Essential Windows Setting You’ll Regret Ignoring Too Late

Essential Windows Setting You’ll Regret Ignoring Too Late

The primary concern surrounding laptop theft goes beyond simply losing the physical device; it is that any unencrypted hard drive can be accessed through any computer. Thankfully, Windows offers robust built-in security features, and knowing how to utilize them is key.

The Reluctance to Embrace Encryption

Many individuals, myself included, have long steered clear of using BitLocker due to fears of unintentionally locking ourselves out of precious files. I am not alone in experiencing these anxieties.

Horrific stories circulate about users who found themselves unable to retrieve their data after a BIOS update prompted BitLocker to request a recovery key during startup. This happens because the Trusted Platform Module (TPM) chip, which holds the encryption configuration, regards BIOS changes as potential threats to security. Without the recovery key, your data becomes inaccessible.

Another misconception is that many believe they lack anything of significant value. However, a quick reflection reveals the potential loss—text messages, financial notes, cherished family photographs, websites with saved passwords, and various personal documents. The reality is that a stolen laptop could cost you far more than the device itself.

Understanding the Performance Impact

A legitimate concern associated with encryption is its potential impact on performance. In my tests with the Samsung 970 EVO Plus 256GB, I observed a substantial decline—about 25%—in sequential read speeds when encryption was activated (2747 MB/s compared to 3450 MB/s in an unencrypted state).Meanwhile, sequential write speeds remained largely unchanged at approximately 2300 MB/s.

Samsung 970 Evo Plus 250 GB benchmark chart Encrypted vs Unencrypted
Tashreef Shareef / MakeUseOf

Random read operations were notably faster with encryption disabled, leading to quicker application launches and file access. However, while the benchmarks indicate a difference, the real-world experience may not reflect such drastic changes—offering slight improvements rather than a complete overhaul in speed.

Samsung Magician SS970 EVO Plus unencrypted drive performance
Image credit – self captured (Tashreef Shareef) – No Attribution Required

The Case for Enabling Device Encryption

Modern smartphones, whether iPhone or Android, frequently encrypt your data simply by enabling lock screen security. Similarly, Apple computers featuring T2 chips come with automatic data encryption right from the box. This seamless functionality is precisely what we want—data protection working quietly in the background as we proceed with daily tasks.

If someone were to steal your laptop and it was unencrypted, they could easily remove the hard drive, connect it to another machine, and access your files. However, with encryption engaged, the hard drive would require formatting before it could be used, erasing all existing data in the process.

Samsung SSD product details
Hannah Stryker/MakeUseOf

The need for encryption becomes even more apparent when selling or donating older devices. Knowing your data was secured through encryption alleviates worries—even if you forget to erase the drive, the new user would be unable to access your information without the decryption keys.

This security measure is crucial for businesses that handle sensitive client data. An unencrypted laptop containing customer information can lead to severe reputational damage and potential lawsuits. For personal users as well, the peace of mind derived from encryption is undoubtedly worth it.

If Microsoft’s built-in encryption does not meet your needs or if you seek greater flexibility, numerous third-party encryption applications for Windows are available—such as VeraCrypt, Boxcryptor, or Cryptomator. These offer robust encryption options independently of your Windows account, enabling access on any computer with just a passphrase.

Activating Device Encryption

Recently, Microsoft has begun automatically enabling device encryption on new Windows 11 installations, regardless of the setup path taken. Whether you choose a Microsoft account or opt for a local account, encryption is turned on by default.

A critical distinction lies in how your recovery key is managed. When signing in with a Microsoft account, your recovery key is saved in the cloud. Conversely, using a local account leaves the recovery key stored solely on your device, resulting in only partial protection and lacking proper backup.

Windows 11 settings showing device encryption enabled
Image credit – self captured (Tashreef Shareef) – No Attribution Required

To finalize the encryption process, switching to a Microsoft account is necessary—this will securely upload the recovery key to the cloud.

