Before you can begin working with a device running Microsoft Windows 11, you must sign in with the credentials for a user account that is authorized to use that device. User accounts are an essential cornerstone of Windows security and are important in helping to provide a personalized user experience. As an administrator, you determine which user accounts are allowed to sign in to a specific device. In addition, you can configure user accounts on a Windows 11 device to accomplish the following goals:
Control access to files and other resources
Audit system events, such as sign-ins and the use of files and other resources
Sync files and settings between different computers when signing in with the same account on those computers
Authenticate automatically to email and other online services
Require each user to provide additional proof of their identity (also known as multifactor authentication) when signing in for the first time on a new device
The credentials associated with a user account consist of a username and password that serve as identification and, in theory, ensure that no one can use the computer or view files, email messages, and other personal data associated with a user account unless they’re authorized to do so.
If you believe your computer is in a secure location where only people you trust have physical access to it, you might be tempted to allow family members or coworkers to share your user account. We strongly caution against using that configuration and instead recommend that you create a user account for each person that uses the computer. Doing so allows each account to access its own user profile, store personal files and user preferences within that profile, and access cloud-based resources. With fast user switching, a feature described in this chapter, you can switch between user accounts with only a few clicks.
With the right hardware and some initial setup, you can sign in and sign out without having to enter your full credentials. The Windows Hello feature allows you to sign in using biometric information, such as facial recognition or a fingerprint. In this chapter, we also explain how you can install the Microsoft Authenticator app on a trusted mobile device and use it to sign in to a Microsoft account or Azure AD account without having to enter a password.
When you configure Windows 11 for the first time on a new computer (or on a PC with a clean installation of Windows), the setup program creates a profile for one user account, which is an administrator account. (An administrator account is one that has full control over the computer. For details, see “Administrator or standard user account?” later in this chapter.) Depending on what type of account you select during setup, that initial account can be a Microsoft account, an Azure Active Directory (Azure AD) account, or a local user account. A fourth user account type—an account on a local Active Directory domain—is available only on a managed network after this initial local account is created and you join the machine to the Windows domain. (For information about the differences between these account types, see the next section, “Choosing how you sign in.”)
If you upgrade to Windows 11 from Windows 10 and you had local accounts set up in your previous operating system, Windows migrates those accounts to your Windows 11 installation. These migrated accounts maintain their group memberships and passwords.
After signing in for the first time, you can go to Settings > Accounts to create new user accounts and make routine changes to existing accounts. The Your Info page enables you to configure your account picture and access Account Settings, as shown in Figure 10-1.
Figure 10-1 The Your Info page displays your account details.
You find different options and settings in Accounts depending on the type of account that you use (Microsoft account, Azure AD account, or local account), whether your account is a member of the Administrators group, and—if your computer is joined to a domain—whether group policies are in effect. On a computer joined to an Active Directory domain, all management of user accounts beyond basic tasks such as selecting a picture is normally handled by a domain administrator.
Some account-related settings are under the User Accounts heading in Control Panel, which is shown in Figure 10-2. Several of these settings duplicate functions that are available in Settings > Accounts.
Figure 10-2 Visiting this Control Panel page is rarely necessary, as most options for creating and managing accounts are available in the Settings app.
You can add a new account only from the Accounts page in Settings. You can remove an account or change its type from that location or its Control Panel counterpart. All the esoteric options along the left side of the User Accounts page, as well as the Change User Account Control Settings option, are available only in Control Panel.
As we mentioned earlier, Windows 11 supports four different varieties of user accounts, each defined by how they handle authentication.
When you set up a new account on a device running Windows 11, the default options strongly encourage you to sign in using a Microsoft account. You’ve probably used Microsoft accounts for years, perhaps without even knowing it. If you’ve signed up for a Microsoft service, including Outlook.com (or its predecessor, Hotmail), Microsoft 365 Family or Personal, Skype, or Xbox Live, you already have a Microsoft account. Every email address that ends with hotmail.com, msn.com, live.com, or outlook.com is, by definition, a Microsoft account.
During setup, you can enter the email address associated with an existing Microsoft account, or you can create a new email address in the outlook.com domain. However, you do not need to sign up for a Microsoft email address to create a Microsoft account; you can set up a Microsoft account using an existing personal email address from any email provider, including Gmail and other non-Microsoft services.
Signing in with a Microsoft account enables you to synchronize PC settings between multiple computers. If you use more than one PC—say, a desktop PC at work, a different desktop at home, a laptop for travel, and a tablet around the house—signing in with a Microsoft account lets you effortlessly use the same desktop background, stored passwords, account picture, accessibility configuration, and so on. The synchronization happens automatically and nearly instantly.
Some features in Windows 11, including OneDrive and family settings, require the use of a Microsoft account or an Azure AD account. It’s possible to use OneDrive and other services that depend on a Microsoft account even if you sign in to Windows with a different account type. However, in this configuration, you must sign in to each service individually, and some features might be unavailable or less convenient to use.
Under normal circumstances, you associate a single personal email address with your Microsoft account and use that address to sign in to Windows. But because every Microsoft account supports up to 10 email aliases, you can use any alias associated with your primary address to sign in using your Microsoft account.
