maciejrebisz.com

IT

How to setup Windows Hello for Business in the new Intune portal – Mobile-First Cloud-First

maximios June 25, 2022

By default it is not configured – so this means that the default behavior on Windows 10 takes effect. When a Windows 10 device is Azure Active Directory joined there will kick in a two-step verificering of the user, that is a part of the Azure Multifactor Authentication (MFA) service that ensures that the users are who the said there are.

This is a nice feature in most scenarios, but in a education environment where students in primary school from the age from 7 – 10, it is not a good idea to use Windows Hello for Business as it requires two-step verification – MFA with a phone or a mail.

In a company, Windows Hello for Business is much more easy to implement and a way to get the users to sign in to Windows 10 in a more secure way. The user dont have to use there company password to sign-in to there Windows 10 devices and getting access to company cloud resources.

In Windows 10 desktop and mobile versions prior to the Anniversary Update, you could set two different PINS that could be used to authenticate to resources:

  • The device PIN could be used to unlock the device and connect to cloud resources.
  • The work PIN was used to access Azure AD resources on user’s personal devices (BYOD).

In the Anniversary Update, these two PINS were merged into one single device PIN. Any Intune configuration policies you set to control the device PIN, and additionally, any Windows Hello for Business policies you configured, now both set this new PIN value. If you have set both policy types to control the PIN, the Windows Hello for Business policy will be applied on both Windows 10 desktop and mobile devices. To ensure policy conflicts are resolved and that the PIN policy is applied correctly, update your Windows Hello for Business Policy to match the settings in your configuration policy, and ask your users to sync their devices in the Company Portal app.

How to setup Windows Hello for Business in the new Intune Portal:

Go into https://portal.azure.com and find the Intune service.

Click on Device enrollment

Click on “Windows Hallo for Business”

Click on the Default policy All users

I have created a Intune User Voice in hope to get the possibility to create more than one Windows Hello for Business – please Vote!!!

https://microsoftintune.uservoice.com/forums/291681-ideas/suggestions/18659878-windows-hallo-for-business-setting-per-group-assig

In the All Users blade

Click Settings

Then it is possibility to Configure Windows Hello for Business:

The default is : Not Configured

If you select Disable – Then the user will not get prompted for two-step verification when they are AzureAD joining a device.

When selecting Enable – you can configure the settings for Windows Hello for Business

Here are the settings:

Configure Windows Hello for Business:
If disabled, the user cannot provision Windows Hello for Business except on Azure Active Directory joined mobile phones where provisioning may be required. Not configured will honor configuration done on the client.

Use a Trusted Module (TPM):
A Trusted Platform Module (TPM) provides an additional layer of data security. If set to required, only devices with an accessible TPM can provision Windows Hello for Business. If set to preferred, devices attempt to use a TPM, but if not available will provision using software.

Minimum PIN length:
Minimum PIN length must be between 4 and 127

Maximum PIN length:
Maximum PIN length must be between 4 and 127

Lowercase letters in PIN:
If required, user PIN must include 1+ lowercase letters.

Uppercase letters in PIN:
If required, user PIN must include 1+ Uppercase letters.

Special characters in PIN: If required, user PIN must include 1+ special characters letters.

Special characters include: ! ” # $ % & ‘ ( ) * + , – . / : ; < = > ? @ [ \ ] ^ _ ` { | } ~

PIN expiration (days):
If configures, the user will be forced to change their PIN after the set number of days. The user can still proactively change there PIN before expiration. The default is 41 days.

Remember PIN history:
If set to remember, the user will not be able to reuse this number of previous PINs.

Allow enhanced anti-spoofing, when available:
If yes, devices will use enchained anti-spoofing, when available (for example, detecting a photograph of a face instead of a real face). If no, anti-spoofing will be blocked. Not configured will honor configuration done on the client.

Allow phone sign-in:
If allowed, users with Azure Active Directory joined desktops may use a portable, registered device as a companion for desktop authentication. The companion device must be configured with a Windows Hello for Business PIN.

Try it out and see what settings are the right for your organization.

Related Posts

IT /

Intune – Windows device enrollment restrictions – Cloud First

IT /

How to add “hidden” Windows UWP to Windows Store for Business – Cloud First

IT /

Office 2016 Active Directory-Based activation – Cloud First

‹ How to deploy Autopilot device fast with MDT – Mobile-First Cloud-First › AzureAD PIM – how to setup a privileged role – Mobile-First Cloud-First

Recent Posts

  • Intune – Windows device enrollment restrictions – Cloud First
  • How to add “hidden” Windows UWP to Windows Store for Business – Cloud First
  • Office 2016 Active Directory-Based activation – Cloud First
  • How to deploy Windows Local Experience Packs with Intune – Cloud First
  • Conditional Access for Outlook Web Access (OWA) – Cloud First

Recent Comments

No comments to show.

Archives

  • November 2025
  • October 2025
  • August 2025
  • July 2025
  • June 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • November 2024
  • September 2024
  • July 2024
  • June 2024
  • March 2024
  • December 2023
  • August 2023
  • June 2023
  • March 2023
  • February 2023
  • December 2022
  • September 2022
  • August 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • January 2022
  • December 2021
  • October 2021
  • September 2021
  • August 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • February 2020
  • January 2020
  • December 2019
  • October 2019
  • September 2019
  • June 2019
  • April 2019
  • March 2019
  • February 2019
  • March 2018
  • February 2018
  • December 2017
  • October 2017
  • August 2017

Categories

  • IT

Back to Top

© maciejrebisz.com 2026
Powered by WordPress • Themify WordPress Themes