--- title: Policy CSP - Accounts description: Policy CSP - Accounts ms.author: dansimp ms.localizationpriority: medium ms.topic: article ms.prod: w10 ms.technology: windows author: manikadhiman ms.date: 09/27/2019 ms.reviewer: manager: dansimp --- # Policy CSP - Accounts
## Accounts policies
Accounts/AllowAddingNonMicrosoftAccountsManually
Accounts/AllowMicrosoftAccountConnection
Accounts/AllowMicrosoftAccountSignInAssistant

**Accounts/AllowAddingNonMicrosoftAccountsManually**
Windows Edition Supported?
Home cross mark
Pro check mark
Business check mark
Enterprise check mark
Education check mark
Mobile check mark
Mobile Enterprise check mark

[Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] > * Device
Specifies whether user is allowed to add non-MSA email accounts. Most restricted value is 0. > [!NOTE] > This policy will only block UI/UX-based methods for adding non-Microsoft accounts. Even if this policy is enforced, you can still provision non-MSA accounts using the [EMAIL2 CSP](email2-csp.md). The following list shows the supported values: - 0 - Not allowed. - 1 (default) - Allowed.
**Accounts/AllowMicrosoftAccountConnection**
Windows Edition Supported?
Home cross mark
Pro check mark
Business check mark
Enterprise check mark
Education check mark
Mobile check mark
Mobile Enterprise check mark

[Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] > * Device
Specifies whether the user is allowed to use an MSA account for non-email related connection authentication and services. Most restricted value is 0. The following list shows the supported values: - 0 - Not allowed. - 1 (default) - Allowed.
**Accounts/AllowMicrosoftAccountSignInAssistant**
Windows Edition Supported?
Home cross mark
Pro check mark2
Business check mark2
Enterprise check mark2
Education check mark2
Mobile check mark2
Mobile Enterprise check mark2

[Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] > * Device
Added in Windows 10, version 1703. Allows IT Admins the ability to disable the "Microsoft Account Sign-In Assistant" (wlidsvc) NT service. > [!NOTE] > If the MSA service is disabled, Windows Update will no longer offer feature updates to devices running Windows 10 1709 or higher. See [Feature updates are not being offered while other updates are](https://docs.microsoft.com/windows/deployment/update/windows-update-troubleshooting#feature-updates-are-not-being-offered-while-other-updates-are). The following list shows the supported values: - 0 - Disabled. - 1 (default) - Manual start.
Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. - 5 - Added in Windows 10, version 1809. - 6 - Added in Windows 10, version 1903.