A |<ul><li> Pass-the-Hash</li> <li>Use of a credential after disconnection </li></ul>|<ul><li> Pass-the-Hash</li> <li>Use of domain identity during connection </li></ul>|
|
||||||
|
|**Credentials supported from the remote desktop client device**|<ul><li>**Signed on** credentials <li> **Supplied** credentials<li> **Saved** credentials </ul>|<ul><li> **Signed on** credentials only | <ul><li>**Signed on** credentials<li>**Supplied** credentials<li>**Saved** credentials</ul>
|
||||||
|
|**Access**|**Users allowed**, that is, members of Remote Desktop Users group of remote host.|**Users allowed**, that is, members of Remote Desktop Users of remote host.|**Administrators only**, that is, only members of Administrators group of remote host.
|
||||||
|
|**Network identity**|Remote Desktop session **connects to other resources as signed-in user**. | Remote Desktop session **connects to other resources as signed-in user**. |Remote Desktop session **connects to other resources as remote host’s identity**.|
|
||||||
|
|**Multi-hop**|From the remote desktop, **you can connect through Remote Desktop to another computer** | From the remote desktop, you **can connect through Remote Desktop to another computer**.|Not allowed for user as the session is running as a local host account|
|
||||||
|
|**Supported authentication** |Any negotiable protocol.| Kerberos only.|Any negotiable protocol|
|
||||||
|
<br />
|
||||||
|
|
||||||
|
For further technical information, see [Remote Desktop Protocol](https://msdn.microsoft.com/library/aa383015(v=vs.85).aspx)
|
||||||
|
and [How Kerberos works](https://technet.microsoft.com/en-us/library/cc961963.aspx(d=robot))
|
||||||
|
|
||||||
|
<br />
|
||||||
|
|
||||||
|
<a id="helpdesk"></a>
|
||||||
|
|
||||||
|
## Remote Desktop connections and helpdesk support scenarios
|
||||||
|
|
||||||
|
For helpdesk support scenarios in which personnel require administrative access to provide remote assistance to computer users via Remote Desktop sessions, Microsoft recommends that Windows Defender Remote Credential Guard should not be used in that context. This is because if an RDP session is initiated to a compromised client that an attacker already controls, the attacker could use that open channel to create sessions on the user's behalf (without compromising credentials) to access any of the user’s resources for a limited time (a few hours) after the session disconnects.
|
||||||
|
|
||||||
|
Therefore, we recommend instead that you use the Restricted Admin mode option. For helpdesk support scenarios, RDP connections should only be initiated using the /RestrictedAdmin switch. This helps ensure that credentials and other user resources are not exposed to compromised remote hosts. For more information, see [Mitigating Pass-the-Hash and Other Credential Theft v2](http://download.microsoft.com/download/7/7/A/77ABC5BD-8320-41AF-863C-6ECFB10CB4B9/Mitigating-Pass-the-Hash-Attacks-and-Other-Credential-Theft-Version-2.pdf).
|
||||||
|
|
||||||
|
To further harden security, we also recommend that you implement Local Administrator Password Solution (LAPS), a Group Policy client-side extension (CSE) introduced in Windows 8.1 that automates local administrator password management. LAPS mitigates the risk of lateral escalation and other cyberattacks facilitated when customers use the same administrative local account and password combination on all their computers. You can download and install LAPS [here](https://www.microsoft.com/en-us/download/details.aspx?id=46899).
|
||||||
|
|
||||||
|
For further information on LAPS, see [Microsoft Security Advisory 3062591](https://technet.microsoft.com/en-us/library/security/3062591.aspx).
|
||||||
|
|
||||||
|
|
||||||
|
<a id="reqs"></a>
|
||||||
|
|
||||||
|
## Remote Credential Guard requirements
|
||||||
|
|
||||||
|
To use Windows Defender Remote Credential Guard, the Remote Desktop client and remote host must meet the following requirements:
|
||||||
|
|
||||||
|
The Remote Desktop client device:
|
||||||
|
|
||||||
|
- Must be running at least Windows 10, version 1703 to be able to supply credentials.
|
||||||
|
- Must be running at least Windows 10, version 1607 or Windows Server 2016 to use the user’s signed-in credentials. This requires the user’s account be able to sign in to both the client device and the remote host.