If you’ve recently upgraded to a new computer or completed a fresh Windows 11 installation, it’s prudent to verify your encryption status. Navigate to Settings > Privacy & Security, and select Device encryption. If the status reads Device encryption is on, congratulations—you are now protected.

However, if you encounter a warning stating Sign in with your Microsoft account to finish encrypting the device, it indicates that encryption is not fully activated. Click on Sign in and access your Microsoft account to ensure full security and backup of your recovery key.

Windows 11 settings warning for signing in with Microsoft Account
Image credit – self captured (Tashreef Shareef) – No Attribution Required

Be aware that encryption options will vary depending on your Windows edition and hardware specifications. The Windows 11 Home version includes a simplified form of BitLocker called Device Encryption, while Pro and Education editions provide the full-featured BitLocker, encompassing enhanced management capabilities and optimized control over your security settings.

Device Encryption in Windows 11 Home

Windows 11 Home simplifies encryption for users. If your hardware supports it (which is typical for most recent machines), device encryption is automatically activated when signing in with a Microsoft account on a new installation.

For those upgrading to Windows 11, device encryption must be manually activated. For this, navigate to Settings > Privacy & Security > Device encryption and switch it on. Windows will handle any further tasks, including backing up your recovery key to your Microsoft account.

This ease of use serves most users well—as long as they possess access to their Microsoft account.

BitLocker on Windows 11 Pro and Education

BitLocker extends the functionalities of device encryption by providing comprehensive management tools. With BitLocker, you can encrypt specific drives, utilize various authentication practices, and most significantly, designate multiple backup locations for your recovery keys right from the outset.

To activate BitLocker, click Start, type Manage BitLocker, and select it from your search results. Choose your drive, then click Turn on BitLocker and set a password when prompted. Windows will guide you through the setup steps, including recovery key backup.

BitLocker control panel showing settings

Additionally, BitLocker allows you to encrypt external drives—an option unavailable with device encryption—making it invaluable for those who backup or store sensitive data on USB drives or external hard disks.

Safeguarding Your Recovery Keys

Critical to the encryption process is the secure backup of your recovery key. This key acts as the master key to your encrypted data; without it, access to your information is lost if you cannot log in to your account.

By default, Windows does not permit storage of your recovery key on the encrypted drive itself, which is a wise choice. Instead, back it up to your Microsoft account.

You can access your recovery key via your Microsoft account by visiting BitLocker recovery keys and signing in. This opens your dashboard where you can view all recovery keys linked to your laptop.

Microsoft account BitLocker recovery keys displayed
Image credit – self captured (Tashreef Shareef) – No Attribution Required

Additionally, consider saving a copy of your recovery key to your OneDrive personal vault if you subscribe to Microsoft 365, as well as to a USB drive located in a secure place away from your computer. Uploading it to your password manager will also enable you to retrieve the key conveniently when needed.

For greater safety, add labels to your recovery keys to track which key corresponds with which device. With time and multiple devices, the 48-digit keys may blend together. Identifying them by device name and creation date is advisable. Remember, it is equally crucial to encrypt your backup data as it is for your main drive.

Be sure to refresh your backed-up keys if you decrypt and re-encrypt your drive, as old keys will become invalid, and you won’t want to find this out under duress.

Device Encryption: Essential for Your Data Security

While backing up recovery keys may require diligence, the worst-case scenario of being locked out can pale in comparison to the repercussions of leaving your data unprotected. Given that most of your devices already encrypt data by default, why would you risk your Windows PC?

If performance concerns are weighing on your mind, you can conduct your own tests. Enable device encryption if it isn’t turned on and observe any performance shifts on your system. In the event of unsatisfactory performance, you can revert to an unencrypted state by navigating to Settings > Privacy & Security and disabling Device Encryption.

Source & Images

Leave a Reply

Your email address will not be published. Required fields are marked *