June 4, 2025
MDM Tech Space
  • Home
  • All Posts
  • Follow Blog
  • Azure AD
  • Android
  • iOS
  • macOS
  • ChromeOS
  • Linux
  • Windows 10
  • Windows 11
  • MS Graph API
Recent Posts
  • [ March 13, 2025 ] Disable GenAI assistant in Adobe Acrobat with Intune General
  • [ March 6, 2025 ] Easily switch Office update channel with Intune General
  • [ March 5, 2025 ] How to Blacklist/Whitelist Extensions in Chrome with Intune General
  • [ February 27, 2025 ] M365 Enterprise Apps: The case of wrong update channel on Intune-managed Windows devices General
  • [ February 27, 2025 ] Decoding Intune Password Compliance for Windows BYOD: Continuation Post | Part 2 General
HomeMicrosoft IntuneRemove existing WHfB PIN using Intune

Remove existing WHfB PIN using Intune

September 21, 2022 Joymalya Basu Roy Microsoft Intune, Windows 10, Windows 11 Comments Off on Remove existing WHfB PIN using Intune

How can we remove existing WHfB PIN registration from a managed Windows 10/11 endpoint using Microsoft Endpoint Manager (Microsoft Intune)?

Table of Contents

  • Prologue
  • Remove existing Windows Hello PIN from a managed Windows 10/11 device using MEM Intune
    • Step 1 –  Ensure that the Windows Hello for Business is configured to a Disabled state for the tenant
    • Step 2 – Ensure there is no policy from Intune that enables Windows Hello for Business config for the user/device
    • Step 3 – Delete existing Windows Hello for Business (WHfB) registration from the local device
  • The End

Prologue

During Azure AD join of a Windows 10 or Windows 11 device (be it via Autopilot or manual), as part of the device provisioning process, Windows Hello for Business provisioning gets triggered (post completing ESP, but before the user gets presented with the Desktop screen, subject to meeting the WHfB pre-requisite checks) which prompts the user to setup a Windows Hello PIN for use as a Windows sign-in method for the account on the device. This is the default behavior.

You can see this by viewing the User Device Registration events in the Event Viewer under Applications and Services Logs\Microsoft\Windows.

At this stage, the user can

  • either choose to follow the provisioning flow by clicking on OK and continue setup of the Windows Hello PIN sign-in method (default Windows Hello mode) by completing an MFA challenge (if the user has not registered for MFA, the user will be guided through MFA registration as part of the process)
  • or, deliberately cause an error in the flow to cancel/skip the Windows Hello registration.

For the purpose of this blog, let us assume that some users have gone through the Windows Hello for Business (WHfB) registration as part of the device provisioning process and have set up Windows Hello PIN as an authentication method for Windows sign-in.

This short blog post is about deleting such existing WHfB registration using MEM Intune, to prevent users from using their already set up Windows Hello sign-in method to sign-in to Windows.

Remove existing Windows Hello PIN from a managed Windows 10/11 device using MEM Intune

Step 1 –  Ensure that the Windows Hello for Business is configured to a Disabled state for the tenant

As mentioned above, since Windows Hello for Business provisioning is by default a part of the device provisioning process for Azure AD join scenario unless explicitly prohibited, if you do not wish to use Windows Hello for Business (WHfB) in your environment yet, you need to explicitly disable the Windows Hello for Business (WHfB) enrolment provisioning for the tenant.

This is done from the MEM Admin Center using the Windows Hello for Business tenant-wide configuration accessed from Devices > Windows (By platform) > Windows Enrolment  > Windows Hello for Business

Ensure Windows Hello for Business is set to Disabled state for the tenant if you do not want automatic provisioning of Windows Hello for Business to get triggered during device provisioning.
Ensure Windows Hello for Business is set to Disabled state for the tenant if you do not want automatic provisioning of Windows Hello for Business to get triggered during device provisioning.

Once you have Windows Hello for Business (WHfB) disabled tenant-wide, post policy sync, you will notice that the Windows Hello sign-in options will become unavailable to be configured/managed by the end-user on the endpoint.

The above snip shows my device where I have completed Windows Hello for Business registration as part of the device provisioning and setup Windows Hello PIN as an authentication method for Windows sign-in.

Before disabling the Windows Hello for Business configuration tenant-wide, I had the option to change the PIN. But after disabling Windows Hello for Business configuration for the tenant and syncing my device, as you can see from the snap, I don’t have the option to change the PIN available to me anymore.

However, this does not stop me from using the PIN that I have already set up (or Face or Fingerprint if I have had that configured) to sign-in to Windows.