|
||||||
|
- Must be running the Remote Desktop Classic Windows application. The Remote Desktop Universal Windows Platform application doesn't support Windows Defender Remote Credential Guard.
|
||||||
|
- Must use Kerberos authentication to connect to the remote host. If the client cannot connect to a domain controller, then RDP attempts to fall back to NTLM. Windows Defender Remote Credential Guard does not allow NTLM fallback because this would expose credentials to risk.
|
||||||
|
|
||||||
|
The Remote Desktop remote host:
|
||||||
|
|
||||||
|
- Must be running at least Windows 10, version 1607 or Windows Server 2016.
|
||||||
|
- Must allow Restricted Admin connections.
|
||||||
|
- Must allow the client’s domain user to access Remote Desktop connections.
|
||||||
|
- Must allow delegation of non-exportable credentials.
|
||||||
|
|
||||||
|
There are no hardware requirements for Windows Defender Remote Credential Guard.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> This table compares different options than are shown in the previous diagram.
|
> Remote Desktop client devices running earlier versions, at minimum Windows 10 version 1607, only support signed-in credentials, so the client device must also be joined to an Active Directory domain. Both Remote Desktop client and server must either be joined to the same domain, or the Remote Desktop server can be joined to a domain that has a trust relationship to the client device's domain.
|
||||||
|
|
||||||
| Remote Desktop | Remote Credential Guard | Restricted Admin mode |
|
- For Windows Defender Remote Credential Guard to be supported, the user must authenticate to the remote host using Kerberos authentication.
|
||||||
|---|---|---|
|
- The remote host must be running at least Windows 10 version 1607, or Windows Server 2016.
|
||||||
| Protection: Provides **less protection** than other modes in this table. | Protection: Provides **moderate protection**, compared to other modes in this table. | Protection: Provides **the most protection** of the modes in this table. However, it also requires you to be in the local “Administrators” group on the remote computer. |
|
- The Remote Desktop classic Windows app is required. The Remote Desktop Universal Windows Platform app doesn't support Windows Defender Remote Credential Guard.
|
||||||
| Version support: The remote computer can be running **any operating system that supports credential delegation**, which was introduced in Windows Vista. | Version support: The remote computer must be running **at least Windows 10, version 1607, or Windows Server 2016**. | Version support: The remote computer must be running **at least patched Windows 7 or patched Windows Server 2008 R2**.<br><br>For more information about patches (software updates) related to Restricted Admin mode, see [Microsoft Security Advisory 2871997](https://technet.microsoft.com/library/security/2871997.aspx). |
|
|
||||||
| NA | Helps prevent:<br><br>- **Pass the Hash**<br>- Usage of a **credential after disconnection** | Prevents:<br><br>- **Pass the Hash**<br>- Usage of **domain identity during connection** |
|
|
||||||
| Credentials supported from the remote desktop client device:<br><br>- **Signed on** credentials<br>- **Supplied** credentials<br>- **Saved** credentials | Credentials supported from the remote desktop client device:<br><br>- **Signed on** credentials only | Credentials supported from the remote desktop client device:<br><br>- **Signed on** credentials<br>- **Supplied** credentials<br>- **Saved** credentials |
|
|
||||||
| Access: **Users allowed**, that is, members of remote desktop users group of remote host. | Access: **Users allowed**, that is, members of remote desktop users group of remote host. | Access: **Administrators only**, that is, only members in administrators group of remote host. |
|
|
||||||
| Network identity: Remote desktop session **connects to other resources as signed on user**. | Network identity: Remote desktop session **connects to other resources as signed on user**. | Network identity: Remote desktop session **connects to other resources as remote host’s identity**. |
|
|
||||||
| Multi-hop: From the remote desktop, you **can connect through Remote Desktop to another computer**. | Multi-hop: From the remote desktop, you **can connect through Remote Desktop to another computer**. | No multi-hop: From the remote desktop, you **cannot connect through Remote Desktop to another computer**. |
|
|
||||||
| Supported authentication protocol: **Any negotiable protocol**. | Supported authentication protocol: **Kerberos only**. | Supported authentication protocol: **Any negotiable protocol**. |
|
|
||||||
|
|
||||||
## Hardware and software requirements
|
## Enable Windows Defender Remote Credential Guard
|
||||||
|
|
||||||
The Remote Desktop client and server must meet the following requirements in order to use Remote Credential Guard:
|
You must enable Restricted Admin or Windows Defender Remote Credential Guard on the remote host by using the Registry.
