--- title: Disable allowing users to select when a password is required when resuming from connected standby for PDE in Intune description: Disable allowing users to select when a password is required when resuming from connected standby for PDE in Intune author: frankroj ms.author: frankroj ms.reviewer: rhonnegowda manager: aaroncz ms.topic: how-to ms.prod: windows-client ms.technology: itpro-security ms.localizationpriority: medium ms.date: 03/13/2023 --- # Disable allowing users to select when a password is required when resuming from connected standby for PDE When the **Disable allowing users to select when a password is required when resuming from connected standby** policy isn't configured, the outcome between on-premises Active Directory joined devices and workgroup devices, including Azure Active Directory joined devices, is different: - On-premises Active Directory joined devices: - A user can't change the amount of time after the device“s screen turns off before a password is required when waking the device. - A password is required immediately after the screen turns off. The above is the desired outcome, but PDE isn't supported with on-premises Active Directory joined devices. - Workgroup devices, including Azure AD joined devices: - A user on a Connected Standby device can change the amount of time after the device“s screen turns off before a password is required to wake the device. - During the time when the screen turns off but a password isn't required, the keys used by PDE to protect content could potentially be exposed. This outcome isn't a desired outcome. Because of this undesired outcome, it's recommended to explicitly disable this policy on Azure AD joined devices instead of leaving it at the default of **Not configured**. ## Disable allowing users to select when a password is required when resuming from connected standby in Intune To disable the policy **Disable allowing users to select when a password is required when resuming from connected standby** using Intune, follow the below steps: 1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). 1. In the **Home** screen, select **Devices** in the left pane. 1. In the **Devices | Overview** screen, under **Policy**, select **Configuration Profiles**. 1. In the **Devices | Configuration profiles** screen, make sure **Profiles** is selected at the top, and then select **Create profile**. 1. In the **Create profile** window that opens: 1. Under **Platform**, select **Windows 10 and later**. 1. Under **Profile type**, select **Settings catalog**. 1. Select **Create** to close the **Create profile** window. 1. The **Create profile** screen will open. In the **Basics** page: 1. Next to **Name**, enter **Disable allowing users to select when a password is required when resuming from connected standby**. 1. Next to **Description**, enter a description. 1. Select **Next**. 1. In the **Configuration settings** page: 1. Select **Add settings**. 1. In the **Settings picker** window that opens: 1. Under **Browse by category**, expand **Administrative Templates**. 1. Under **Administrative Templates**, scroll down and expand **System**. 1. Under **System**, scroll down and select **Logon**. 1. When the settings for the **Logon** subcategory appear under **Setting name** in the lower pane, select **Allow users to select when a password is required when resuming from connected standby**, and then select the **X** in the top right corner of the **Settings picker** window to close the window. 1. Leave the slider for **Allow users to select when a password is required when resuming from connected standby** at the default of **Disabled**. 1. select **Next**. 1. In the **Scope tags** page, configure if necessary and then select **Next**. 1. In the **Assignments** page: 1. Under **Included groups**, select **Add groups**. > [!NOTE] > > Make sure to add the correct groups under **Included groups** and not under **Excluded groups**. Accidentally adding the desired device groups under **Excluded groups** will result in those devices being excluded and they won't receive the configuration profile. 1. In the **Select groups to include** window that opens, select the groups that the configuration profile should be assigned to, and then select **Select** to close the **Select groups to include** window. 1. Under **Included groups** > **Groups**, ensure the correct group(s) are selected, and then select **Next**. 1. In **Review + create** page, review the configuration to make sure everything is configured correctly, and then select **Create**. ## Additional PDE configurations in Intune The following PDE configurations can also be configured using Intune: ### Required prerequisites - [Enable Personal Data Encryption (PDE)](../pde-in-intune/intune-enable-pde.md) - [Disable Winlogon automatic restart sign-on (ARSO)](../pde-in-intune/intune-disable-arso.md) ### Security hardening recommendations - [Disable kernel-mode crash dumps and live dumps](../pde-in-intune/intune-disable-memory-dumps.md) - [Disable Windows Error Reporting (WER)/user-mode crash dumps](../pde-in-intune/intune-disable-wer.md) - [Disable hibernation](../pde-in-intune/intune-disable-hibernation.md) ## More information - [Personal Data Encryption (PDE)](../overview-pde.md) - [Personal Data Encryption (PDE) FAQ](../faq-pde.yml)