{"id":22530,"date":"2026-03-05T09:00:00","date_gmt":"2026-03-05T17:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/insidetrack\/blog\/?p=22530"},"modified":"2026-03-09T09:09:47","modified_gmt":"2026-03-09T16:09:47","slug":"getting-started-with-windows-hello-for-business-and-day-1-authentication-at-microsoft","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/insidetrack\/blog\/getting-started-with-windows-hello-for-business-and-day-1-authentication-at-microsoft\/","title":{"rendered":"Getting started with Windows Hello for Business and Day 1 authentication at Microsoft"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">At Microsoft, we\u2019re relentlessly focused on modernizing our passwordless protections in ways that strengthen our identity and security for everyone at the company.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">At an organization the size of ours\u2014with a global workforce, massive cloud footprint, and millions of identities to protect\u2014relying on passwords wasn\u2019t a sustainable security posture. We needed something stronger, simpler, and more secure.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This led to the introduction of <a href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/implementing-strong-user-authentication-with-windows-hello-for-business\/\">Windows Hello for Business<\/a>, which was first built into Windows 10 and then Windows 11. Windows Hello for Business replaces traditional passwords with hardware\u2011backed keys tied to a user\u2019s device.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">So, instead of typing a \u201csecret phrase\u201d that can be phished or leaked, our employees authenticate with biometrics or <a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/security\/identity-protection\/hello-for-business\/faq\" target=\"_blank\" rel=\"noreferrer noopener\">a PIN that never leaves the device<\/a>. It\u2019s fast, intuitive, and\u2014most importantly\u2014resistant to the kinds of attacks that plague password\u2011based systems.<\/p>\n\n\n\n<figure class=\"wp-block-image alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/Abu-Kabir.png\" alt=\"A photo of Kabir.\" class=\"wp-image-22534\" style=\"width:150px\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/Abu-Kabir.png 500w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/Abu-Kabir-300x300.png 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/Abu-Kabir-150x150.png 150w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"wp-block-paragraph\">\u201cThis wasn\u2019t just a technology shift\u2014it was a structural change in how we establish trust across the organization. The lessons we learned offer a practical blueprint for any organization looking to strengthen their security while also reducing friction for their workforce.\u201d<\/p>\n<cite>Abu Kabir, director of IT service management, Microsoft Digital<\/cite><\/blockquote>\n\n\n\n<p class=\"wp-block-paragraph\">Rolling out passwordless authentication at a large company like ours took more than just introducing new technology. It also required that we come up with a new way to onboard our employees securely, no matter where they work. &nbsp;<\/p>\n\n\n\n<aside class=\"wp-block-group aside-for-guide has-white-200-background-color has-background has-global-padding is-content-justification-right is-layout-constrained wp-container-core-group-is-layout-3f1abf08 wp-block-group-is-layout-constrained\" style=\"border-radius:10px;padding-top:var(--wp--preset--spacing--spacing-12);padding-right:var(--wp--preset--spacing--spacing-12);padding-bottom:var(--wp--preset--spacing--spacing-12);padding-left:var(--wp--preset--spacing--spacing-12)\">\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-298f84b7 wp-block-group-is-layout-flex\" style=\"margin-top:0;margin-bottom:0;padding-top:0;padding-bottom:0\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"132\" height=\"132\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/10\/Engage-with-our-experts_blogs.png\" alt=\"\" class=\"wp-image-20636\" style=\"width:48px\"\/><\/figure>\n\n\n\n<p class=\"has-body-lg-font-size wp-block-paragraph\"><strong>Engage with our experts!<\/strong><\/p>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-4)\">Customers or Microsoft account team representatives from Fortune 500 companies are welcome to <a href=\"mailto:msitstaff@microsoft.com\">request a virtual engagement<\/a> on this topic with experts from our Microsoft Digital team.<\/p>\n<\/aside>\n\n\n\n<p class=\"wp-block-paragraph\">The first step we took toward passwordless credentials was to create Identity Pass, which included an emphasis on Day 1 authentication (on a new employee\u2019s first day at Microsoft). By combining strong identity proofing, a Temporary Access Pass (TAP), and automated onboarding workflows, we forged an identification system where employees could unbox their device, sign in securely, and register their credentials without ever needing a password.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The result wasn\u2019t just a smoother user experience.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cThis wasn\u2019t just a technology shift\u2014it was a structural change in how we establish trust across the organization,\u201d says Abu Kabir, a director of IT service management in Microsoft Digital, the company\u2019s IT organization. \u201cThe lessons we learned offer a practical blueprint for any organization looking to strengthen their security while also reducing friction for their workforce.