|
||||||
|
|
||||||
- They must be joined to an Active Directory domain
|
1. Open Registry Editor on the remote host.
|
||||||
- Both devices must either joined to the same domain or the Remote Desktop server must be joined to a domain with a trust relationship to the client device's domain.
|
2. Enable Restricted Admin and Windows Defender Remote Credential Guard:
|
||||||
- They must use Kerberos authentication.
|
|
||||||
- They must be running at least Windows 10, version 1607 or Windows Server 2016.
|
|
||||||
- The Remote Desktop classic Windows app is required. The Remote Desktop Universal Windows Platform app doesn't support Remote Credential Guard.
|
|
||||||
|
|
||||||
## Enable Remote Credential Guard
|
|
||||||
|
|
||||||
You must enable Remote Credential Guard on the target device by using the registry.
|
|
||||||
|
|
||||||
1. Open Registry Editor.
|
|
||||||
2. Enable Remote Credential Guard:
|
|
||||||
- Go to HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa.
|
- Go to HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa.
|
||||||
- Add a new DWORD value named **DisableRestrictedAdmin**. Set the value of this registry setting to 0 to turn on Remote Credential Guard.
|
- Add a new DWORD value named **DisableRestrictedAdmin**.
|
||||||
|
- To turn on Restricted Admin and Windows Defender Remote Credential Guard, set the value of this registry setting to 0 to turn on Windows Defender Remote Credential Guard.
|
||||||
3. Close Registry Editor.
|
3. Close Registry Editor.
|
||||||
|
|
||||||
You can add this by running the following from an elevated command prompt:
|
You can add this by running the following command from an elevated command prompt:
|
||||||
|
|
||||||
```
|
```
|
||||||
reg add HKLM\SYSTEM\CurrentControlSet\Control\Lsa /v DisableRestrictedAdmin /d 0 /t REG_DWORD
|
reg add HKLM\SYSTEM\CurrentControlSet\Control\Lsa /v DisableRestrictedAdmin /d 0 /t REG_DWORD
|
||||||
```
|
```
|
||||||
|
|
||||||
## Using Remote Credential Guard
|
## Using Windows Defender Remote Credential Guard
|
||||||
|
|
||||||
You can use Remote Credential Guard on the client device by setting a Group Policy or by using a parameter with Remote Desktop Connection.
|
Beginning with Windows 10 version 1703, you can enable Windows Defender Remote Credential Guard on the client device either by using Group Policy or by using a parameter with the Remote Desktop Connection.
|
||||||
|
|
||||||
### Turn on Remote Credential Guard by using Group Policy
|
### Turn on Windows Defender Remote Credential Guard by using Group Policy
|
||||||
|
|
||||||
1. From the Group Policy Management Console, go to **Computer Configuration** -> **Administrative Templates** -> **System** -> **Credentials Delegation**.
|
1. From the Group Policy Management Console, go to **Computer Configuration** -> **Administrative Templates** -> **System** -> **Credentials Delegation**.
|
||||||
|
|
||||||
2. Double-click **Restrict delegation of credentials to remote servers**.
|
2. Double-click **Restrict delegation of credentials to remote servers**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
3. Under **Use the following restricted mode**:
|
3. Under **Use the following restricted mode**:
|
||||||
- If you want to require either [Restricted Admin mode](http://social.technet.microsoft.com/wiki/contents/articles/32905.how-to-enable-restricted-admin-mode-for-remote-desktop.aspx) or Remote Credential Guard, choose **Prefer Remote Credential Guard**. In this configuration, Remote Credential Guard is preferred, but it will use Restricted Admin mode (if supported) when Remote Credential Guard cannot be used.
