[email protected]
  • Home
  • Team
  • Events
    • MC2MC Live: The Matrix of Innovation (22/05/2025)
    • MC2MC Live: Voyage to the Edge of the Cloud (26/06/2025)
    • Past events gallery
  • Speakers
    • Call for Speakers
    • Speaker information
  • Photos
  • Contact
  • Sponsors
  • About
    • Code of Conduct
    • Privacy Policy

Windows Hello for Business Multi Factor unlock with MEM – Intune

Posted on December 18, 2019

Tim H. posted a new blog post on his site Cloud-Boy.be.

Situation:

  • Azure AD Joined computers/laptops
  • Devices managed with MEM (Microsoft Endpoint Manager) – Intune

Target:

  • Enabling Windows Hello for Business
  • Enabling multi factor unlock: face recognition + trusted device (smartphone) or PIN

In Windows 10, Windows Hello for Business replaces passwords with strong two-factor authentication on PCs and mobile devices. This authentication consists of a new type of user credential that is tied to a device and uses a bio metric or PIN. Windows Hello for Business lets user authenticate to an Active Directory or Azure Active Directory account. Windows Hello addresses the following problems with passwords:

  • Strong passwords can be difficult to remember, and users often reuse passwords on multiple sites.
  • Server breaches can expose symmetric network credentials (passwords).
  • Passwords are subject to replay attacks.
  • Users can inadvertently expose their passwords due to phishing attacks.

Prerequisites cloud only deployment:

  • Windows 10, version 1511 or later
  • Microsoft Azure Account
  • Azure Active Directory
  • Azure Multi-factor authentication
  • Modern Management (Intune or supported third-party MDM), optional
  • Azure AD Premium subscription – optional, needed for automatic MDM enrolment when the device joins Azure Active Directory

1. ENABLE WINDOWS HELLO FOR BUSINESS IN MEM (INTUNE)

Navigate to Devices – Enroll devices – Windows Hello for Business

READ MORE..

Previous Post
wmatthyssen.com – Wim is uploading blogs!
Next Post
Passwordless sign-in, practical example!

Recent Posts

  • MC2MC Live: Jurassic Cloud Adventures (24/04/25) April 28, 2025
  • MC2MC Live: Cloudy with a Chance of Data (20/03/25) March 22, 2025
  • MC2MC Live: Forward to the Past (2024) December 23, 2024
  • MC2MC Live: The Cloud Strikes Back (2024) November 18, 2024
  • MC2MC Live: Safeguarding the Digital Frontier (2024) September 30, 2024

Categories

  • Autopilot (1)
  • Azure (29)
  • Azure AD (2)
  • Azure Virtual Desktop (2)
  • Big Data (1)
  • ConfigMgr (3)
  • Containers (2)
  • EMS (7)
  • GitHub (3)
  • Guides (6)
  • Hyper-V (1)
  • IaC (1)
  • Intune (20)
  • M365 (20)
  • MC2MC (39)
  • MC2MC Live (2)
  • MDATP (3)
  • PowerApps (3)
  • PowerAutomate (6)
  • PowerShell (4)
  • Security (10)
  • Veeam (1)
  • Visual Studio Code (1)
  • Viva (1)
  • Windows 10 (16)
  • Windows 11 (1)
  • Windows 365 (2)
  • Windows Autopilot (3)
  • Windows Server (1)
  • Windows Updates (1)
  • Windows365 (1)
  • Women In Tech (2)

RSS Jasper Bernaers

  • How a modern and secure workplace can help your organization become relevant
  • Actionable steps to decrease the risk of a Cyberattack
  • Cybersecurity in a remote connected world
  • Cybersecurity for local governments – in 10 steps

RSS Wim Matthyssen

  • Azure Arc: Keep your Azure Connected Machine agent up-to-date on a Windows Server
  • Azure Arc: Securely connect to an Azure Arc-enabled Windows Server with RDP over SSH
  • How to install OpenSSH on a Windows Server 2019/2022/2025 using a PowerShell script
  • PowerShell script: BgInfo deployment script for Windows Server 2025

RSS Tim De Keukelaere

  • How to configure RBAC permissions for available uninstall in Intune
  • WMUG NL Tuesdays – Latest and greatest in the world of Configuration Manager
  • Microsoft MVP 2020-2021 Award
  • A first look at the Configuration Manager Community Hub

RSS Micha Wets

  • AVD Client Cleanup script/tool
  • MSIX app attach Start Menu fixed in Windows Virtual Desktop
  • Windows Virtual Desktop Workshop December update
  • Windows Virtual Desktop Spring 2020 edition workshop

RSS Robbe Van den Daele

  • Detecting non-privileged Windows Hello abuse
  • MDE Device Discovery - Improving the monitored network page
  • Correlating Defender for Endpoint and Global Secure Access Logs
  • Parsing CEF messages without Azure Monitor Agent

© 2025 MC2MC vzw