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How we launched passwordless authentication<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">To understand how we worked through the details of passwordless authentication, it\u2019s helpful to explain how it was implemented in the first place.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Our passwordless security system includes several components, including face or fingerprint, a PIN tied to their device, and a physical security key (like a YubiKey), but this story focuses these on two:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Identity Pass<\/strong>: the internal system for secure, passwordless onboarding and recovery<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Windows Hello for Business<\/strong>: the phishing\u2011resistant credential that Identity Pass helps users register<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Identity Pass<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Identity Pass, which is only used internally here at Microsoft, uses several tools to \u201cbootstrap\u201d the user, which is the first step in establishing trust among a user, a device, and an identity system. It\u2019s the moment when you go from \u201cnothing trusted\u201d to<strong> \u201c<\/strong>something trusted.\u201d Everything that happens afterward depends on getting that moment right.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Identity Pass relies on three core elements:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Verified ID<\/strong> is what we use internally to establish proof of identity. It\u2019s an initial step and is valid for 30 days.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Temporary Access Pass (TAP)<\/strong> establishes authentication.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Conditional access<\/strong> enforces policy.<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Identity Pass is where risk signals matter most, because onboarding and recovery are the moments when identity assurance is weakest. Those risk signals include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Authentication behavior detection:<\/strong> If a user tries to redeem a TAP or Verified ID from an unusual location, device, or pattern, Authentication Behavior Detection can flag a sign in as risky. Identity Pass can then require stronger identity proofing or block the flow.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Global high\u2011risk detection:<\/strong> If our threat intelligence determines the user is likely compromised, Identity Pass will not allow TAP issuance or passwordless registration until the risk is remediated.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Strong fraud indicators:<\/strong> If the user\u2019s session or token shows signs of fraud (token replay, hijacking, malicious infrastructure), Identity Pass will force remediation and block bootstrap flows.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Risk\u2011based identity assurance:<\/strong> This is the decision engine that takes security signals and determines what level of assurance is required. For example:\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Low risk = allow TAP issuance<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Medium risk = require Verified ID reproofing<\/li>\n\n\n\n<li class=\"wp-block-list-item\">High risk = block and escalate<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Identity Pass is essentially the front door where these signals decide whether a user can even begin the passwordless journey.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Windows Hello for Business<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Windows Hello for Business is the strong, phishing\u2011resistant credential that Identity Pass helps users register. Once this is in place, the risk signals listed above continue to influence authentication.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Authentication behavior detection:<\/strong> Windows Hello for Business sign\u2011ins are evaluated like any other. If the user suddenly authenticates from an impossible location or unusual device, this system flags it as a sign\u2011in risk.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Global high\u2011risk detection:<\/strong> If our detects a high\u2011confidence compromise, Windows Hello for Business sessions can be revoked via Continuous Access Evaluation. The user then reregisters through Identity Pass.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Strong fraud indicators:<\/strong> If a Windows Hello for Business token is replayed or misused, this system triggers immediate revocation and forces secure recovery.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Risk\u2011based identity assurance:<\/strong> This determines whether Windows Hello for Business alone is sufficient, or whether the user must step up to a stronger method based on risk.<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Windows Hello for Business is the credential, but the risk signals determine whether that credential is trusted at any given moment.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What we learned: Rollout and implementation<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">While our toolsets and protocols offer a clear path for any organization moving toward passwordless authentication, transferring users from a typical user\/password security setup can have a variety of challenges\u2014especially at the outset.