To manage Microsoft account aliases, go to https://account.live.com/names/Manage and sign in with your Microsoft account. Under the Account Alias heading, click Add Email Address to create a new alias or use an existing personal email address as an alias. (Click Add Phone Number to use a mobile phone number as a username.) After verifying the added email address, you can make it the primary address and, if you wish, remove the old address. (Every alias uses the same password as the original account.)
Under the Sign-In Preferences heading, you can also change the settings for email aliases so that a specific alias can’t be used to sign in to your Microsoft account. That precaution allows you to use aliases to send and receive email but prevents them from being used to access your Microsoft account.
A local account is one that stores its sign-in credentials and other account data on your PC. A local account works only on a single computer. It doesn’t require an email address as the username, nor does it communicate with an external server to verify credentials.
This type of account was the standard in Windows for decades. In Windows 11, Microsoft recommends the use of a Microsoft account rather than a local user account for PCs that aren’t part of a managed business network. But using a Microsoft account is not a requirement; local accounts are still fully supported.
You might prefer a local account if your home or small business network includes computers running Windows 7 or earlier (that is, versions that do not explicitly support the use of Microsoft accounts).
For details, see “Sharing files, printers, and other resources over a local network” in Chapter 11, “Configuring Windows networks.”
In addition, some folks have privacy and data security concerns about storing personal information on the servers of a large corporation, whether that infrastructure is managed by Microsoft, Google, Apple, Amazon, or another cloud provider. Signing in with a local account minimizes the amount of information your PC exchanges with Microsoft’s servers.
You can switch between using a Microsoft account and a local account by going to Settings > Accounts > Your Info. On this page (shown earlier in Figure 10-1), click Sign In With A Local Account Instead. Windows leads you through a few simple steps to create a local account, which you then use for signing in.
If you’re currently signed in using a local account, the link on that page reads Sign In With A Microsoft Account Instead. Click that link to replace your local account with a Microsoft account. As part of making the switch, you need to enter your local password one more time. A few screens later, you’re connected to an existing Microsoft account or a new one you create. From that time forward, you sign in using your Microsoft account.
The third type of account, available during the initial setup of Windows 11 Pro, Enterprise, or Education, is a work or school account using Azure Active Directory. Azure AD offers some of the advantages of a Microsoft account, including support for two-factor authentication and single sign-on to online services, balanced by the capability of network administrators to impose restrictions using management software. These accounts are most common in medium-size and large businesses and schools.
Organizations that subscribe to Microsoft’s business-focused online services—including Business or Enterprise editions of Microsoft 365 (formerly known as Office 365), Microsoft Intune, and Microsoft Dynamics CRM Online—automatically have Azure AD services as part of their subscription. Every user account in that service automatically has a corresponding Azure AD directory entry.
You can connect an Azure AD account to a new Windows 11 installation during the initial setup of Windows 11, as we explain in “Performing a clean install,” in Chapter 2, “Setting up a new Windows 11 PC.” You can also associate a Windows 11 device with Azure AD after it has been set up to use a local account or a Microsoft account. To accomplish this task, go to Settings > Accounts > Access Work Or School, and then click Connect. The resulting dialog, shown in Figure 10-3, gives you two options.
Figure 10-3 Adding a work or school account using the Settings app offers multiple options. The “Join this device” links give your organization control over the device.
The default option allows you to continue using your Microsoft account or your local account to sign in to Windows and simply adds your Azure AD account for easier access to Microsoft 365 services, including Exchange Online email and OneDrive for Business. If that’s your goal, click Next and follow the prompts.
If you want to reconfigure the PC so that you sign in to Windows using your Azure AD account, don’t enter an email address in the Set Up A Work Or School Account dialog; instead, click the Join This Device To Azure Active Directory link at the bottom of that dialog. That option opens the dialog shown in Figure 10-4. After you sign in using your Azure AD credentials, you have one final chance to confirm that you want to sign in with your organization’s credentials and allow administrators to apply policies to your device.
Figure 10-4 Enter credentials from an Azure Active Directory account, such as a Microsoft 365 Enterprise subscription, to join the device to that organization.
After connecting a Windows 11 PC to Azure AD, you can view and edit your user profile by going to Settings > Accounts > Your Info and clicking Manage My Accounts. You can use the tabs to manage security information, including sign-in methods and multifactor authentication. Depending on organizational settings, you might be able to reset your own password.
In organizations with a Windows domain server running Active Directory services, administrators can join a PC to the domain, creating a domain machine account. (This option is available only with Windows 11 Pro, Enterprise, or Education editions.) After this step is complete, any user with a domain user account can sign in to the PC and access local and domain-based resources. We cover this account type more fully in Chapter 19, “Managing Windows PCs in the enterprise.”
The backbone of Windows security is the ability to uniquely identify each user. While setting up a computer—or at any later time—an administrator creates one or more user accounts, each of which is identified by a username and is normally secured by a password. When the user signs in to the PC using these credentials, Windows controls access to system resources on the basis of the permissions and rights associated with each user account by the resource owners and the system administrator.
