Important Windows Security Features Disabled by Microsoft: Here’s What You Need to Know

Important Windows Security Features Disabled by Microsoft: Here’s What You Need to Know

Windows 11 boasts an array of built-in security features designed to safeguard your sensitive information. Although many of these tools are activated by default, certain functionalities remain disabled, necessitating manual activation due to either initial configuration requirements or their potential impact on routine usage. To bolster your security framework, consider enabling the following features in Windows 11.

1. Dynamic Lock

This innovative feature ensures that your PC automatically locks when you step away from it, an essential aspect if your device is ever at risk of theft. By default, Dynamic Lock is turned off because it requires initial setup with a Bluetooth device. Typically, this involves pairing your Windows PC with your smartphone. When your smartphone moves out of range, the PC locks itself after a short delay.

While Bluetooth wearables or headphones can be utilized, a smartphone is usually the most recommended option. To set up, enable Bluetooth on your mobile device and pair it with your PC using the Add device functionality.

Navigate to Windows Settings, then to Accounts > Sign-in options, and enable Allow Windows to automatically lock your device when you’re away within the Dynamic Lock settings.

Enabling Dynamic Lock in Windows

Now, whenever your paired Bluetooth device moves out of range, your PC will lock itself after a 30-second delay, helping to prevent unauthorized access.

2. Windows Sandbox

Windows Sandbox offers a secure, isolated environment for running applications without jeopardizing your primary operating system. This feature is particularly beneficial for evaluating unknown software or visiting suspicious websites safely. The Sandbox environment resets itself to a clean state upon closing, ensuring no changes persist.

Available exclusively for Pro and Enterprise editions, Windows Sandbox is disabled by default due to the resource demands of Hyper-V services. To enable this feature, conduct a search for “Windows features” and access Turn Windows features on or off.

Within this menu, check the box for Windows Sandbox at the bottom and click OK. Following this, Windows will install the necessary components and prompt you to reboot your PC, a process that may take a few moments.

Enabling Windows Sandbox in Windows Optional Features

After a successful reboot, launch the Windows Sandbox application to open a fresh Windows environment in a smaller window. Remember that closing this window will erase any actions taken during that session.

3. User Account Control (UAC) Strict Mode

By default, User Account Control (UAC) prompts you for admin permission only when performing actions that require elevated access, such as software installation or editing the Windows Registry. However, activating the stricter mode requires confirmations for even minor changes, including adjustments to basic settings like opening System Restore.

Though this approach can introduce additional interruptions, it significantly enhances security by preventing unintentional or malicious modifications.

To activate UAC in strict mode, search for “uac” in Windows Search and select Change User Account Control Settings. Adjust the slider to Always Notify and click OK. This adjustment ensures that UAC prompts appear for every change made to your system, whether initiated by you or potentially harmful software.

Windows UAC Interface with Maximum Slider

4. Controlled Folder Access

Providing robust ransomware protection, Controlled Folder Access is another critical feature, yet it remains disabled by default due to the risk of interfering with app functionalities that may need access to user data. This tool secures designated folders from unauthorized modifications by untrusted applications, only permitting those approved by Microsoft or whitelisted by the user.

To activate this feature, open the Windows Security app by searching for it in Windows Search.

Navigate to Virus & threat protection, click on Manage settings under Virus & threat protection settings, and then go to Manage Controlled folder access.

Manage Controlled Folder Access Option in Windows Security

Enable the toggle under Controlled folder access to turn this feature on, which by default protects common folders like Documents, Pictures, and Videos. To add more folders for protection, select Protected folders and include those you deem necessary.

Controlled Folder Access Enabled with Options Windows Security

5. Password Reuse and Unsafe Storage Warnings

Windows offers a crucial safeguard against phishing, alerting users when they attempt to reuse passwords or store them improperly, such as in a notes application. Although these warnings enhance security, they may be disabled by default due to the potential disruption they may cause to your workflow.

To ensure you avoid password reuse or insecure storage, access the Windows Security app again and navigate to App & browser control > Reputation-based protection settings. Enable both Warn me about password reuse and Warn me about unsafe password storage.

Windows Security Phishing Settings

Upon activation, Windows will caution you whenever you enter your account password outside of official Microsoft sign-in pages, significantly enhancing your online security.

Bonus: Smart App Control

Smart App Control is another noteworthy security feature that only permits trusted applications to execute on your system, making it ideal for users seeking maximum protection. However, do note that it can only be activated with a clean installation of Windows 11. For those prioritizing security, enabling Smart App Control is highly advisable.

While these security measures may introduce some additional steps into the daily computing experience, the benefits in terms of protection against malicious threats far outweigh any inconvenience. Furthermore, ensure that you are leveraging Microsoft Defender’s advanced features alongside these settings for comprehensive security.

Source & Images

Leave a Reply

Your email address will not be published. Required fields are marked *