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Devices, environments, and remote work all matter<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">When an organization adopts identity\u2011based, passwordless authentication, one of the first realities it confronts is that the onboarding experience isn\u2019t uniform. Employees don\u2019t all show up with the same hardware, the same operating system version, or the same security capabilities. That diversity has a direct impact on how smoothly a user can complete the initial Day&nbsp;1 setup and register a strong, phishing\u2011resistant credential.<\/p>\n\n\n\n<figure class=\"wp-block-image alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/Matt-Scott.png\" alt=\"A photo of Scott.\" class=\"wp-image-22535\" style=\"width:150px\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/Matt-Scott.png 500w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/Matt-Scott-300x300.png 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/Matt-Scott-150x150.png 150w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"wp-block-paragraph\">\u201cIt\u2019s not one-size-fits-all. The onboarding experience can be different by platform, version, and device. The further away you get from a homogenized environment, the more complexity you introduce.\u201d<\/p>\n<cite>Matt Scott, senior IT service manager, Microsoft Digital<\/cite><\/blockquote>\n\n\n\n<p class=\"wp-block-paragraph\">Device and platform diversity is one of the defining factors in designing a successful passwordless onboarding experience. Any organization adopting identity\u2011based authentication needs an onboarding system that can adapt to a wide range of hardware, OS versions, and security capabilities while still enforcing a consistent, high\u2011assurance security model.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Identity proofing and credential registration don\u2019t look the same across platforms. A laptop might support credential setup directly at the login screen, while a mobile device might require an app\u2011based flow, and a non\u2011traditional platform might rely entirely on browser\u2011based enrollment. The underlying model stays consistent, but the user experience varies depending on where the user begins.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cIt\u2019s not one-size-fits-all,\u201d says Matt Scott, a senior IT service manager in Microsoft Digital. \u201cThe onboarding experience can be different by platform, version, and device. The further away you get from a homogenized environment, the more complexity you introduce.\u201d<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Support volume<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">With Identity Pass in place, we have seen dramatic reductions in password reset volume (80%), onboarding delays, and help desk tickets related to account access. At the initial rollout stage, however, most organizations should anticipate a temporary spike in support needs.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cWe expected an increase in volume, because we had recently gotten to 99% in terms of users being identified through Phish-Resistant Multi-Factor Authentication,\u201d Scott says. \u201cIn reality, what&#8217;s happening is you have a lot of users who are unhappy with the experience as part of the move to a passwordless environment.\u201d<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">No matter how solid the argument is for a passwordless approach or how cleanly an organization implements it, our experience shows that organizations should expect initial confusion from employees and increased pressure on support teams.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cMoving into a passwordless environment is obviously good for everyone, but we needed to make it easier for users to get the information they needed,\u201d Scott says. \u201cIt\u2019s not just one fell swoop of moving from password to passwordless. It\u2019s truly a journey. And it\u2019s very important that change management is part of that journey.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Helping employees help themselves<\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Another key learning during our implementation of passwordless authentication was the importance of accessible documentation. This gives users who have yet to establish their identity credentials a way to get unblocked without having to immediately call IT support.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">That documentation must stay accurate over time, so it\u2019s crucial to build a governance strategy that ensures updates are made quickly as new devices, platforms, and scenarios emerge.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cDuring onboarding, if there\u2019s a problem and a user is locked out, they may not have access to the corporate network,\u201d Kabir says. \u201cHaving a site that they could access, with actual instruction based on which device they\u2019re using and that shows them how to get past key blockers, was very helpful.\u201d<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Maintaining a direct line to leadership in order to help unblock lingering change requests also proved to be essential. In one case, bugs lingered in the engineering queue for days, even weeks, because the escalation path was limited (by design).<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cApproval requests were blocked, and so approvals needed to be accelerated to the skip-level approver,\u201d Kabir says. \u201cWe were able to move fast to fix that, because we had a clear understanding of the pain that folks were feeling on our side and could effectively communicate that to leadership.