Windows

Windows | News, how-tos, features, reviews, and videos

Microsoft-based election, campaign systems

tt19 045 thumb
video

Windows 10: Answering your most important questions | TECH(talk)

Computerworld Windows expert Preston Gralla and Executive Editor Ken Mingis are back to answer your questions about Windows 10.

cssg 028 thumb
video

Top enterprise VPN vulnerabilities

Don’t assume VPNs are always safe. These popular enterprise VPNs all have known remote code execution vulnerabilities.

Lock + key securing abstract data with a Windows logo overlay.

How to protect and safely erase data on Windows devices

Microsoft's BitLocker now uses AES encryption, but will default to the storage device's hardware encryption unless you make this setting, which will also allow you to easily sanitize drives.

cssg 027 thumb
video

How to safely erase data under Windows

Bitlocker and self-encrypting hard drives can make it easier to erase data so that it cannot be recovered. This is how the “crypto-erase” method works.

Email migration to Microsoft Outlook app on mobile email for smartphone user.

How to migrate smartphone users to the Outlook app with Intune

With the pending retirement of Microsoft Basic Authentication, the best way to protect mobile device users connecting through Exchange is to move them to Outlook.

cssg 026 thumb
video

How to move users to the Outlook app with Intune

Microsoft is turning off basic authentication, so it’s wise to move mobile users to the Outlook app to better protect them from attackers.

tt19 041 thumb
video

Windows 10: Answers to your most important issues | TECH(talk)

Computerworld's Preston Gralla and Executive Editor Ken Mingis are back answering questions about Windows 10. If you have questions, post them in the comments to be featured in our next TECH(talk) about Windows 10.

Credential theft  > A thief steals a password.

How to detect and halt credential theft via Windows WDigest

Attackers can steal user credentials by enabling credential caching in the Windows authentication protocol WDigest. Here's how to stop them.

cssg 025 thumb
video

How to monitor Windows to prevent credential theft attacks

Attackers are now enabling WDigest credential caching to allow them to harvest credentials. Here’s how to spot it.

cssg 024 thumb
video

How to set up Microsoft Teams for security and compliance

These are the security and compliance decisions you need to make when deploying Microsoft Teams.

cssg 023 thumb
video

How to disable basic or legacy authentication to set up MFA in Office 365

Microsoft recommends setting up multi-factor authentication in Windows 10 for better security, but you have to disable basic or legacy authentication first.

cssg 022 thumb
video

How to avoid using RDP in Windows

Several new vulnerability disclosures in Windows Remote Desktop Protocol suggest it’s time to stop using it. Here’s how.

Identity access management  >  abstract network connections and circuits reflected in eye

How to check Privileged Identity management settings for Office 365

Microsoft Azure Privileged Identity Management (PIM) allows you to set administrative rights for roles on an as-needed basis, reducing risk.

youtube thumbnails template
video

Windows 10: Answers to your most important questions | TECH(talk)

Computerworld’s Windows expert, Preston Gralla, and Executive Editor Ken Mingis answer questions about Windows 10 and discuss how the operating system is still evolving.

Microsoft's Chromium Edge browser

Know your Edge Chromium security options

Microsoft's upcoming Chromium-based Edge browser will give Edge- and Chrome-like web security features to older versions of Microsoft Windows. Here's what you need to know.

cssg 021 thumb
video

How to set up Edge Chromium security options

Edge Chromium can provide more protection for organizations that use older versions of Windows.

cssg 020 thumbpng
video

How an attacker can target phishing attacks

There are a number of ways attackers can exploit public information about your organization's employees. CSO Online's Susan Bradley walks through how an attacker can gain access to your organization's Office 365 accounts and how you...

Targeting user behavior.

How to set up Microsoft Azure AD Identity Protection to spot risky users

Whichever license of Azure Active Directory you own, you have options to set up alerts and automate actions to risky user behavior.

Load More