Follow these 7 steps to keep Windows 11 from slowing down again!
From deleting temporary files to updating software, there are many simple and effective ways to keep your computer running smoothly like new.
Windows Security does more than just protect against basic viruses. It protects against phishing , blocks ransomware , and prevents malicious apps from running. However, these features aren't easy to spot — they're hidden behind layers of menus.
Protect sensitive files from ransomware
Downloading files or opening unknown attachments always carries some risk, especially if one of them is ransomware that can lock your files in seconds. Luckily, Windows includes a feature called Controlled Folder Access that helps protect your most important folders from exactly that.
Once enabled, this feature will block untrusted applications from modifying protected folders. By default, this feature includes locations like Documents, Pictures, and Desktop, but you're not limited to those. You can click Protected folders to add other locations that you care about, such as work projects, financial records, or files stored on an external hard drive.
To enable this feature, open Windows Security , go to Virus & threat protection , then click Manage ransomware protection under Ransomware protection . From there, turn on Controlled folder access .
If a trusted application is blocked, Windows usually won't notify you. To find out which applications have been blocked, open the Protection history section , where Windows records recent access to protected folders. Just look under Blocked folder access and allow any applications you recognize and trust.
And if a known app, like a video editor or backup tool, is having trouble, you can jump straight to Allow an app through Controlled Folder Access to whitelist it and prevent any future disruptions.
Once set up, protection works silently in the background. If ransomware or any suspicious application tries to interfere, Windows will immediately block it, keeping your files safe without you having to do anything.
Automatically block malicious or untrusted apps
Threats don’t always look suspicious. The file you downloaded may seem useful, but it could install a tracker, malware, or something else. Even a fake login page can look convincing enough to fool anyone. Just one wrong click and your login information could fall into the wrong hands.
Reputation-based protection, built into Windows Security, stops these threats before they reach you. Using real-time threat intelligence from Microsoft, it blocks shady apps, suspicious downloads, and phishing websites, so you don't have to think twice about every click.
To enable this feature, open Windows Security and go to App & browser control . Click Reputation-based protection settings , then enable all available options: Check apps and files, SmartScreen for Microsoft Edge, Potentially unwanted app blocking , and Phishing protection .
When enabled, Windows will silently monitor your activity in the background. If a file or website looks dangerous, you'll be warned before running it. You can still approve apps you trust, but these built-in checks will help you avoid mistakes that could have serious consequences later.
Offline scan to kill stubborn threats
Some malware is sophisticated enough to evade routine scans. It hides deep in the system, starting to run before Windows loads and avoiding detection while silently causing damage in the background.
When that happens, regular scanning isn't enough. That's why Windows includes an Offline Scan feature, which performs deeper checks before Windows starts. This way, hidden threats don't have a chance to load or interfere.
To run it, open Windows Security , go to Virus & threat protection , then click Scan options .
Select Microsoft Defender Antivirus (offline scan) and click Scan now .
Your computer will restart, perform a clean scan, and return to your desktop when finished. This process should only take about 15 minutes, and once it starts, you don't need to do anything else. Once it's finished, open Protection history to see if anything was found or deleted.
Protect your system with Memory Integrity
System memory handles some of the most sensitive tasks on your PC. If malware gets to it, it can interfere with important processes, install rogue drivers, or silently take over without touching your personal files.
Memory Integrity acts as a security checkpoint at the heart of the system. It creates a protected environment using virtualization, keeping important processes protected from anything untrustworthy. If something shady tries to get in, it gets blocked as soon as it tries to execute.
To enable this feature, navigate to Windows Security > Device security > Core isolation details . If Memory Integrity is disabled, enable this feature. You may be prompted to restart your PC.
If the toggle doesn't work right away, Windows may flag an outdated driver or application as causing the conflict. In that case, try updating or reinstalling the affected software. Once everything is compatible, Memory Integrity should be enabled without any problems.
Install Exploit Protection for your system and programs
Most security threats try to trick you into installing something shady, but exploits are a little sneakier. Instead of asking for permission, they sneak in through hidden vulnerabilities in your application. All it takes is one missed vulnerability for an attacker to inject code, hijack your process, or silently take control of your system.
Exploit Protection helps close those holes before anything malicious can get in. Built into Windows, it acts as a reinforced shield around software weaknesses.
