Windows

Windows | News, how-tos, features, reviews, and videos

Laptop displaying the Microsoft logo and a laptop user beneath a digital 'Security' sign.

Microsoft Windows security  >  Windows laptop + logo with binary lock and key
Updated

Best new Windows 10 security features: Longer support, easier deployment

Here's what you need to know about each security update to Windows 10 as they roll out from Microsoft. Now updated for the 1909 feature release.

cssg 033 thumb
video

How make a Windows disaster recovery kit

Make your own disaster checklist and recovery toolkit before trouble happens.

tt19 055 thumb
video

Windows 10: Answers to your most important issues

Computerworld contributor Preston Gralla and Executive Editor Ken Mingis answered viewers' questions about Windows.

browser security

How to lock down enterprise web browsers

Your organization's web browser is essentially your operating system for the cloud. Secure it appropriately.

cssg 032 thumb
video

How to harden web browsers against cyberattacks

Use these techniques to limit attackers’ ability to compromise systems and websites.

cssg 031 thumb
video

How to and why you should disable LLMNR with Windows Server

Link-Local Multicast Name Resolution could enable a man-in-the-middle attack, so it’s best to disable the protocol when setting up Windows Server 2019.

A businessman interacts with a Microsoft-colored shield protecting network users + user groups.

How to audit permissions after a Windows migration

As companies move off Windows 7 and Server 2008, they run the risk of leaving dangerous access permissions behind. Here's how to find them.

cssg 030 thumb
video

How to double-check permissions post migration from Windows 7

It pays to make sure all permissions in your Windows environment are correct after migrating from Windows 7 or Server 2008 R2. Here’s how to check.

Microsoft-based election, campaign systems

How to secure Microsoft-based election, campaign systems

Microsoft has issued guidance and provided resources for local election bodies and candidate campaigns to help protect systems and communications.

cssg 029 thumb
video

Microsoft’s Windows, Office 365 advice for secure elections

Microsoft has issued guidance and offered resources to help election officials and candidate campaigns to better protect their Windows and Office 365 systems.

tt19 045 thumb
video

Windows 10: Answering your most important questions | TECH(talk)

Computerworld Windows expert Preston Gralla and Executive Editor Ken Mingis are back to answer your questions about Windows 10.

cssg 028 thumb
video

Top enterprise VPN vulnerabilities

Don’t assume VPNs are always safe. These popular enterprise VPNs all have known remote code execution vulnerabilities.

Lock + key securing abstract data with a Windows logo overlay.

How to protect and safely erase data on Windows devices

Microsoft's BitLocker now uses AES encryption, but will default to the storage device's hardware encryption unless you make this setting, which will also allow you to easily sanitize drives.

cssg 027 thumb
video

How to safely erase data under Windows

Bitlocker and self-encrypting hard drives can make it easier to erase data so that it cannot be recovered. This is how the “crypto-erase” method works.

Email migration to Microsoft Outlook app on mobile email for smartphone user.

How to migrate smartphone users to the Outlook app with Intune

With the pending retirement of Microsoft Basic Authentication, the best way to protect mobile device users connecting through Exchange is to move them to Outlook.

cssg 026 thumb
video

How to move users to the Outlook app with Intune

Microsoft is turning off basic authentication, so it’s wise to move mobile users to the Outlook app to better protect them from attackers.

tt19 041 thumb
video

Windows 10: Answers to your most important issues | TECH(talk)

Computerworld's Preston Gralla and Executive Editor Ken Mingis are back answering questions about Windows 10. If you have questions, post them in the comments to be featured in our next TECH(talk) about Windows 10.

Credential theft  > A thief steals a password.

How to detect and halt credential theft via Windows WDigest

Attackers can steal user credentials by enabling credential caching in the Windows authentication protocol WDigest. Here's how to stop them.

Load More