Windows Fundamentals 3: Securing Your Windows Device
Welcome back to the final part of the Windows Fundamentals series! In Parts 1 and 2, we laid the groundwork by exploring everything from the desktop interface and file system to essential Windows utilities. Now, in Windows Fundamentals 3, we dive into the tools and features built into Windows that help keep your system secure.
This installment marks a shift into the security side of Windows, offering a comprehensive overview of how Microsoft helps users protect their data and devices.
🔄 Windows Update
We began with Windows Update, Microsoft's essential service for delivering security patches, performance improvements, and new features—not just for the OS but also for integrated tools like Microsoft Defender. Regular updates are key to defending against newly discovered threats.
🛡️ Windows Security
Next, we explored Windows Security, your command center for managing the system’s security features. It’s divided into four key areas:
✔️ Virus & Threat Protection
This section includes tools to scan for threats and review threat history. It also houses critical settings like Real-Time Protection, Controlled Folder Access, and Exclusions, all of which give you control over how your system responds to malware.
🔥 Firewall & Network Protection
Ever wondered what a firewall actually does? Think of it as a security guard standing at the door of your network. It controls traffic entering and leaving your system. Windows offers three firewall profiles—Domain, Private, and Public—to suit different environments.
🌐 App & Browser Control
Here we met Microsoft Defender SmartScreen, which helps guard against phishing, malware, and malicious downloads by analyzing websites and applications in real time.
🖥️ Device Security
This section delves into Memory Integrity, which protects core processes from malicious code, and the Trusted Platform Module (TPM)—a dedicated hardware component that adds another layer of encryption and tamper resistance.
🔒 BitLocker
We then looked at BitLocker, a powerful data protection feature that encrypts your drives. It's particularly valuable for preventing data theft on lost or stolen devices.
🗂️ Volume Shadow Copy Service (VSS)
Lastly, we explored VSS, which allows the system to create restore points and backups. It's a powerful recovery tool—but it’s also a known target for malware that aims to delete these backups to prevent users from recovering after a ransomware attack. This highlights the importance of having secure, offline/off-site backups.
With that, Windows Fundamentals 3 wraps up not just the Windows module, but also the Pre-Security path in the Cyber Security Learning Roadmap.
🔜 What’s Next? Cyber Security 101
Up next is Cyber Security 101, which will revisit some familiar topics with fresh insights and dive into exciting new areas like:
- Command Line
- Networking
- Cryptography
- Exploitation Basics
- Web Hacking
- Defensive Security
...and much more.
Stay tuned as we step into the world of cybersecurity and start putting all this foundational knowledge into action!