{"id":1020,"date":"2014-08-14T08:10:00","date_gmt":"2014-08-14T08:10:00","guid":{"rendered":"http:\/\/marcbook.local\/wds\/playground\/cybertrust\/2014\/08\/14\/what-is-a-trusted-device\/"},"modified":"2023-05-15T23:12:26","modified_gmt":"2023-05-16T06:12:26","slug":"what-is-a-trusted-device","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2014\/08\/14\/what-is-a-trusted-device\/","title":{"rendered":"What is a trusted device?"},"content":{"rendered":"
When you try to view or edit your credit card details or other sensitive information in your Microsoft account, you might need to enter a security code first, to make sure that only you can get in to your account. But you can designate a computer or other device as a trusted device<\/strong>. On trusted devices, you don’t need to enter a security code each time you try to access sensitive information.<\/p>\n You can trust as many devices as you want. There is no limit. If you don’t sign in to a particular trusted device at least once every two months, it\u2019s automatically removed from your Microsoft account. This safeguard helps keep your account more secure in the event that a trusted device is lost or stolen without you realizing it. You can always trust a device again later.<\/p>\n When you try to view or edit your credit card details or other sensitive information in your Microsoft account, you might need to enter a security code first, to make sure that only you can get in to your account. But you can designate a computer or other device as a trusted device. On trusted […]<\/p>\n","protected":false},"author":61,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"content-type":[3659],"topic":[3670],"products":[],"threat-intelligence":[],"tags":[3822],"coauthors":[1879],"class_list":["post-1020","post","type-post","status-publish","format-standard","hentry","content-type-best-practices","topic-device-management","tag-microsoft-security-insights"],"yoast_head":"\nHow many trusted devices can I have?<\/h2>\n