4 Windows Security Settings Hackers Hope You Don't Find

People have always been concerned about computer security. But over the years, Windows has really upgraded the system with some powerful protection features that most people overlook.

 

These security settings are still there, unused. More importantly, cybercriminals are counting on you not to notice them.

4. Windows Sandbox

Keep suspicious files away from your system

Windows Sandbox creates a completely isolated virtual environment where you can test suspicious files without endangering your main system.

Here's how to enable Windows Sandbox:

  1. Press Windows + R to open the Run dialog box , then type appwiz.cpl and press Enter .
  2. Click Turn Windows features on or off on the left.
  3. Check the box next to Windows Sandbox .
  4. Restart your computer when prompted.

There are also other ways to enable and set up Windows Sandbox in Windows 11. Once enabled, you can launch Sandbox from the Start menu.

 

3. Core Isolation

Prevent advanced malware from getting out of hand

Core Isolation uses computer hardware to create a secure barrier around Windows' most important processes. The main component, Memory Integrity, prevents hackers from injecting malicious code into system memory, a favorite trick of advanced malware.

This feature uses virtualization-based security (VBS) to isolate sensitive operations from the rest of the system. Even if malware gets onto your computer, it won't be able to interfere with protected kernel processes. Here's how to enable Memory Integrity:

  1. Press Windows + I to open Settings , then navigate to Privacy & Security from the left sidebar.
  2. Click Windows Security in the main control panel and select Device Security .
  3. Find the Core Isolation item and then enable Memory Integrity .
  4. Click Restart now when Windows prompts you to restart the system.

The biggest advantage of Core Isolation is its ability to block kernel-level attacks that traditional antivirus software might miss. This feature works in tandem with existing security software as part of Windows' built-in defenses.

2. App and Browser Control

Prevent dangerous downloads

App and Browser Control is Windows' built-in web protection system that helps stop malicious downloads before they reach your PC. SmartScreen analyzes files, websites, and apps against Microsoft's threat database in real time.

 

It works across multiple layers—your browser, your downloads, and even your Microsoft Store apps. When you try to download something suspicious, SmartScreen will show you a warning or block it entirely.

Here's how to properly configure App and Browser Control:

  1. Open Windows Security via Settings > Privacy & Security > Windows Security .
  2. Click App & browser control from the main dashboard.
  3. Under Reputation-based protection, click Reputation-based protection settings .
  4. Make sure the Check apps and files option is enabled to protect downloads.
  5. Turn on SmartScreen for Microsoft Edge if you use the Edge browser.
  6. Turn on Potentially unwanted app blocking to block apps that come with malware.

1. Controlled Folder Access

Block Ransomware

This security feature is Windows' answer to ransomware attacks . Controlled Folder Access creates a protective shield around your most important folders, such as documents, pictures, desktop, and others, preventing unauthorized applications from making changes.

Here's how to enable this feature in Windows settings:

  1. Open Windows Security via Settings > Privacy & Security > Windows Security .
  2. Navigate to Virus & Threat Protection from the main menu.
  3. Scroll down and click Manage ransomware protection .
  4. Enable the Controlled Folder Access option .
  5. Then click Protected folders to see which folders are protected by default.
  6. Use the Allow an app through Controlled folder access option to whitelist trusted programs.

These security features have been in Windows for a long time. Taking just 10 minutes to enable these protections could save you from a devastating ransomware attack or malware infection. You'll thank yourself later.

Update 15 July 2025
Category

System

Mac OS X

Hardware

Game

Tech info

Technology

Science

Life

Application

Electric

Program

Mobile