Most people dont use these hidden features in Windows Security.

Windows Security does more than just protect against basic viruses. It protects against phishing , blocks ransomware , and prevents malicious apps from running. However, these features aren't easy to spot — they're hidden behind layers of menus.

Protect sensitive files from ransomware

Downloading files or opening unknown attachments always carries some risk, especially if one of them is ransomware that can lock your files in seconds. Luckily, Windows includes a feature called Controlled Folder Access that helps protect your most important folders from exactly that.

Once enabled, this feature will block untrusted applications from modifying protected folders. By default, this feature includes locations like Documents, Pictures, and Desktop, but you're not limited to those. You can click Protected folders to add other locations that you care about, such as work projects, financial records, or files stored on an external hard drive.

Most people don't use these hidden features in Windows Security.
Virus and threat protection in Windows Security

To enable this feature, open Windows Security , go to Virus & threat protection , then click Manage ransomware protection under Ransomware protection . From there, turn on Controlled folder access .

Most people don't use these hidden features in Windows Security.
Turn on Controlled folder access

If a trusted application is blocked, Windows usually won't notify you. To find out which applications have been blocked, open the Protection history section , where Windows records recent access to protected folders. Just look under Blocked folder access and allow any applications you recognize and trust.

And if a known app, like a video editor or backup tool, is having trouble, you can jump straight to Allow an app through Controlled Folder Access to whitelist it and prevent any future disruptions.

Once set up, protection works silently in the background. If ransomware or any suspicious application tries to interfere, Windows will immediately block it, keeping your files safe without you having to do anything.

Automatically block malicious or untrusted apps

Threats don’t always look suspicious. The file you downloaded may seem useful, but it could install a tracker, malware, or something else. Even a fake login page can look convincing enough to fool anyone. Just one wrong click and your login information could fall into the wrong hands.

Reputation-based protection, built into Windows Security, stops these threats before they reach you. Using real-time threat intelligence from Microsoft, it blocks shady apps, suspicious downloads, and phishing websites, so you don't have to think twice about every click.

To enable this feature, open Windows Security and go to App & browser control . Click Reputation-based protection settings , then enable all available options: Check apps and files, SmartScreen for Microsoft Edge, Potentially unwanted app blocking , and Phishing protection .

Most people don't use these hidden features in Windows Security.
Adjust Reputation-based protection settings in Windows Security

When enabled, Windows will silently monitor your activity in the background. If a file or website looks dangerous, you'll be warned before running it. You can still approve apps you trust, but these built-in checks will help you avoid mistakes that could have serious consequences later.

Offline scan to kill stubborn threats

Some malware is sophisticated enough to evade routine scans. It hides deep in the system, starting to run before Windows loads and avoiding detection while silently causing damage in the background.

When that happens, regular scanning isn't enough. That's why Windows includes an Offline Scan feature, which performs deeper checks before Windows starts. This way, hidden threats don't have a chance to load or interfere.

To run it, open Windows Security , go to Virus & threat protection , then click Scan options .

Most people don't use these hidden features in Windows Security.
Virus and threat protection in Windows Security

Select Microsoft Defender Antivirus (offline scan) and click Scan now .

Most people don't use these hidden features in Windows Security.
Run an offline scan in Windows Security

Your computer will restart, perform a clean scan, and return to your desktop when finished. This process should only take about 15 minutes, and once it starts, you don't need to do anything else. Once it's finished, open Protection history to see if anything was found or deleted.

Protect your system with Memory Integrity

System memory handles some of the most sensitive tasks on your PC. If malware gets to it, it can interfere with important processes, install rogue drivers, or silently take over without touching your personal files.

Memory Integrity acts as a security checkpoint at the heart of the system. It creates a protected environment using virtualization, keeping important processes protected from anything untrustworthy. If something shady tries to get in, it gets blocked as soon as it tries to execute.

To enable this feature, navigate to Windows Security > Device security > Core isolation details . If Memory Integrity is disabled, enable this feature. You may be prompted to restart your PC.

Most people don't use these hidden features in Windows Security.
Turn on Memory Integrity in Windows Security

If the toggle doesn't work right away, Windows may flag an outdated driver or application as causing the conflict. In that case, try updating or reinstalling the affected software. Once everything is compatible, Memory Integrity should be enabled without any problems.

Install Exploit Protection for your system and programs

Most security threats try to trick you into installing something shady, but exploits are a little sneakier. Instead of asking for permission, they sneak in through hidden vulnerabilities in your application. All it takes is one missed vulnerability for an attacker to inject code, hijack your process, or silently take control of your system.