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Short-term pain, long-term gain<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The impact has been significant. Instead of spending long cycles troubleshooting forgotten passwords or manually verifying user identities, IT teams can focus on higher\u2011value work: strengthening identity protection, refining automation, and improving the user experience. This shift not only reduces operational overhead, it also aligns with our Zero Trust principles by removing weak authentication steps from the identity lifecycle.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">For employees, the experience is equally transformative. New hires can unbox a device, authenticate using a TAP delivered through a secure Verified ID workflow, and immediately register passwordless methods like Windows Hello for Business. Although the onboarding journey may vary across platforms and devices, the process is fast and intuitive.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">For existing users who lose access\u2014whether due to a forgotten PIN, a lost device, or a credential reset\u2014Identity Pass provides a self\u2011service recovery path that avoids the delays and security risks of traditional reset processes.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Our experience demonstrates that when these processes are redesigned around strong, hardware\u2011backed, phishing\u2011resistant credentials, organizations gain both security and efficiency. The result is a more resilient identity foundation that supports the realities of modern work.<\/p>\n\n\n\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c0392459 wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-7db9d80f wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<figure class=\"wp-block-image alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"190\" height=\"190\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Key-takeaways-badge.png\" alt=\"\" class=\"wp-image-19493\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Key-takeaways-badge.png 190w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Key-takeaways-badge-150x150.png 150w\" sizes=\"auto, (max-width: 190px) 100vw, 190px\" \/><\/figure>\n\n\n\n<p class=\"has-body-xl-font-size wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-24);margin-bottom:0;padding-top:var(--wp--preset--spacing--spacing-24)\">Key takeaways<\/p>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\">Here are some suggestions for getting started with Windows Hello for Business and Day 1 onboarding:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Passwordless authentication start with strong identity proofing<\/strong>. Establishing user identity up front is essential to creating a secure foundation for all future authentication.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Day\u00a01 onboarding is the riskiest moment.<\/strong> The initial bootstrap step is where trust is first established, and risk signals matter most.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Temporary Access Pass replaces temporary passwords<\/strong>. TAP provides a secure, time\u2011bound way for users to authenticate and register passwordless credentials without exposing the network to attack.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Device and platform diversity shapes the user experience<\/strong>. Different hardware, operating systems, and compute environments require flexible onboarding paths that still enforce consistent security.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Support demand spikes before it drops<\/strong>. Organizations should expect short\u2011term confusion and increased help\u2011desk volume before passwordless security benefits fully materialize.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Long\u2011term gains are significant<\/strong>. Once deployed, passwordless authentication reduces operational overhead, strengthens security, and improves the user experience across the identity lifecycle.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c0392459 wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-7db9d80f wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<figure class=\"wp-block-image alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"190\" height=\"190\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Try-it-out-badge.png\" alt=\"\" class=\"wp-image-19492\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Try-it-out-badge.png 190w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Try-it-out-badge-150x150.png 150w\" sizes=\"auto, (max-width: 190px) 100vw, 190px\" \/><\/figure>\n\n\n\n<p class=\"has-body-xl-font-size wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-24);margin-bottom:0;padding-top:var(--wp--preset--spacing--spacing-24)\">Try it out<\/p>\n<\/div>\n\n\n\n<ul class=\"wp-block-list is-style-list-no-bullets\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/security\/identity-protection\/hello-for-business\/?OCID=InsideTrack_Product_10770\" target=\"_blank\" rel=\"noreferrer noopener\">Explore Windows Hello for Business.<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/identity-access\/microsoft-entra-id?OCID=InsideTrack_Product_10770\" target=\"_blank\" rel=\"noreferrer noopener\">Check out Microsoft identity and access management services.