Windows classifies each user account as one of two account types:
Administrator Members of the Administrators group are classified as administrator accounts. By default, the Administrators group includes the first account you create when you set up the computer and an account named Administrator that is disabled and hidden by default. Unlike other account types, administrators have full control over the system.
Standard user Members of the Users group are classified as standard user accounts. Users have limited administrative access, but can perform basic administrative functions, such as modifying the properties of their own account or managing Windows updates.
Assigning an appropriate account type to the people that use a computer is straightforward. At least one user must be an administrator; naturally, that should be the person who manages the computer’s use and maintenance. As a best practice, all other regular users should have standard user accounts.
Note
For computers running Windows 11 that you join to Azure AD, you can specify a user within your Azure AD tenant as a device administrator; this task can be accomplished automatically during the Azure AD join process.
With options in Settings and Control Panel, you can make changes to your own account or to another user’s account.
To change your own account, go to Settings > Accounts > Your Info, shown earlier in Figure 10-1. Even quicker: Open Start, click or tap your account picture, and then choose Change Account Settings.
Here, you can change your account picture, either by browsing for a picture file or by using your webcam to take a picture. If you sign in with a Microsoft account, the Manage My Accounts link opens your default web browser and loads your account page at https://account.microsoft.com. On that page, you can change your password or edit the name associated with your Microsoft account. Click other links along the top of the page to review your services and subscriptions, security settings, and order history and payment and to review or change your payment options. You can also get information about other devices associated with your Microsoft account.
If you have added one or more users to your computer, you (as a computer administrator) can make changes to the account of each of those users. (For information about adding users, see “Adding a user to your computer” later in this chapter.)
To change a user’s account type, go to Settings > Accounts > Other Users. Click the name of the account you want to change, and click Change Account Type. Your choices are Standard User or Administrator, as described in the previous section.
If the person signs in with a Microsoft account, there are no other changes you can make. (You can’t make changes to someone else’s Microsoft account; only the owner of that account can make changes by signing in at https://account.microsoft.com.) For users who sign in with a local user account, you can make a few additional changes, but you must start from User Accounts in Control Panel (shown earlier in Figure 10-2). Click Manage Another Account, and then click the name of the account you want to change. You can make the following changes:
Account Name The name you’re changing here is the full name, which is the one that appears on the sign-in screen, on the Start menu, and in User Accounts.
Password You can create a password and store a hint that provides a reminder for a forgotten password. If the account is already password protected, you can use User Accounts to change the password or remove the password. For more information about passwords, see “Setting or changing a password” later in this chapter.
Account Type Your choices here are the same as in Settings > Accounts: Administrator (which adds the account to the Administrators group) or Standard User (which adds the account to the Users group).
Delete You can also delete the account, optionally choosing to either delete the user’s files or retain them.
If you sign in with a local user account, you can make the following additional changes to your own account (that is, the one with which you’re currently signed in) by clicking links in the left pane:
Manage Your Credentials This link opens Credential Manager, where you can manage stored credentials that you use to access network resources and websites. Note that the new Microsoft Edge browser, based on the Chromium engine, has its own store of saved credentials and ignores this one.
Create A Password Reset Disk This link, available only when you are signed in with a local account, launches the Forgotten Password Wizard, from which you can create a password reset tool on removable media. As an alternative, Windows 11 allows you to recover from a lost password using answers to the password reset questions you chose when setting up the account.
Manage Your File Encryption Certificates This link opens a wizard you can use to create and manage certificates that enable the use of Encrypting File System (EFS). EFS, which is available in Pro and Enterprise editions of Windows 11, is a method of encrypting folders and files so that they can be accessed only by someone who has the appropriate credentials. For more information, see “Encrypting information” in Chapter 12, “Windows security and privacy.”
Configure Advanced User Profile Properties This link is used to switch your profile between a local profile (one that is stored on the local computer) and a roaming profile (one that is stored on a network server in a domain environment). With a local profile, you end up with a different profile on each computer you use, whereas a roaming profile is the same regardless of which computer you use to sign in to the network. Roaming profiles require a domain network running Windows Server Active Directory services. Microsoft accounts and Azure AD accounts use a different mechanism to sync settings.
Change My Environment Variables Of interest primarily to programmers, this link opens a dialog in which you can create and edit environment variables that are available only to your user account; in addition, you can view system environment variables, which are available to all accounts.
As a local administrator, you can delete any local account or Microsoft account set up on a Windows 11 PC, unless that account is currently signed in. To delete an account, go to Settings > Accounts > Other Users and click the name of the account you want to delete. Then click Remove. Windows then warns about the consequences of deleting an account, which include removing the user’s files.
Note
Windows won’t let you delete the last local account on the computer, even if you signed in using the built-in account named Administrator. This limitation helps to enforce the sound security practice of using an account other than Administrator for your everyday computing.