This is because,

Disabling Windows Hello for Business configuration (tenant-wide settings) from the MEM Admin center only disables Windows Hello for Business enrolment on new device provisioning. It has absolutely no effect on devices that have already gone through provisioning in the past and where users have provisioned Windows Hello as part of device provisioning.

For that, we will need to do something more, which I will get to eventually. But for now, the next move would be to….

Step 2 – Ensure there is no policy from Intune that enables Windows Hello for Business config for the user/device

In the MEM Admin center, you can enable Windows Hello for Business configuration in multiple ways.

  • Configuring Windows Hello for Business via Device configuration > Identity protection
  • Configuring Windows Hello for Business via Endpoint security > Account protection

As such, you need to confirm that

there is no Device configuration > Identity protection profile or Endpoint security > Account protection policy that is enabling Windows Hello for Business configuration for the user/device.

If there is one built for testing purposes, ensure only test users/devices are in the assignment scope for the corresponding policy.

In general, if you want to start trying out Windows Hello for Business with a limited set of users first before allowing its use by all users in the environment, you would be disabling Windows Hello for Business configuration tenant-wide (as shown in Step 1) and then use either way as shown above (in Step 2) to enable Windows Hello for Business for the test set.

Let’s not deviate from our main goal which is to remove the existing Windows Hello for Business configured sign-in method and for that, the next and last move would be to…

Step 3 – Delete existing Windows Hello for Business (WHfB) registration from the local device

Windows Hello for Business (WHfB) registration can be deleted from the local device by deleting the Hello data container using PowerShell with the help of the command “certutil /deletehellocontainer“.

PS needs to be run in the User context, and as can be seen from the output of running the above command manually, we also need to ensure to log off the currently signed-in user for the action to succeed.

Now this can be achieved via a native PS script deployment from Intune, a very rough implementation as below

Remove WHfB PIN using native PS script deployment from MEM Intune
Remove WHfB PIN using native PS script deployment from MEM Intune
Notice that I am not using the logoff command here. This is because when you tell Windows to logoff, it does just that - Windows will basically call out every running process (or apps) to run their EXIT method, as result of which sometimes you get prompted to save your open work, in which case, windows will wait a bit, but if you don’t respond, windows will just force close the current session. Now this might come in the way of IME functioning the script processing. As such, you can see me opt for a time-delayed restart to let IME complete the script processing instead, so that IME can complete the script execution and does not gets interrupted in between.

However, I am not a big fan of native PS script deployment from Intune because of the obvious reasons of less control and reporting. If you are also like me and have the licensing requirements to use proactive Remediation, I would suggest using that instead.

For the detection script, you can use the Detect-WindowsHelloEnrollment.ps1 script by Martin Bengtsson [if you haven’t checked out his blog site yet, do give a visit to https://www.imab.dk/]. However, you will need to change (reverse) the exit codes as in the script for our purpose here. [PS to exit with code 1 when it detects existing WHfB enrolment, else exit with code 0.]

For the remediation,  you can use the same rough PS script that I showed above as an example.

Remove WHfB PIN using Proactive Remediation from MEM Intune
Remove WHfB PIN using Proactive Remediation from MEM Intune

The End

Windows Hello for Business enables end-users to use a convenient sign-in mechanism that is safe, secure, and strong, and something that can be managed in an enterprise environment. Then why would you want to disable it?

Maybe when you need to switch between the Windows Hello for Business deployment mode (change in trust type/architecture) and/or any reason whatsoever that is unknown to me.

Like this:

Like Loading...

Other Artciles You May Like

Translate

Awards and Recognition

Joymalya Basu Roy - Microsoft MVP

About Me

Joymalya Basu Roy
Global Service Owner - Endpoint Management @Eviden
Being a Service Architect as part of the Global IT role, I am responsible for the design, implementation, and delivery of the complete Endpoint Management solution as part of the Digital Workplace offering using Microsoft Intune, LastPass, and AdminByRequest.
Check my full profile

Follow this blog

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 646 other subscribers

Categories

Site Archive

Sitemap

  • Home
  • All Posts
  • Get to know Joymalya
  • Privacy Policy
  • Follow Blog

Search Site Publications Per Month

June 2025
M T W T F S S
 1
2345678
9101112131415
16171819202122
23242526272829
30  
« Mar    
This site uses cookies for some of its core functions and to provide you a better user experience.
By continuing you agree to the use of same. To know more, please read our Terms and Conditions

Copyright © 2022, MDM Tech Space - Joymalya Basu Roy

%d