Add MFA support to Secure the Windows 10 logon
Creating a way to secure the Logon to a Windows 10 workstation with MFA would then remove much of the complexity required to secure all the applications installed upon it (such as DA etc).
This would need to have the ability to store offline logins somehow which is possible with RSA SecurID.
It would and the final touches to a really great solution.
For requiring additional factors with Windows Hello for Business, please see – https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/feature-multifactor-unlock
For why PIN is better than a password, please see https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-why-pin-is-better-than-password
For Authenticator app sign in to Azure AD, please see https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-authentication-phone-sign-in
As always, other feedback is welcome
Just chiming in to agree on previous comments "The ability to require a user to approve the sign in via the microsoft Authenticator app is the goal of this request. You already have this with terminal services, porting this to windows 10 should be requisite."
I have bought M365 E3 security suite to get MFA for Radius and Office MFA conditional support for enhanced security and feel that inclusion of AD joined computers into this solution should be added. I only purchased add on license because it was cheaper that DUO. Please don't make me drop licenses to migrate to DUO if you can't provide a unified enterprise solution that can be centrally managed utilizing Azure MFA..... My EA is set to expire next year and my continued use of MS licenses will be reduced dramatically, instead of expanded dramatically, at renewal if product is not enhanced for desired functionality. MS Authentication with code support at login would be great as it would accommodate "offline" laptop users... DUO does this already...
1. Create agent that can be deployed to workstations that adds support for Azure MFA management or add through OS update / patches / whatever
2. Make available GPO to manage configuration of agent to add desired Azure MFA support to login process. That way we can target computers that we want to enable functionality. Provide options in agent config, through GPO, that would allow options to: white list based off networks, utilize local AD if available as fallback, or designated local account exception to require MFA... Just trying to add options folks may want for configuration.
Heck, if you are worried about Windows Hello branding, just call this an additional enhancement to Windows Hello for Azure MFA cloud enhanced security support.....lol
Just a Thought.......
The ability to require a user to approve the sign in via the microsoft Authenticator app is the goal of this request. You already have this with terminal services, porting this to windows 10 should be requisite.
Thorsten, try the following steps:
Using Group Policy settings.
If you are on Windows 10 Pro edition, you can change the group policy settings to disable PIN sign-in option for all users.
Open the Run dialog box by pressing the Windows key and the R key together.
Type GPEDIT.MSC and hit the Enter key.
Go to Computer Configuration -> Administrative Templates -> System -> Logon.
On the right side, double click on Turn on PIN sign-in and select Disabled.
Similarly, disable the other Windows Hello options if any.
Exit the Group Policy Editor and reboot the computer.
We want to prevent that Users can logon to Windows without using Windows Hello or MFA. And we want to implement that with a native Microsoft solution not a third party application.
Zackary Catton commented
Our users hate having to now remember a pin AND their password, not to mention they are asked to change both of them regularly. The default number of days to change each is different so it effectively doubles the amount of disruption the password changes cause. Lots don't have TPM chips or cameras or fingerprint scanners. Just make it an option for the natural login screen to do MFA please. Allow admins to restrict by computer with GPO/Intune if a computer requires it to login so we do not defeat the purpose of MFA and let them deal with just the one password and one form of additional verification on a phone or security key/card.
The "additional factors" option for WHfB seems to be for hybrid environments only, is a solution for cloud only in the works?
MFA without using Hello or Biometrics would be great - I'd like to force users to password + mfa if possible on device login
We use MFA for Office 365 via the authenticator app already. I assumed I could enable MFA on my domain computers (was even hoping via group policy), then it would just be a matter of configuring it in Azure and computer logins would start behaving the same way as office 365 logins do now. Would be even better if the computer would just display a QR code that you have to scan with your device. After a short search I end up here and discover that MS are off on a tangent that will probably take a year or two to correct.