Exploit Protection helps close those holes before anything malicious can get in. Built into Windows, it acts as a reinforced shield around software weaknesses.

You'll find this feature in Windows Security - go to App & browser control and click Exploit protection settings at the bottom. It consists of two sections: System settings , which are enabled by default, and Programme settings , where you can create custom rules for individual applications.

Most people don't use these hidden features in Windows Security.
Open Exploit Protection in Windows Security

Fix TPM security issues with a quick reset

The TPM (Trusted Platform Module) is a small but essential chip built into your computer. It handles important security tasks, such as storing encryption keys and verifying hardware integrity.

However, after a major Windows update, BIOS change , or hardware upgrade, TPM-related issues can sometimes appear. You may encounter BitLocker errors, problems signing in with Windows Hello, or security processor warnings.

Fortunately, most TPM issues can be fixed by resetting it through Windows Security. This process clears stored data and re-initializes the chip, which usually fixes the problem without affecting your personal files. Just be aware that you may need to reconfigure certain features like BitLocker or Windows Hello afterward.

To reset TPM, open Windows Security, go to Device security , and click Security processor details . Then, select Security processor troubleshooting , select the reason for the reset, and click Clear TPM . Your PC will restart to complete the process.

Most people don't use these hidden features in Windows Security.
Clear TPM in Windows 11

Control what your family can see and do

The Family options panel in Windows Security links directly to Microsoft Family Safety, giving you a central place to set boundaries and monitor how your devices are used.

From here, you can manage screen time, limit apps and games, filter web content, and apply rules for everyone in your Microsoft family group. This feature is especially useful for guiding your kids and preventing exposure to unsafe content or unapproved downloads.

To access it, open Windows Security, scroll down to Family options , and click View family settings . This will take you to the Microsoft Family Safety dashboard in your browser, where you can create accounts for kids, set restrictions, and check activity reports.

Most people don't use these hidden features in Windows Security.
Parental Controls in Windows Security
Tags: #System
Sign up and earn $1000 a day ⋙

Leave a Comment

Follow these 7 steps to keep Windows 11 from slowing down again!

Follow these 7 steps to keep Windows 11 from slowing down again!

From deleting temporary files to updating software, there are many simple and effective ways to keep your computer running smoothly like new.

Heres how to create a virtual hard drive (Virtual Hard Disk) on Windows 10

Heres how to create a virtual hard drive (Virtual Hard Disk) on Windows 10

Basically, a Virtual Hard Disk (VHD) is a file format that contains structures that are “exactly” identical to the structure of a hard drive.

Why is there a lock icon on the drive and how to remove it?

Why is there a lock icon on the drive and how to remove it?

Wondering why there is a lock icon on a drive in File Explorer? This article explains what it is and how to remove the lock icon from a drive in Windows 10.

How to use SpeedFan to check CPU temperature and computer fan speed

How to use SpeedFan to check CPU temperature and computer fan speed

SpeedFan tool checks your computer's temperature, CPU usage, and fan speed so you can cool it down.

10 Great Windows Features That Many People Dont Use

10 Great Windows Features That Many People Dont Use

From killing frozen apps right on the taskbar to automatically locking your computer when you walk away, there are plenty of tools you'll wish you'd discovered sooner.

3 Tools You Need to Remove Windows 11 Tracking

3 Tools You Need to Remove Windows 11 Tracking

Don't completely trust the default settings when it comes to privacy. Windows 11 is no exception, as it often oversteps its bounds when it comes to data collection.

How to download Windows 10, download Windows 10 ISO file from Microsoft

How to download Windows 10, download Windows 10 ISO file from Microsoft

When downloading Windows 10 from Microsoft, you will download Windows 10 as an ISO file. From this Windows 10 ISO file, you can use it to create a bootable USB, a Windows installation USB, or a computer ghost. Let's see how to download Windows 10!

Windows 11 is about to let you transfer data from your old PC during setup — heres how

Windows 11 is about to let you transfer data from your old PC during setup — heres how

Microsoft will officially stop supporting Windows 10 in less than three months, which means millions of users will have to upgrade to new hardware to run Windows 11.

How to send password protected files without buying software

How to send password protected files without buying software

You don't need to spend a dime to secure your documents and other important data. Use trusted free apps to lock everything down and send it securely to anyone.

6 Free Tools That Tell You Your Hard Drive Is About to Fail

6 Free Tools That Tell You Your Hard Drive Is About to Fail

Several free tools can predict drive failures before they happen, giving you time to back up your data and replace the drive in time.

