Skip to main content

Windows PIN Policy

Updated yesterday

The Windows PIN Policy allows administrators to configure and enforce Windows Hello for Business PIN requirements on managed devices.
This policy applies to both BYOD and corporate-owned Windows 10+ devices and provides detailed controls over PIN composition, expiration, history, and authentication behavior.

Windows Hello PINs offer stronger security than traditional passwords by tying authentication to the specific device and allowing hardware-backed protection such as TPM.


Requirements

  • Windows 10 or later

  • Windows Hello for Business must be supported and enabled on the device


Overview

The Windows PIN Policy allows IT admins to control:

  • PIN length (minimum and maximum)

  • Required character types (digits, uppercase, lowercase, special characters)

  • Expiration rules (optional)

  • PIN history (reuse prevention)

  • Use of Windows Hello for Business authentication (Passport for Work)

This ensures devices adhere to organizational security standards while improving usability and compliance.


Configurable Settings

Below is a breakdown of each available setting in the policy.


Digits

Controls whether numeric digits are allowed in the PIN.

Option

Description

Allow digits in PIN

Digits may be used (recommended)

Disallow digits in PIN

Prevents digits from being used

Require digits in PIN

At least one digit must be included

Digits significantly strengthen a PIN and are recommended for most deployments.


Expiration

Specifies when the PIN must be changed (in days).

  • Valid values: 0–730

  • If set to 0, PINs never expire

  • If Use System Default is checked, Windows default policy applies

A PIN expiration cycle helps maintain security but may reduce user convenience.


History

Controls how many previous PINs the system remembers to prevent reuse.

  • Valid values: 0–50

  • If Use System Default is selected, the system enforces its built-in value

Example:

  • Setting PIN history to 5 prevents the user from using any of their last five PINs.


Lowercase Letters

Controls the use of lowercase letters in the PIN.

Option

Description

Allow lowercase letters

User may include lowercase letters

Disallow lowercase letters

No lowercase letters allowed

Require lowercase letters

At least one lowercase letter must be used

Note: PINs can contain letters even though they’re called “PINs”—Windows Hello behaves like a password-style authenticator.


Uppercase Letters

Controls whether uppercase letters may be used in the PIN.

Option

Description

Allow uppercase letters

Uppercase characters may be used

Disallow uppercase letters

No uppercase characters allowed

Require uppercase letters

At least one uppercase letter must be used


Special Characters

Controls whether special characters are allowed in the PIN.
Valid special characters include:

! # $ % ^ & * ( ) _ - + = { } [ ] \ | : ; " ' < > , . ? /

Option

Description

Allow special characters

Special characters may be included

Disallow special characters

No special characters allowed

Require special characters

At least one special character must be used


Maximum PIN Length

Defines the maximum number of characters allowed.

  • Valid range: 4–127

  • Must be greater than or equal to Minimum PIN Length

  • Configure only if you disable Use System Default


Minimum PIN Length

Defines the minimum number of characters required.

  • Valid range: 4–127

  • Must be less than or equal to Maximum PIN Length

  • Configure only if you disable Use System Default

Recommended minimum: 6–8 characters for improved security.


Use Passport For Work

Controls whether Windows Hello for Business can be used for sign-in.

Setting

Description

True

Allows Windows Hello (PIN, biometrics, security keys)

False

Restricts sign-in to traditional methods (passwords, smart cards, etc.)

Passport for Work enables passwordless authentication through:

  • PIN

  • Facial recognition

  • Fingerprint

  • Smart Cards

  • FIDO2 keys

Minimum requirement: Windows 10+


Best Practices

  • Require digits and special characters for stronger PIN security

  • Set a minimum PIN length of 6–8 or more

  • Enable Passport For Work to improve security and user experience

  • Avoid overly frequent PIN expiration (0 or 180+ days recommended)

  • Use PIN History to prevent reuse

  • Combine with Windows Security Baseline and BitLocker Encryption Policy for enhanced protection


How to Configure

  1. Open Swif Admin Console

  2. Navigate to Policies → Create New Policy

  3. Select Windows PIN Policy

  4. Configure character rules, length, expiration, and Passport For Work

  5. Click Continue

  6. Assign to devices or device groups

  7. Save and apply

Devices will enforce PIN rules during the next MDM sync or during the next PIN creation/change cycle.


Troubleshooting

Users report that PIN changes are not being enforced

  • Ensure the device is running Windows 10+

  • Confirm Windows Hello for Business is enabled

  • Check for conflicting domain/Group Policy settings

  • Reboot device to apply updated auth policies

Users cannot create a PIN

Possible causes:

  • TPM issues (check TPM status)

  • Windows Hello disabled via GPO or registry

  • Minimum/maximum length incorrectly configured

Passport for Work is enabled but PIN is not appearing

  • Verify the device is Azure AD-joined or hybrid-joined

  • Confirm required authentication capabilities are available

Did this answer your question?