Hotmail account do it right with Microsoft Authenticator. Do the same for O365 Business Premium / Azure AD
David Fraley commented
I concur with the vast majority of comments in this thread in that I do not believe that Windows Hello provides true MFA for Windows 10 devices.
If a laptop is stolen, than the stealing party only needs to figure out the "something I know" element (i.e. the PIN code). Our company is in negotiations to do NIST 800-171 vendor audits and we don't plan to accept Windows Hello has MFA for laptops.
Come on Microsoft, your Azure solution is pretty cool, but Windows Hello does not qualify as MFA if the laptop is stolen. The Azure and Windows teams need to get their act together on this issue.
Tim Evers commented
Because we do not have this extra verification and a laptop gets stolen, the attacker only needs the PIN from Windows Hello to access lots of company data. As we automatically log into OneDrive, SharePoint, Outlook, Teams and in Edge.
We would like to use the Microsoft authenticator as extra 2 factor to lower the probability of this.. Now it feels like online working in Office 365 where we have enabled multi factor is better secured than the windows 10 devices.
Rob Czymoch commented
We implemented WHFB and quite frankly its a terrible solution. A pin tied to the TPM is not enough. So you really need to configure additional factors. For example a phone connected via Bluetooth, unreliable because windows 10 is and continues to be terrible at handling Bluetooth connections. So then use bio-metrics. if you have to buy USB finger print scanners it is equally unreliable because Windows 10 is and continues to handle such USB devices poorly. Of course the natural solution is to introduce the use of the Microsoft Authenticator as the additional factor, apparently not a natural solution according to the Windows 10 team that handles this feature.
Louis Henn commented
How MS can think that a PIN is secure beats me. Surely a pin is easier to brute force than a proper policy controlled password? Also using PIN doesn’t authenticate you to legacy on premise resources like file servers. Windows Hello is dumb and should be discontinued and replaced with something much smarter IMHO.
Bjorn L commented
For on-prem AD, WHfB is not an easy or end-user friendly. Have a POC running for the last months, biometrics are not always working and needs to be purchased to our PC desktops. RDP is also used which complicates it further.
Windows 10 + PIN + MFA (Microsoft Authenticator) would awesome. With full RDP support. First then we can adhere to the "new" password best practices.
Michael Schooley commented
When has Microsoft EVER done anything correctly? This one is funny because of the Security & Compliance page in O365 Admin, where they act like they are the one stop shop for government compliance. Whoever is in charge of that for MS better start reading NIST 800-171. Securing the desktops with MFA for users who access sensitive information is imperative.
This is our requirements and I guess it matches at leased 50% of all enterprises.
First login on a device:
Username + PW + MFA
(To set up Biometric configuration)
VDI / remote / fallback login (require internet access):
Username + PW + MFA
[Deleted User] commented
We have MFA setup in Azure and for 365 it works. the win 10 preview build 18348 has the ability to do it with the 'sign in' feature but after sending the auth to the authenticator, it fails to send it to the dc. so PLEASE roll it OUT! We all need this so badly given all of the One Drive etc phishes that 365 Exchange cannot seem to filter
I agree with the others that windows hello is not a good solution for an IT person in an enterprise. Unfortunately a full solution like Duo/Okta is too expensive.
Pierce Radtke commented
Windows Hello - PIN negates MFA authentication. Real world example
An average joe/jane remote user is in public location and uses their PIN to log on to their Workstation.
Hacker/Thief is recording said entry of PIN with a cell phone.
Hacker/Thief user can now steal the workstation and log on with access to everything online w/o the necessity of MFA verification once logged on.
Or (and more likely) an employee of devious intent sets up a spy camera to watch the user enter their PIN while in a "Secure Location" - then while the user is on their Lunch accesses their machine.
Allowing Admins to disable the PIN or enable MFA authentication with the Microsoft Authenticator App would prevent this obvious hole in security.
Azure AD Team: u need to implement something smarter. Hello is a terrible tool. - please go visit and learn how your competitors is doing it "right" i.e DUO. Before u come out with that dumbest solution.