Windows

Windows | News, how-tos, features, reviews, and videos

Microsoft Windows 7 security patches/updates

How to implement Windows 7, Server 2008 security updates after end-of-life

Microsoft has ended support for Windows 7 and Windows Server 2008, but you can purchase extended security updates. Here's what you need to do to implement them.

Laptop displaying the Microsoft logo and a laptop user beneath a digital 'Security' sign.

How to manage Windows 10 1903 and 1909 security updates

Your Windows update controls might be out of date if you haven't reviewed them since the 1803 update or earlier. Here are the new settings you need to know.

browser security

How to lock down enterprise web browsers

Your organization's web browser is essentially your operating system for the cloud. Secure it appropriately.

A businessman interacts with a Microsoft-colored shield protecting network users + user groups.

How to audit permissions after a Windows migration

As companies move off Windows 7 and Server 2008, they run the risk of leaving dangerous access permissions behind. Here's how to find them.

Microsoft-based election, campaign systems

How to secure Microsoft-based election, campaign systems

Microsoft has issued guidance and provided resources for local election bodies and candidate campaigns to help protect systems and communications.

tt19 045 thumb
video

Windows 10: Answering your most important questions | TECH(talk)

Computerworld Windows expert Preston Gralla and Executive Editor Ken Mingis are back to answer your questions about Windows 10.

cssg 028 thumb
video

Top enterprise VPN vulnerabilities

Don’t assume VPNs are always safe. These popular enterprise VPNs all have known remote code execution vulnerabilities.

Lock + key securing abstract data with a Windows logo overlay.

How to protect and safely erase data on Windows devices

Microsoft's BitLocker now uses AES encryption, but will default to the storage device's hardware encryption unless you make this setting, which will also allow you to easily sanitize drives.

cssg 027 thumb
video

How to safely erase data under Windows

Bitlocker and self-encrypting hard drives can make it easier to erase data so that it cannot be recovered. This is how the “crypto-erase” method works.

Email migration to Microsoft Outlook app on mobile email for smartphone user.

How to migrate smartphone users to the Outlook app with Intune

With the pending retirement of Microsoft Basic Authentication, the best way to protect mobile device users connecting through Exchange is to move them to Outlook.

cssg 026 thumb
video

How to move users to the Outlook app with Intune

Microsoft is turning off basic authentication, so it’s wise to move mobile users to the Outlook app to better protect them from attackers.

tt19 041 thumb
video

Windows 10: Answers to your most important issues | TECH(talk)

Computerworld's Preston Gralla and Executive Editor Ken Mingis are back answering questions about Windows 10. If you have questions, post them in the comments to be featured in our next TECH(talk) about Windows 10.

Credential theft  > A thief steals a password.

How to detect and halt credential theft via Windows WDigest

Attackers can steal user credentials by enabling credential caching in the Windows authentication protocol WDigest. Here's how to stop them.

cssg 025 thumb
video

How to monitor Windows to prevent credential theft attacks

Attackers are now enabling WDigest credential caching to allow them to harvest credentials. Here’s how to spot it.

cssg 024 thumb
video

How to set up Microsoft Teams for security and compliance

These are the security and compliance decisions you need to make when deploying Microsoft Teams.

cssg 023 thumb
video

How to disable basic or legacy authentication to set up MFA in Office 365

Microsoft recommends setting up multi-factor authentication in Windows 10 for better security, but you have to disable basic or legacy authentication first.

cssg 022 thumb
video

How to avoid using RDP in Windows

Several new vulnerability disclosures in Windows Remote Desktop Protocol suggest it’s time to stop using it. Here’s how.

Identity access management  >  abstract network connections and circuits reflected in eye

How to check Privileged Identity management settings for Office 365

Microsoft Azure Privileged Identity Management (PIM) allows you to set administrative rights for roles on an as-needed basis, reducing risk.

youtube thumbnails template
video

Windows 10: Answers to your most important questions | TECH(talk)

Computerworld’s Windows expert, Preston Gralla, and Executive Editor Ken Mingis answer questions about Windows 10 and discuss how the operating system is still evolving.

Microsoft's Chromium Edge browser

Know your Edge Chromium security options

Microsoft's upcoming Chromium-based Edge browser will give Edge- and Chrome-like web security features to older versions of Microsoft Windows. Here's what you need to know.

Load More
You Might Also Like