diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-base.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-base.md index e9c5fe59e6..4fa728cea5 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-base.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-base.md @@ -306,15 +306,13 @@ Sign-in a workstation with access equivalent to a _domain user_. 3. Click **Enroll devices**. 4. Click **Windows enrollment** 5. Under **Windows enrollment**, click **Windows Hello for Business**. - ![Create Intune Windows Hello for Business Policy](images/aadj/IntuneWHFBPolicy-00.png) + ![Create Windows Hello for Business Policy](images/aadj/MEM.png) 6. Select **Enabled** from the **Configure Windows Hello for Business** list. 7. Select **Required** next to **Use a Trusted Platform Module (TPM)**. By default, Windows Hello for Business prefers TPM 2.0 or falls backs to software. Choosing **Required** forces Windows Hello for Business to only use TPM 2.0 or TPM 1.2 and does not allow fall back to software based keys. 8. Type the desired **Minimum PIN length** and **Maximum PIN length**. > [!IMPORTANT] > The default minimum PIN length for Windows Hello for Business on Windows 10 is 6. Microsoft Intune defaults the minimum PIN length to 4, which reduces the security of the user's PIN. If you do not have a desired PIN length, set the minimum PIN length to 6. -![Intune Windows Hello for Business policy settings](images/aadj/IntuneWHFBPolicy-01.png) - 9. Select the appropriate configuration for the following settings. * **Lowercase letters in PIN** * **Uppercase letters in PIN**