How to fix WHEA Uncorrectable Error on Windows 10/11

How to fix WHEA Uncorrectable Error on Windows 10/11

Blue screen errors, also known as blue screen of death, have been around for a long time on Windows. These errors contain important information related to the sudden crash of the system.

Cisco CCNA Command Summary

Cisco CCNA Command Summary

This article will attempt to cover the CCNA commands in both ICND part 1 and 2 as well as the current CCNA exam (640-802).

Summary of ways to fix Windows 10 black screen error

Summary of ways to fix Windows 10 black screen error

Windows 10 has proven to be a reliable operating system, but like other versions, users may face many problems while using Windows 10. One of the “worst” problems that users often encounter is the black screen error.

What is the use of the shortcut Ctrl + Z on Windows? Probably more than you think

What is the use of the shortcut Ctrl + Z on Windows? Probably more than you think

Ctrl + Z is an extremely common key combination on Windows. Ctrl + Z basically allows you to undo actions in all areas of Windows.

Most people dont use these hidden features in Windows Security.

Most people dont use these hidden features in Windows Security.

Windows Security does more than just protect against basic viruses. It protects against phishing, blocks ransomware, and prevents malicious apps from running. However, these features aren't easy to spot—they're hidden behind layers of menus.

Follow these 7 steps to keep Windows 11 from slowing down again!

Follow these 7 steps to keep Windows 11 from slowing down again!

From deleting temporary files to updating software, there are many simple and effective ways to keep your computer running smoothly like new.

Heres how to create a virtual hard drive (Virtual Hard Disk) on Windows 10

Heres how to create a virtual hard drive (Virtual Hard Disk) on Windows 10

Basically, a Virtual Hard Disk (VHD) is a file format that contains structures that are “exactly” identical to the structure of a hard drive.

Why is there a lock icon on the drive and how to remove it?

Why is there a lock icon on the drive and how to remove it?

Wondering why there is a lock icon on a drive in File Explorer? This article explains what it is and how to remove the lock icon from a drive in Windows 10.

How to use SpeedFan to check CPU temperature and computer fan speed

How to use SpeedFan to check CPU temperature and computer fan speed

SpeedFan tool checks your computer's temperature, CPU usage, and fan speed so you can cool it down.

10 Great Windows Features That Many People Dont Use

10 Great Windows Features That Many People Dont Use

From killing frozen apps right on the taskbar to automatically locking your computer when you walk away, there are plenty of tools you'll wish you'd discovered sooner.

3 Tools You Need to Remove Windows 11 Tracking

3 Tools You Need to Remove Windows 11 Tracking

Don't completely trust the default settings when it comes to privacy. Windows 11 is no exception, as it often oversteps its bounds when it comes to data collection.

How to download Windows 10, download Windows 10 ISO file from Microsoft

How to download Windows 10, download Windows 10 ISO file from Microsoft

When downloading Windows 10 from Microsoft, you will download Windows 10 as an ISO file. From this Windows 10 ISO file, you can use it to create a bootable USB, a Windows installation USB, or a computer ghost. Let's see how to download Windows 10!

Windows 11 is about to let you transfer data from your old PC during setup — heres how

Windows 11 is about to let you transfer data from your old PC during setup — heres how

Microsoft will officially stop supporting Windows 10 in less than three months, which means millions of users will have to upgrade to new hardware to run Windows 11.

How to send password protected files without buying software

How to send password protected files without buying software

You don't need to spend a dime to secure your documents and other important data. Use trusted free apps to lock everything down and send it securely to anyone.

6 Free Tools That Tell You Your Hard Drive Is About to Fail

6 Free Tools That Tell You Your Hard Drive Is About to Fail

Several free tools can predict drive failures before they happen, giving you time to back up your data and replace the drive in time.

How to fix WHEA Uncorrectable Error on Windows 10/11

How to fix WHEA Uncorrectable Error on Windows 10/11

Blue screen errors, also known as blue screen of death, have been around for a long time on Windows. These errors contain important information related to the sudden crash of the system.

Cisco CCNA Command Summary

Cisco CCNA Command Summary

This article will attempt to cover the CCNA commands in both ICND part 1 and 2 as well as the current CCNA exam (640-802).

Summary of ways to fix Windows 10 black screen error

Summary of ways to fix Windows 10 black screen error

Windows 10 has proven to be a reliable operating system, but like other versions, users may face many problems while using Windows 10. One of the “worst” problems that users often encounter is the black screen error.

What is the use of the shortcut Ctrl + Z on Windows? Probably more than you think

What is the use of the shortcut Ctrl + Z on Windows? Probably more than you think

Ctrl + Z is an extremely common key combination on Windows. Ctrl + Z basically allows you to undo actions in all areas of Windows.