We're trying a number of options for a space that's almost all "guest" access, and since web portals are awful with HTTPS everywhere, we're trying 802.1x EAP auth to a radius server.
For OS-X, it's been working great. User picks network, types in their credentials from our partner that runs the radius server, and away they go. Windows folks though... some connect with no issues. Others seem to be sending what appear to be their actual windows domain credentials (there are "\\" in the username, etc.) as opposed to sending the email/password that the on-site folks provide them. I am not a windows person, what is this fluke and on the AP side of things, is there any way to prevent this behavior?
This is not the major problem. I have the similar issue a few months ago. The option EAP deleted always may be due to antivirus. I have managed this problem with the help of Windows 10 support number. You may try this.
Do NOT click on the link in the above post. This person is posting this link on multiple Get Satisfaction forums, including the on I frequent (ViaSat), so I'm making sure to warn others to not click on that link. It's a phishing scam.