After you delete an account, that user can no longer sign in. Deleting an account also has another effect you should be aware of: You cannot restore access to resources that are currently shared with the user simply by re-creating the account. This includes files shared with the user and the user’s encrypted files, personal certificates, and stored passwords for websites and network resources. That’s because those permissions are linked to the user’s original security identifier (SID)—not the username. Even if you create a new account with the same name and password, it will have a new SID, which will not gain access to anything that was restricted to the original user account. (For more information about security identifiers, see “Introducing access control in Windows” later in this chapter.)
As we noted in the previous section, every account on a Windows 11 PC is backed by a set of credentials, comprising a username (which might be in the form of an email address) and a password. You can use those credentials to sign in to your account on a Windows 11 PC: At the sign-in screen, select your name (if it’s not already selected) and then enter a password.
Note
When you first turn on your computer or return to it after signing out, the lock screen is displayed. The lock screen normally displays a picture, the current time and date, and alerts from selected apps. (You can select your own lock screen picture and specify what information you want displayed on the lock screen. For details, see “Customizing the lock screen and sign-in screen” in Chapter 4.) To get from the lock screen to the sign-in screen, click anywhere, press any key, or (if you have a touchscreen) swipe up.
Signing in with a strong password can be inconvenient, especially when it’s long and consists of a mix of upper- and lowercase letters, numbers, and special characters. The degree of difficulty becomes even more extreme when you need to enter that strong password on a device where the physical keyboard is unavailable.
To make the sign-in process more convenient without sacrificing security, Windows 11 supports several options you can use in place of your account password. Figure 10-5 shows the full range of alternatives, which you can find by going to Settings > Accounts > Sign-In Options.
Figure 10-5 Windows Hello biometric options are available only if you have a compatible infrared camera or fingerprint reader.
The first three options on the list apply to Windows Hello, a feature that augments the Windows 11 sign-in process with a form of hardware-based security. Additional sign-in options on this page include tools for managing physical security keys, and setting up and managing Dynamic Lock.
If you set up more than one option for signing in, you can choose a method other than the default by clicking Sign-In Options on the sign-in screen. This ability might come in handy, for example, if Windows Hello fails to recognize your face or fingerprint. Icons for each of the options you set up then appear as shown in Figure 10-6; click or tap one to switch methods.
Figure 10-6 Click Sign-In Options to choose a different method for signing in. If Windows Hello biometric authentication is set up, icons for Face or Fingerprint might appear here.
Note that these alternative sign-in options also work for some applications, including the Microsoft Store.
In the following sections, we explain how to set up and manage each of these sign-in methods. We start with the most important secure sign-in option of all, which isn’t available in Settings.
The single greatest advantage of signing in with a Microsoft account or an Azure AD account, as far as we’re concerned, is support for multifactor authentication, which provides security for your PC and its data. (This feature is often called two-factor authentication, or 2FA, but it can also be referred to as two-step verification.) It takes just a few minutes to set up, and the result is a layer of protection that helps prevent a malicious person from using stolen credentials to impersonate your identity.
The most common form of 2FA uses an authenticator app installed on a mobile phone to provide a secondary form of proof of identity when necessary. In that case, the two factors are the classic “something you know” (your password) and “something you have” (the mobile device that you’ve set up as a trusted device). The combination of those two factors creates a hurdle that will stop all but the most determined attackers.
To turn on this feature for a Microsoft account, go to https://account.live.com/proofs and sign in. On that page, you can add approved contact info for receiving security requests and turn on two-step verification.
For devices that are connected to an organization using Azure AD, an administrator must enable multifactor authentication; after that step is complete, users can manage security verification from the Azure AD My Account portal. Start at https://myaccount.microsoft.com, signing in with your work or school account, and then click Additional Security Verification, under the Security Info heading; you can go directly to the page from https://mysignins.microsoft.com/security-info.
For Windows 11, the identity verification process works best with the Microsoft Authenticator app, which is available on both Android and iOS smartphones from each platform’s store or from https://www.microsoft.com/authenticator. This app handles authentication for Azure AD and Microsoft accounts; it also supports most third-party accounts, including those from Google, Facebook, and Amazon. The Authenticator app supports fingerprint- and face-based approvals on compatible hardware and works with several types of smart watches.
When 2FA is turned on, you need to use that additional factor to prove your identity in situations that Microsoft defines as requiring extra security, such as when signing in on a new device for the first time or making changes to account settings; typically, this involves approving a prompt on a previously verified device, such as the Microsoft Authenticator app on a smartphone.
The Windows Hello feature enables you to configure your Windows 11 PC as a trusted device that you can unlock using biometric hardware or a device-specific PIN. In this configuration, your credentials are stored in encrypted form on the device; to sign in, you unlock those credentials with a PIN or biometric identification (using your fingerprint or face).
To set up Windows Hello, you first have to confirm your identity by correctly entering your credentials. After passing that test, you can add a PIN and, with the right hardware support, register your biometric information. When this enrollment process is complete, you can skip the password and sign in to Windows 11 by entering your PIN or supplying what Microsoft engineers call your “biometric gesture,” using facial recognition or a fingerprint reader.