<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c0392459 wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-7db9d80f wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<figure class=\"wp-block-image alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"190\" height=\"190\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Related-links-badge.png\" alt=\"\" class=\"wp-image-19491\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Related-links-badge.png 190w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Related-links-badge-150x150.png 150w\" sizes=\"auto, (max-width: 190px) 100vw, 190px\" \/><\/figure>\n\n\n\n<p class=\"has-body-xl-font-size wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-24);margin-bottom:0;padding-top:var(--wp--preset--spacing--spacing-24)\">Related links<\/p>\n<\/div>\n\n\n\n<ul style=\"margin-top:var(--wp--preset--spacing--spacing-20)\" class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/implementing-strong-user-authentication-with-windows-hello-for-business\">Learn more about implementing strong user authentication with Windows Hello for Business.<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/entra\/identity\/authentication\/phishing-resistant-authentication-videos\" target=\"_blank\" rel=\"noreferrer noopener\">Read about phishing-resistant authentication with Microsoft Entra ID.<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/securing-the-borderless-enterprise-how-were-using-ai-to-reinvent-our-network-security\">See how Microsoft is using AI to reinvent network security.<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/implementing-a-zero-trust-security-model-at-microsoft\">Discover how we developed a Zero Trust security model at Microsoft.<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/transforming-security-and-compliance-at-microsoft-with-windows-hotpatch\">Find out how Windows Hotpatch transformed security and compliance at Microsoft.<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/hardening-our-digital-defenses-with-microsoft-baseline-security-mode\">Learn how Microsoft hardened our defenses with Microsoft Baseline Security Mode.<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c0392459 wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-7db9d80f wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<figure class=\"wp-block-image alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"190\" height=\"190\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Wed-like-to-hear-from-you-badge.png\" alt=\"\" class=\"wp-image-19490\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Wed-like-to-hear-from-you-badge.png 190w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Wed-like-to-hear-from-you-badge-150x150.png 150w\" sizes=\"auto, (max-width: 190px) 100vw, 190px\" \/><\/figure>\n\n\n\n<p class=\"has-body-xl-font-size wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-24);margin-bottom:0;padding-top:var(--wp--preset--spacing--spacing-24)\">We&#8217;d like to hear from you!<\/p>\n<\/div>\n\n\n\n<ul style=\"margin-top:var(--wp--preset--spacing--spacing-20)\" class=\"wp-block-list is-style-list-no-bullets\">\n<li class=\"wp-block-list-item\"><a href=\"mailto:msitstaff@microsoft.com\">Want more information? Email us and include a link to this story and we\u2019ll get back to you.<\/a><\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>At Microsoft, we\u2019re relentlessly focused on modernizing our passwordless protections in ways that strengthen our identity and security for everyone at the company. At an organization the size of ours\u2014with a global workforce, massive cloud footprint, and millions of identities to protect\u2014relying on passwords wasn\u2019t a sustainable security posture. We needed something stronger, simpler, and [&hellip;]<\/p>\n","protected":false},"author":226,"featured_media":22532,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_hide_featured_on_single":false,"_show_featured_caption_on_single":true,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[71,1],"tags":[822,89,850,852,848,300,419],"coauthors":[893],"class_list":["post-22530","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-featured","category-uncategorized","tag-corporate-functions","tag-digital-transformation","tag-end-user-services-and-support","tag-it-and-business-operations","tag-security-and-risk-management","tag-windows","tag-zero-trust","m-blog-post"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Getting started with Windows Hello for Business and Day 1 authentication at Microsoft - Inside Track Blog<\/title>\n<meta name=\"description\" content=\"Discover how we moved to passwordless authentication internally at Microsoft and get tips on how your organization can implement your own solution.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/getting-started-with-windows-hello-for-business-and-day-1-authentication-at-microsoft\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Getting started with Windows Hello for Business and Day 1 authentication at Microsoft - Inside Track Blog\" \/>\n<meta property=\"og:description\" content=\"Discover how we moved to passwordless authentication internally at Microsoft and get tips on how your organization can implement your own solution.