|
- If you want to require either [Restricted Admin mode](http://social.technet.microsoft.com/wiki/contents/articles/32905.how-to-enable-restricted-admin-mode-for-remote-desktop.aspx) or Windows Defender Remote Credential Guard, choose **Prefer Windows Defender Remote Credential Guard**. In this configuration, Windows Defender Remote Credential Guard is preferred, but it will use Restricted Admin mode (if supported) when Windows Defender Remote Credential Guard cannot be used.
|
||||||
|
|
||||||
> **Note:** Neither Remote Credential Guard nor Restricted Admin mode will send credentials in clear text to the Remote Desktop server.
|
> **Note:** Neither Windows Defender Remote Credential Guard nor Restricted Admin mode will send credentials in clear text to the Remote Desktop server.
|
||||||
|
|
||||||
- If you want to require Remote Credential Guard, choose **Require Remote Credential Guard**. With this setting, a Remote Desktop connection will succeed only if the remote computer meets the [Hardware and software requirements](#hardware-and-software-requirements) listed earlier in this topic.
|
- If you want to require Windows Defender Remote Credential Guard, choose **Require Windows Defender Remote Credential Guard**. With this setting, a Remote Desktop connection will succeed only if the remote computer meets the [requirements](#reqs) listed earlier in this topic.
|
||||||
|
|
||||||
- If you want to require Restricted Admin mode, choose **Require Restricted Admin**. For information about Restricted Admin mode, see the table in [Comparing Remote Credential Guard with other options for Remote Desktop connections](#comparing-remote-credential-guard-with-other-options-for-remote-desktop-connections), earlier in this topic.
|
- If you want to require Restricted Admin mode, choose **Require Restricted Admin**. For information about Restricted Admin mode, see the table in [Comparing Windows Defender Remote Credential Guard with other Remote Desktop connection options](#comparing-remote-credential-guard-with-other-remote-desktop-connection-options), earlier in this topic.
|
||||||
|
|
||||||
4. Click **OK**.
|
4. Click **OK**.
|
||||||
|
|
||||||
@ -99,29 +148,23 @@ You can use Remote Credential Guard on the client device by setting a Group Poli
|
|||||||
6. From a command prompt, run **gpupdate.exe /force** to ensure that the Group Policy object is applied.
|
6. From a command prompt, run **gpupdate.exe /force** to ensure that the Group Policy object is applied.
|
||||||
|
|
||||||
|
|
||||||
### Use Remote Credential Guard with a parameter to Remote Desktop Connection
|
### Use Windows Defender Remote Credential Guard with a parameter to Remote Desktop Connection
|
||||||
|
|
||||||
If you don't use Group Policy in your organization, you can add the remoteGuard parameter when you start Remote Desktop Connection to turn on Remote Credential Guard for that connection.
|
If you don't use Group Policy in your organization, or if not all your remote hosts support Remote Credential Guard, you can add the remoteGuard parameter when you start Remote Desktop Connection to turn on Windows Defender Remote Credential Guard for that connection.
|
||||||
|
|
||||||
```
|
```
|
||||||
mstsc.exe /remoteGuard
|
mstsc.exe /remoteGuard
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|
||||||
## Considerations when using Remote Credential Guard
|
## Considerations when using Windows Defender Remote Credential Guard
|
||||||
|
|
||||||
- Remote Credential Guard does not include device claims. For example, if you’re trying to access a file server from the remote and the file server requires device claim, access will be denied.
|
- Windows Defender Remote Credential Guard does not support compound authentication. For example, if you’re trying to access a file server from a remote host that requires a device claim, access will be denied.
|
||||||
|
|
||||||
- Remote Credential Guard cannot be used to connect to a device that is joined to Azure Active Directory.
|
- Windows Defender Remote Credential Guard cannot be used to connect to a device that is not domain-joined to Active Directory, for example, remote hosts joined to Azure Active Directory.
|
||||||
|
|
||||||
- Remote Desktop Credential Guard only works with the RDP protocol.
|
- Remote Desktop Credential Guard only works with the RDP protocol.
|
||||||
|
|
||||||
- No credentials are sent to the target device, but the target device still acquires the Kerberos Service Tickets on its own.
|
- No credentials are sent to the target device, but the target device still acquires Kerberos Service Tickets on its own.
|
||||||
|
|
||||||
- Remote Desktop Gateway is not compatible with Remote Credential Guard.