The device you sign in on acts as an authentication component because you established your identity when you set up the device; your additional information (the PIN or your biometric data) is associated with the enrolled device and is not stored on a remote server. This arrangement prevents so-called shoulder surfing attacks, where someone tries to steal your password by watching your keystrokes as you sign in. Because Windows Hello uses a device-specific PIN, other people can’t sign in to your account unless they also steal your computer.
If you want, you can also configure a device so that the only available options use the Windows Hello PIN or biometric information; in this configuration, the Password and Picture Password sign-in options are not available. To enable this option, go to Settings > Accounts > Sign-In Options and enable the For Improved Security, Only Allow Windows Hello Sign-In For Microsoft Accounts On This Device (Recommended) setting.
Windows 11 encourages you to set up a PIN when you create a new user account for the first time. If you skipped this step during Setup, go to the Sign-In Options page and click PIN (Windows Hello). Then click Set Up and follow the on-screen instructions. You need to confirm your identity by entering your account password first. Then enter and confirm your new PIN, as shown in Figure 10-7. The minimum length is four digits (0–9 only), but your PIN can be as long as you want. If you prefer something more complex and harder to guess, select the Include Letters And Symbols option.
Figure 10-7 A PIN serves as a convenient alternative for signing in to Windows and verifying your identity in apps and services. You can choose a PIN that’s longer than the minimum of four characters.
If you want to change your PIN, from the Sign-in Options page, select PIN (Windows Hello) and then click Change Your PIN. Follow the on-screen instructions to complete the process.
To sign in using a PIN, enter the numbers on your keyboard. Note that keypresses in the numeric keypad area of the keyboard register as numbers while you type in the PIN box on the sign-in screen, regardless of whether Num Lock is set. If your computer doesn’t have a keyboard, a numeric pad appears on the screen so that you can tap your PIN. (If the numeric pad does not appear, tap in the PIN-entry box.)
With the proper hardware, you can sign in simply by swiping your fingerprint or, even easier, showing your face in front of your computer’s camera. You might also be able to verify your identity with Windows Hello when making a purchase or accessing a secure service.
To use Windows Hello for biometric sign-ins on a PC, you need one of the following:
A fingerprint reader that supports the Windows Biometric Framework; if this hardware isn’t built in to your computer, you can add a USB-based fingerprint reader.
An illuminated 3-D infrared camera such as those found on Surface laptops and tablets from Microsoft, as well as other advanced devices; note that a standard webcam does not work.
Note
You must add a PIN as described earlier in this chapter before you can use Windows Hello biometric features. This PIN becomes a backup sign-in option in the event your biometric hardware malfunctions or isn’t able to recognize you.
To set up Windows Hello, go to Settings > Accounts > Sign-In Options. Under Windows Hello, expand either Facial Recognition (Windows Hello) or Fingerprint Recognition (Windows Hello) as appropriate. Then click Set Up for the biometric device you want to use.
Windows asks you to enter your PIN to verify your identity. After that, you need to enter your biometric data. With face recognition, that involves looking into the camera (as shown in Figure 10-8); to set up a fingerprint reader, follow the prompts to swipe your fingerprint several times, until Windows Hello has recorded the data it needs.
If you’re setting up fingerprint scanning, you can enroll additional fingers so that you have an alternative if the finger you normally use is, for example, covered with a bandage. Click Add Another after you complete registration for a fingerprint. To add another fingerprint later, return to Settings > Accounts > Sign-In Options and click Add Another. You can also associate an additional fingerprint with a different user account on the same device. Sign in to the alternate account, and set up the second fingerprint there. When you restart, you can choose your account by choosing the fingerprint associated with that account.
Figure 10-8 Setup for Windows Hello guides you through the brief process of scanning and storing your biometric data.
This option is a bit of a misfit on the list of sign-in options. It doesn’t offer the same level of security as Windows Hello (which is the main reason we don’t recommend using it), but the option survives for users who like the idea of personalizing the sign-in process.
Note
If you have enabled the For Improved Security, Only Allow Windows Hello Sign-In For Microsoft Accounts On This Device (Recommended) setting, Picture Password is not displayed on the Sign-in Options page.
With a picture password, you can sign in on a touchscreen using a combination of gestures (specifically, circles, straight lines, and taps) that you make on a picture displayed on the sign-in screen. The easiest way to get comfortable with a picture password is to go ahead and create one.
To get started, go to Settings > Accounts > Sign-In Options. Under Picture Password, click Add. Verify your identity by entering your password to display an introductory screen where you can choose a picture. You then get to select one of your own pictures to appear on the sign-in screen. When you’re satisfied with your selection, click Use This Picture.
On the next screen that appears, you specify the three gestures you’ll use to sign in. These gestures can consist of circles, straight lines, and taps. After repeating the series of gestures to confirm your new “password,” click Finish.
To sign in with a picture password, you must perform the same three gestures on the sign-in screen, in the same order, using the same locations, and in the same direction. You don’t need to be that precise; Windows allows minor variations in location.
When you set up a Microsoft account, you’re required to create a password. Similarly, if you add a local user account to your computer, Windows 11 prompts you to specify a password.
Note
If you sign in with a local account, you must add a password before you can use a PIN, picture password, or Windows Hello.