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/getting-started-with-windows-hello-for-business-and-day-1-authentication-at-microsoft\/\" \/>\n<meta property=\"og:site_name\" content=\"Inside Track Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-05T17:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-09T16:09:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10770-Hero_image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2300\" \/>\n\t<meta property=\"og:image:height\" content=\"1293\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Matthew Cooke\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matthew Cooke\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/getting-started-with-windows-hello-for-business-and-day-1-authentication-at-microsoft\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/getting-started-with-windows-hello-for-business-and-day-1-authentication-at-microsoft\\\/\"},\"author\":{\"name\":\"Matthew Cooke\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#\\\/schema\\\/person\\\/56916f4a792f417aa3a8199f713a48ad\"},\"headline\":\"Getting started with Windows Hello for Business and Day 1 authentication at Microsoft\",\"datePublished\":\"2026-03-05T17:00:00+00:00\",\"dateModified\":\"2026-03-09T16:09:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/getting-started-with-windows-hello-for-business-and-day-1-authentication-at-microsoft\\\/\"},\"wordCount\":2105,\"image\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/getting-started-with-windows-hello-for-business-and-day-1-authentication-at-microsoft\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2026\\\/03\\\/10770-Hero_image.jpg\",\"keywords\":[\"Corporate Functions\",\"digital transformation\",\"End user services and support\",\"IT and business operations\",\"Security and risk management\",\"Windows\",\"Zero Trust\"],\"articleSection\":[\"Featured\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/getting-started-with-windows-hello-for-business-and-day-1-authentication-at-microsoft\\\/\",\"url\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/getting-started-with-windows-hello-for-business-and-day-1-authentication-at-microsoft\\\/\",\"name\":\"Getting started with Windows Hello for Business and Day 1 authentication at Microsoft - Inside Track Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/getting-started-with-windows-hello-for-business-and-day-1-authentication-at-microsoft\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/getting-started-with-windows-hello-for-business-and-day-1-authentication-at-microsoft\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2026\\\/03\\\/10770-Hero_image.jpg\",\"datePublished\":\"2026-03-05T17:00:00+00:00\",\"dateModified\":\"2026-03-09T16:09:47+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#\\\/schema\\\/person\\\/56916f4a792f417aa3a8199f713a48ad\"},\"description\":\"Discover how we moved to passwordless authentication internally at Microsoft and get tips on how your organization can implement your own solution.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/getting-started-with-windows-hello-for-business-and-day-1-authentication-at-microsoft\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/getting-started-with-windows-hello-for-business-and-day-1-authentication-at-microsoft\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/getting-started-with-windows-hello-for-business-and-day-1-authentication-at-microsoft\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2026\\\/03\\\/10770-Hero_image.jpg\",\"contentUrl\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2026\\\/03\\\/10770-Hero_image.jpg\",\"width\":2300,\"height\":1293,\"caption\":\"We learned a lot when we moved to passwordless authentication at Microsoft\u2014learn how your organization can follow in our footsteps.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/getting-started-with-windows-hello-for-business-and-day-1-authentication-at-microsoft\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Getting started with Windows Hello for Business and Day 1 authentication at Microsoft\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/\",\"name\":\"Inside Track Blog\",\"description\":\"How Microsoft does IT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#\\\/schema\\\/person\\\/56916f4a792f417aa3a8199f713a48ad\",\"name\":\"Matthew Cooke\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/aed52b8c400a6df2a5049bcd2da2fd4498f18615ef1985ef7b3e3183b271069c?s=96&d=mm&r=g228ce1d3b19ca88e42c6b82d2758e941\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/aed52b8c400a6df2a5049bcd2da2fd4498f18615ef1985ef7b3e3183b271069c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/aed52b8c400a6df2a5049bcd2da2fd4498f18615ef1985ef7b3e3183b271069c?s=96&d=mm&r=g\",\"caption\":\"Matthew Cooke\"},\"url\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/author\\\/mcooke\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Getting started with Windows Hello for Business and Day 1 authentication at Microsoft - Inside Track Blog","description":"Discover how we moved to passwordless authentication internally at Microsoft and get tips on how your organization can implement your own solution.