|
|
||||||
|
|
||||||
- You cannot use saved credentials or credentials that are different than yours. You must use the credentials of the user who is logged into the device.
|
|
||||||
|
|
||||||
- Both the client and the server must be joined to the same domain or the domains must have a trust relationship.
|
|
||||||
|
|
||||||
- The server and client must authenticate using Kerberos.
|
- The server and client must authenticate using Kerberos.
|
@ -35,15 +35,15 @@ Many network administrators do not want to tackle the difficult task of determin
|
|||||||
|
|
||||||
With few exceptions, the firewall can be enabled on all configurations. Therefore, we recommended that you enable the firewall on every device in your organization. This includes servers in your perimeter network, on mobile and remote clients that connect to the network, and on all servers and clients in your internal network.
|
With few exceptions, the firewall can be enabled on all configurations. Therefore, we recommended that you enable the firewall on every device in your organization. This includes servers in your perimeter network, on mobile and remote clients that connect to the network, and on all servers and clients in your internal network.
|
||||||
|
|
||||||
>**Caution:** Stopping the service associated with Windows Firewall with Advanced Security is not supported by Microsoft.
|
>**Caution:** Stopping the service associated with Windows Defender Firewall with Advanced Security is not supported by Microsoft.
|
||||||
|
|
||||||
By default, in new installations, Windows Firewall is turned on in Windows Server 2012, Windows 8, and later.
|
By default, in new installations, Windows Defender Firewall with Advanced Security is turned on in Windows Server 2012, Windows 8, and later.
|
||||||
|
|
||||||
If you turn off the Windows Firewall with Advanced Security service you lose other benefits provided by the service, such as the ability to use IPsec connection security rules, Windows Service Hardening, and network protection from forms of attacks that use network fingerprinting.
|
If you turn off the Windows Defender Firewall service you lose other benefits provided by the service, such as the ability to use IPsec connection security rules, Windows Service Hardening, and network protection from forms of attacks that use network fingerprinting.
|
||||||
|
|
||||||
Compatible third-party firewall software can programmatically disable only the parts of Windows Firewall with Advanced Security that might need to be disabled for compatibility. This is the recommended approach for third-party firewalls to coexist with the Windows Firewall; third-party party firewalls that comply with this recommendation have the certified logo from Microsoft.
|
Compatible third-party firewall software can programmatically disable only the parts of Windows Defender Firewall that might need to be disabled for compatibility. This is the recommended approach for third-party firewalls to coexist with the Windows Defender Firewall; third-party party firewalls that comply with this recommendation have the certified logo from Microsoft.
|
||||||
|
|
||||||
An organization typically uses this design as a first step toward a more comprehensive Windows Firewall with Advanced Security design that adds server isolation and domain isolation.
|
An organization typically uses this design as a first step toward a more comprehensive Windows Defender Firewall design that adds server isolation and domain isolation.
|
||||||
|
|
||||||
After implementing this design, you will have centralized management of the firewall rules applied to all devices that are running Windows in your organization.
|
After implementing this design, you will have centralized management of the firewall rules applied to all devices that are running Windows in your organization.
|
||||||
|
|
||||||
@ -57,7 +57,7 @@ For more information about this design:
|
|||||||
|
|
||||||
- To learn more about this design, see [Firewall Policy Design Example](firewall-policy-design-example.md).
|
- To learn more about this design, see [Firewall Policy Design Example](firewall-policy-design-example.md).
|
||||||
|
|
||||||
- Before completing the design, gather the information described in [Designing a Windows Firewall with Advanced Security Strategy](designing-a-windows-firewall-with-advanced-security-strategy.md).
|
- Before completing the design, gather the information described in [Designing a Windows Defender Firewall with Advanced Security Strategy](designing-a-windows-firewall-with-advanced-security-strategy.md).
|
||||||
|
|
||||||
- To help you make the decisions required in this design, see [Planning Settings for a Basic Firewall Policy](planning-settings-for-a-basic-firewall-policy.md).
|
- To help you make the decisions required in this design, see [Planning Settings for a Basic Firewall Policy](planning-settings-for-a-basic-firewall-policy.md).
|
||||||
|
|
||||||
|