To set or change your Microsoft account password, go to Settings > Accounts > Sign-In Options. Click or tap Change under Password. If Windows Hello is set up, you first need to enter your PIN or supply biometric authentication. Next, you must enter your existing password to confirm your identity. Windows then asks you to enter your new password.
Note
If you have enabled the For Improved Security, Only Allow Windows Hello Sign-In For Microsoft Accounts On This Device (Recommended) setting, Password is not displayed on the Sign-in Options page.
Changing the password for a local account requires an extra step: You must specify a password hint. The password hint appears after you click your name on the sign-in screen and type your password incorrectly. Be sure your hint is only a subtle reminder because any user can click your name and then view the hint. (Windows won’t allow you to create a password hint that contains your password.)
Note
If you sign in with a local account, you can use a quicker alternative: Press Ctrl+Alt+Delete, and click Change A Password. This method does not include the option to enter a password hint.
You can also set or change the password for the local account of another user on your computer. To do so, open User Accounts in Control Panel, click Manage Another Account, and click the name of the user whose password you want to change. Then click Change The Password or (if the account doesn’t currently have a password) Create A Password.
Caution
If another user has files encrypted with EFS, do not create or change a password for that user; instead, show the user how to accomplish the task from his or her own account. Similarly, do not remove or change another user’s password unless the user has forgotten the password and has exhausted all other options to access the account. (For more information, see the sidebar “Recovering from a lost password.”) If you create, change, or remove another user’s password, that user loses all personal certificates and stored passwords for websites and network resources. Without the personal certificates, the user loses access to all encrypted files and all email messages encrypted with the user’s private key. Windows deletes the certificates and passwords to prevent the administrator who makes a password change from gaining access to them—but this security comes at a cost!
A security key is a physical device built around encryption hardware that supports the Fast Identity Online (FIDO2) standard. These keys, which typically plug into a USB port or connect via Bluetooth or NFC, can be used as a second identity factor to sign in to a Microsoft account or reset a password. Security keys also work with password manager apps and are supported by every major browser that runs on Windows 11, which in turn allows you to use one of these devices for 2FA support on popular web services. In this scenario, you’re typically prompted to tap the security key after entering your credentials. With the addition of a PIN, you can use a security key for passwordless sign in.
Windows 11 doesn’t directly support security keys for signing in, but you can use it to manage a hardware key. Go to Settings > Accounts > Sign-In Options, click Security Key, and then click Manage. Tap the hardware key to select it and then use the options shown in Figure 10-9 to add or change the security key PIN or remove saved credentials from the key and get a fresh start.
Figure 10-9 You can use a physical security key as a second factor for signing in to web services, including Microsoft accounts. Use these controls to change the PIN or remove stored credentials.
When you step away from your computer, you want to be sure you don’t leave it in a state in which others can use your credentials to access your files, sign in to websites or services using saved passwords, read and reply to email messages, or otherwise interfere with your digital identity. For security’s sake, you need to sign out, switch accounts, or lock your computer:
Sign Out With this option, all your running apps close, and the lock screen appears.
Switch Account With this option, also known as fast user switching, your apps continue to run. The sign-in screen appears, ready for the sign-in credentials of the alternative account you select. Your account is still signed in, but only you can return to your own session, which you can do when the user who is currently signed in chooses to sign out, switch accounts, or lock the computer.
Lock With this option, your apps continue to run, but the lock screen appears so that no one can see your desktop or use the computer. Only you can unlock the computer to return to your session; however, other users can sign in to their own sessions without disturbing yours.
To sign out, switch accounts, or lock your computer, click Start and click or tap your picture (in the lower left of Start). That displays a menu with Lock and Sign Out options; on a device with more than one user account set up, it also includes a profile picture and username for other available accounts. On a computer that’s joined to a domain, Switch Account appears instead of individual account names. You can then enter an account name on the sign-in screen.
Windows 11 provides another way to lock a computer called Dynamic Lock. With Dynamic Lock, your computer automatically locks when it becomes separated from your phone, such as when you step away from your desk with your phone in your pocket or purse. To use Dynamic Lock, follow these steps:
If you haven’t already done so, pair your Bluetooth-enabled phone to your computer. For more information, see “Setting up Bluetooth devices” in Chapter 13, “Managing hardware and devices.” Open Settings > Accounts > Sign-In Options. Under the Additional Settings heading, select Dynamic Lock and then select the Allow Windows To Lock Your Device Automatically When You’re Away checkbox.
After following these steps, Windows polls your phone several times each minute. (This does place a small hit on your phone’s battery life.) When it discovers that the phone is no longer in range, the computer locks. Be aware, however, that locking doesn’t occur instantly; Windows polls your phone only periodically, and it takes some time for you to get far enough away so that your phone is out of range.
How far is “out of range”? That sensitivity depends on several factors, including the signal strength of your two devices and the number of walls and other obstructions between the devices. A registry value sets the threshold, but calibrating it takes some experimentation. Rafael Rivera has created a tool for working with Dynamic Lock threshold values; you can read about it at https://bit.ly/DynLock.