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/insidetrack\/blog\/getting-started-with-windows-hello-for-business-and-day-1-authentication-at-microsoft\/","og_locale":"en_US","og_type":"article","og_title":"Getting started with Windows Hello for Business and Day 1 authentication at Microsoft - Inside Track Blog","og_description":"Discover how we moved to passwordless authentication internally at Microsoft and get tips on how your organization can implement your own solution.","og_url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/getting-started-with-windows-hello-for-business-and-day-1-authentication-at-microsoft\/","og_site_name":"Inside Track Blog","article_published_time":"2026-03-05T17:00:00+00:00","article_modified_time":"2026-03-09T16:09:47+00:00","og_image":[{"width":2300,"height":1293,"url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10770-Hero_image.jpg","type":"image\/jpeg"}],"author":"Matthew Cooke","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Matthew Cooke","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/getting-started-with-windows-hello-for-business-and-day-1-authentication-at-microsoft\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/getting-started-with-windows-hello-for-business-and-day-1-authentication-at-microsoft\/"},"author":{"name":"Matthew Cooke","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#\/schema\/person\/56916f4a792f417aa3a8199f713a48ad"},"headline":"Getting started with Windows Hello for Business and Day 1 authentication at Microsoft","datePublished":"2026-03-05T17:00:00+00:00","dateModified":"2026-03-09T16:09:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/getting-started-with-windows-hello-for-business-and-day-1-authentication-at-microsoft\/"},"wordCount":2105,"image":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/getting-started-with-windows-hello-for-business-and-day-1-authentication-at-microsoft\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10770-Hero_image.jpg","keywords":["Corporate Functions","digital transformation","End user services and support","IT and business operations","Security and risk management","Windows","Zero Trust"],"articleSection":["Featured"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/getting-started-with-windows-hello-for-business-and-day-1-authentication-at-microsoft\/","url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/getting-started-with-windows-hello-for-business-and-day-1-authentication-at-microsoft\/","name":"Getting started with Windows Hello for Business and Day 1 authentication at Microsoft - Inside Track Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/getting-started-with-windows-hello-for-business-and-day-1-authentication-at-microsoft\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/getting-started-with-windows-hello-for-business-and-day-1-authentication-at-microsoft\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10770-Hero_image.jpg","datePublished":"2026-03-05T17:00:00+00:00","dateModified":"2026-03-09T16:09:47+00:00","author":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#\/schema\/person\/56916f4a792f417aa3a8199f713a48ad"},"description":"Discover how we moved to passwordless authentication internally at Microsoft and get tips on how your organization can implement your own solution.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/getting-started-with-windows-hello-for-business-and-day-1-authentication-at-microsoft\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/insidetrack\/blog\/getting-started-with-windows-hello-for-business-and-day-1-authentication-at-microsoft\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/getting-started-with-windows-hello-for-business-and-day-1-authentication-at-microsoft\/#primaryimage","url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10770-Hero_image.jpg","contentUrl":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10770-Hero_image.jpg","width":2300,"height":1293,"caption":"We learned a lot when we moved to passwordless authentication at Microsoft\u2014learn how your organization can follow in our footsteps."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/getting-started-with-windows-hello-for-business-and-day-1-authentication-at-microsoft\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/insidetrack\/blog\/"},{"@type":"ListItem","position":2,"name":"Getting started with Windows Hello for Business and Day 1 authentication at Microsoft"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#website","url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/","name":"Inside Track Blog","description":"How Microsoft does IT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/insidetrack\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#\/schema\/person\/56916f4a792f417aa3a8199f713a48ad","name":"Matthew Cooke","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/aed52b8c400a6df2a5049bcd2da2fd4498f18615ef1985ef7b3e3183b271069c?s=96&d=mm&r=g228ce1d3b19ca88e42c6b82d2758e941","url":"https:\/\/secure.gravatar.com\/avatar\/aed52b8c400a6df2a5049bcd2da2fd4498f18615ef1985ef7b3e3183b271069c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aed52b8c400a6df2a5049bcd2da2fd4498f18615ef1985ef7b3e3183b271069c?s=96&d=mm&r=g","caption":"Matthew Cooke"},"url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/author\/mcooke\/"}]}},"jetpack_featured_media_url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10770-Hero_image.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9hcZA-5Ro","_links":{"self":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/posts\/22530","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/users\/226"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/comments?post=22530"}],"version-history":[{"count":2,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/posts\/22530\/revisions"}],"predecessor-version":[{"id":22537,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/posts\/22530\/revisions\/22537"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/media\/22532"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/media?parent=22530"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/categories?post=22530"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/tags?post=22530"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/coauthors?post=22530"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}