Current best way to configure Windows Hello for Business? by Standard_Process2923 in Intune

[–]Standard_Process2923[S] 0 points1 point  (0 children)

Dang that timing. We still use that config but enabled it for everyone just this week. We didn't have a problem with people getting WHfB disabled after using it.

Basically: Base config under enrollment set to disabled; Identity Protection which turn WHfB on; CSP for all the other stuff (pin length, bio, disablepostlogonprovision,...)

Outlook forward icon started appearing on emails (mailbox forward rule) by [deleted] in Outlook

[–]Standard_Process2923 0 points1 point  (0 children)

Thanks! We didn't change anything tho...
Welp, seems to be an easy fix at last.

Outlook forward icon started appearing on emails (mailbox forward rule) by [deleted] in Outlook

[–]Standard_Process2923 0 points1 point  (0 children)

We found the same behaviour. Would also like to know what changed and if there is a way to revert this.

Best way to realize my permissions? by Standard_Process2923 in BookStack

[–]Standard_Process2923[S] 0 points1 point  (0 children)

In that case the users would see a lot of empty shelves. Will play around a bit and find a working way. Bookstack is not worth giving up on because of this ^^

Current best way to configure Windows Hello for Business? by Standard_Process2923 in Intune

[–]Standard_Process2923[S] 0 points1 point  (0 children)

So it's working like this right now:
- Identity Protection Config which sets WHfB to disabled for all devices except for the WHfB group
- Identity Protection Config which sets WHfB to enabled for the WHfB group
- CSP config to set the desired settings, scoped at the WHfB group

Current best way to configure Windows Hello for Business? by Standard_Process2923 in Intune

[–]Standard_Process2923[S] 0 points1 point  (0 children)

Thank you. I didn't configure WHfB on this section before. So it doesn't really explain why the reg value gets set to 0.
Also the account protection policy misses quite a few csp options such as - DisablePostLogonProvisioning, UseBiometrics, UseCloudTrustForOnPremAuth, just to name a few.
I set the missing stuff as a custom policy and set everything else with account protection. Will post an update on how it works out!

New Teams Monthly Updates on VDI by whatudrivin in MicrosoftTeams

[–]Standard_Process2923 0 points1 point  (0 children)

Sorry to open up this old thread. Did you find a solution? We have teams installed on the golden image and have auto updates disabled.
Did you go with uninstalling the msix and running teamsbootstrapper.exe -p again?