For security reasons, Windows 11 does not offer a corresponding dynamic unlock feature. When you return to your computer, even with phone in hand, you need to sign in using one of the usual methods: Windows Hello, password, or PIN.
Personal computers are usually just that—personal. But there are situations in which it makes sense for a single PC to be shared by multiple users. In those circumstances, it’s prudent to configure the shared device securely. Doing so helps to protect each user’s data from inadvertent deletions and changes as well as malicious damage and theft.
Note
In this section, we offer advice for configuring a PC with Microsoft accounts and local accounts. Azure AD and domain accounts are administered centrally.
When you set up your computer, consider these suggestions:
Control who can sign in. Create accounts only for users who need to use your computer’s resources, either by signing in locally or over a network. If an account you created is no longer needed, delete or disable it.
Use standard accounts for additional users. During setup, Windows sets up one local administrative account for installing apps, creating and managing accounts, and so on. All other accounts can and should run with standard privileges.
Be sure that all accounts are protected by a strong password and 2FA. This is especially important for administrator accounts and for other accounts whose profiles contain important or sensitive documents.
Restrict sign-in times. You might want to limit the computing hours for some users, especially children. The easiest way for home users to do this is by setting up family accounts; for details, see “Controlling your family’s computer access,” later in this chapter.
Restrict access to certain files. You’ll want to be sure that some files are available to all users, whereas other files are available only to the person who created them. The Public folder and a user’s personal folders provide a general framework for this protection. You can further refine your file-protection scheme by selectively applying permissions to varying combinations of files, folders, and users.
To allow another person to sign in on your computer and access their own files and settings, you must add a user account for that person. How you choose to set up that account depends on how you as an administrator want to manage the other person’s access. You can add a secondary account by specifying the other person’s Microsoft account email (or creating a local user account with a username and password of your choosing); your only management option in that case is choosing whether the account type is Administrator or Standard. If you’re adding accounts for other family members (especially children), you can choose from a different set of options that allow you much more granular control over when and how they access the PC.
To create a conventional secondary account without using family settings, start by signing in as an administrator and then go to Settings > Accounts. Then select Other Users. (On Windows 11 version 21H2, this option is under the Family & Other Users heading.)
Note
The option to set up accounts for other family members is not available on PCs that are joined to a Windows domain or Azure Active Directory.
Other Users, shown in Figure 10-10, enables you to add additional accounts, either local accounts or Microsoft accounts. To add a user with a Microsoft account, click Add Account and then enter the email address (or phone number) for the account they currently use and complete the wizard to create the user’s account.
Figure 10-10 From this Settings page, you can add a local account or a Microsoft account. The Work Or School option is available only if another Work Or School account is already set up.
If you want to create a local account, click Add Account and then click I Don’t Have This Person’s Sign-In Information. Then, on the Create Account page, select Add A User Without A Microsoft Account.
The Create A User For This PC page displays, shown in Figure 10-11, and you can enter the username and password for the other person.
Figure 10-11 It takes some persistence, but you can resist the entreaties to use a Microsoft account and instead set up a local user account; eventually, you get to this dialog.
You’re also required to choose and answer three security questions for the local account. (If your computer has only local accounts set up, you go directly to this final dialog, skipping the two that guide you toward a Microsoft account.) Click Next, and your work is done.
To add an account for a family member, go to Settings > Accounts, select Family, and then select Add Someone from the Your Family section. Enter the email address of the Microsoft account used by the family member and then complete the wizard to add the account.
You’re asked to define the role that the new user has: An Organizer can edit family and safety settings; a Member can edit their own settings, using options based on their age. When you’ve defined the role, click Invite to send an invitation to the user’s configured email account; they can then use that invitation to complete the process of adding their account to the computer.
Note
The invitation email has as a subject line ”Microsoft Family Safety“ and provides a link labeled Accept Invitation. Selecting this link opens the Family Safety online app, and enables the user to join the family group using the specified email account.
The user account is displayed with a status of Pending until the user accepts the invite.
Note
After you add the account, modify account type, choosing between Standard User and Administrator.
If you’re adding an account for a child, select Create One For A Child on the Add Someone page. After you’ve created their account in the usual way, the account is added to the computer.
Previous versions of Windows had a feature called Parental Controls (Windows Vista and Windows 7) or Family Safety (Windows 8), which allowed parents to restrict and monitor their children’s computer use. Both Windows 10 and Windows 11 offer similar capabilities, but the implementation is completely different. Those earlier Windows versions stored their settings on your PC, but in Windows 11, family settings are now stored and managed as part of your Microsoft account.
Note
Rather than classifying each person as Child or Adult, you act as Organizer for your family; when you add an account to your family, you can assign that person as a Member, whose activities can be managed, or as an Organizer, who can view and change the settings online.
This approach has some benefits:
You don’t need to make settings for each member of your family on each computer. After you add a family member on one PC, you manage their settings in the cloud, and those settings apply to all the family PCs where they sign in.
You can manage each family member’s computer use from any computer that’s connected to the internet.
Family settings have one requirement that some might perceive as a disadvantage: Each family member must have a Microsoft account and sign in with that account.
You use the Family Safety webpage, the Windows Family app (on a Windows 10 or Windows 11 PC), or the Family Safety app on iOS or Android to manage family settings.
Note
The Windows 11 Family app is typically installed automatically with Windows 11 version 22H2; on a PC running version 21H2, you might need to visit the Microsoft Store to download this useful app.
What can you do with Family Safety?
Set screen time. Define limits for your children’s devices, apps, and games.
Find your family. Enables you to locate family members by retrieving location data from their mobile devices.
Monitor driving safety. Enables you to gain insights into your family members’ driving habits, including speed, phone use, and sudden braking. This is a premium feature.
Review reports. Track and review family members’ device and app use.
Define content filters. Control what type of content members can access online.
Manage family email, calendar, and OneNote. Enables you to schedule events, share notes, and set up group email.
Note
Family members must sign in and grant permission for organizers to view their activity and see their location on an Android device.
As the organizer, you perform all management tasks online (at https://family.microsoft.com) or in the Family app. Sign in with your Microsoft account to get started. Figure 10-12 shows a portion of the interface for setting up both daily limits and the times during which a family member can use a Windows 11 PC or an Xbox One console.
Figure 10-12 With Screen Time settings, you specify an allowable range of times for a child’s daily use of Windows 11 PCs and an Xbox One console.
Assigned access is a rather odd feature that you can use to configure your computer so that a single designated user can run a single app. When that user signs in, the specified app starts automatically and runs full-screen. The user can’t close the app or start any others. In fact, the only way out is to press Ctrl+Alt+Delete (or press the Windows button and power button simultaneously), which signs out the user and returns to the sign-in screen.
The use cases for this feature are limited, but here are a few examples:
A kiosk app for public use (see “Setting up a kiosk device” in Chapter 19 for more information)
A point-of-sale app for your business
A game for a very young child
If you can think of a use for this feature, click Get Started under the Set Up A Kiosk heading at the bottom of the Other Users page.
When you launch this wizard, you must either add a new account or select an existing account and designate a Windows app (not a legacy desktop program) for use with the kiosk account. If you selected a web browser as the app, you need to enter the URL for the browser to open.
We’ve saved this fairly technical section for last. Most Windows users never need to deal with the nuts and bolts of the Windows security model. But developers, network administrators, and anyone who aspires to the label “power user” should have at least a basic understanding of what happens when you create accounts, share files, install software drivers, and perform other tasks that have security implications.
The Windows approach to security is discretionary: Each securable system resource—each file or printer, for example—has an owner. That owner, in turn, has discretion over who can and cannot access the resource. Usually, a resource is owned by the user who creates it. If you create a file, for example, you are the file’s owner under ordinary circumstances. (Computer administrators, however, can take ownership of resources they didn’t create.)
Note
To exercise full discretionary control over individual files, you must store those files on an NTFS volume (this feature is also available on PCs running Windows 11 Pro for Workstations with ReFS-formatted volumes). For the sake of compatibility, Windows 11 supports the FAT file systems (FAT, FAT32) used by early Windows versions and many USB flash drives, as well as the exFAT file system used on some removable drives. However, none of the FAT-based file systems support file permissions. To enjoy the full benefits of Windows security, you must use NTFS or ReFS. For more information about file systems, see “Choosing a file system” in Chapter 8, ”Managing local and cloud storage.”
To control which users have access to a resource, Windows uses the SID assigned to each user account. Your SID (a gigantic number guaranteed to be unique) follows you around wherever you go in Windows. When you sign in, the operating system first validates your username and password. Then it creates a security access token. You can think of this as the electronic equivalent of an ID badge. It includes your username and SID, plus information about any security groups to which your account belongs. (Security groups are described later in this chapter.) Any app you start gets a copy of your security access token.
With User Account Control (UAC) turned on, administrators who sign in get two security access tokens—one that has the privileges of a standard user and one that has the full privileges of an administrator.
Whenever you attempt to walk through a controlled “door” in Windows (for example, when you connect to a shared printer), or any time an app attempts to do so on your behalf, the operating system examines your security access token and decides whether to let you pass. If access is permitted, you notice nothing. If access is denied, you get to hear a beep and read a refusal message.
In determining whom to let pass and whom to block, Windows consults the resource’s access control list (ACL). This is simply a list of SIDs and the access privileges associated with each one. Every resource subject to access control has an ACL. This manner of allowing and blocking access to resources such as files and printers has remained essentially unchanged since Windows NT.
UAC adds another layer of restrictions based on user accounts. With UAC turned on, applications are normally launched using an administrator’s standard user token. (Standard users, of course, have only a standard user token.) If an application requires administrator privileges, UAC asks for your consent (if you’re signed in as an administrator) or the credentials of an administrator (if you’re signed in as a standard user) before letting the application run. With UAC turned off, Windows works in the same (rather dangerous) manner as Windows versions from more than two decades ago, before Microsoft got serious about security: Administrator accounts can do just about anything (sometimes getting those users in trouble), and standard accounts don’t have the privileges needed to run many older desktop apps.
For more information about UAC, see “Preventing unsafe actions with User Account Control” in Chapter 12.