You'll find this feature in Windows Security - go to App & browser control and click Exploit protection settings at the bottom. It consists of two sections: System settings , which are enabled by default, and Programme settings , where you can create custom rules for individual applications.
Fix TPM security issues with a quick reset
The TPM (Trusted Platform Module) is a small but essential chip built into your computer. It handles important security tasks, such as storing encryption keys and verifying hardware integrity.
However, after a major Windows update, BIOS change , or hardware upgrade, TPM-related issues can sometimes appear. You may encounter BitLocker errors, problems signing in with Windows Hello, or security processor warnings.
Fortunately, most TPM issues can be fixed by resetting it through Windows Security. This process clears stored data and re-initializes the chip, which usually fixes the problem without affecting your personal files. Just be aware that you may need to reconfigure certain features like BitLocker or Windows Hello afterward.
To reset TPM, open Windows Security, go to Device security , and click Security processor details . Then, select Security processor troubleshooting , select the reason for the reset, and click Clear TPM . Your PC will restart to complete the process.
Control what your family can see and do
The Family options panel in Windows Security links directly to Microsoft Family Safety, giving you a central place to set boundaries and monitor how your devices are used.
From here, you can manage screen time, limit apps and games, filter web content, and apply rules for everyone in your Microsoft family group. This feature is especially useful for guiding your kids and preventing exposure to unsafe content or unapproved downloads.
To access it, open Windows Security, scroll down to Family options , and click View family settings . This will take you to the Microsoft Family Safety dashboard in your browser, where you can create accounts for kids, set restrictions, and check activity reports.
From deleting temporary files to updating software, there are many simple and effective ways to keep your computer running smoothly like new.
Basically, a Virtual Hard Disk (VHD) is a file format that contains structures that are “exactly” identical to the structure of a hard drive.
Wondering why there is a lock icon on a drive in File Explorer? This article explains what it is and how to remove the lock icon from a drive in Windows 10.
SpeedFan tool checks your computer's temperature, CPU usage, and fan speed so you can cool it down.
From killing frozen apps right on the taskbar to automatically locking your computer when you walk away, there are plenty of tools you'll wish you'd discovered sooner.
Don't completely trust the default settings when it comes to privacy. Windows 11 is no exception, as it often oversteps its bounds when it comes to data collection.
When downloading Windows 10 from Microsoft, you will download Windows 10 as an ISO file. From this Windows 10 ISO file, you can use it to create a bootable USB, a Windows installation USB, or a computer ghost. Let's see how to download Windows 10!
Microsoft will officially stop supporting Windows 10 in less than three months, which means millions of users will have to upgrade to new hardware to run Windows 11.
You don't need to spend a dime to secure your documents and other important data. Use trusted free apps to lock everything down and send it securely to anyone.
Several free tools can predict drive failures before they happen, giving you time to back up your data and replace the drive in time.
Blue screen errors, also known as blue screen of death, have been around for a long time on Windows. These errors contain important information related to the sudden crash of the system.
This article will attempt to cover the CCNA commands in both ICND part 1 and 2 as well as the current CCNA exam (640-802).
Windows 10 has proven to be a reliable operating system, but like other versions, users may face many problems while using Windows 10. One of the “worst” problems that users often encounter is the black screen error.
Ctrl + Z is an extremely common key combination on Windows. Ctrl + Z basically allows you to undo actions in all areas of Windows.
Windows Security does more than just protect against basic viruses. It protects against phishing, blocks ransomware, and prevents malicious apps from running. However, these features aren't easy to spot—they're hidden behind layers of menus.
From deleting temporary files to updating software, there are many simple and effective ways to keep your computer running smoothly like new.
Basically, a Virtual Hard Disk (VHD) is a file format that contains structures that are “exactly” identical to the structure of a hard drive.
Wondering why there is a lock icon on a drive in File Explorer? This article explains what it is and how to remove the lock icon from a drive in Windows 10.
SpeedFan tool checks your computer's temperature, CPU usage, and fan speed so you can cool it down.
From killing frozen apps right on the taskbar to automatically locking your computer when you walk away, there are plenty of tools you'll wish you'd discovered sooner.
Don't completely trust the default settings when it comes to privacy. Windows 11 is no exception, as it often oversteps its bounds when it comes to data collection.
When downloading Windows 10 from Microsoft, you will download Windows 10 as an ISO file. From this Windows 10 ISO file, you can use it to create a bootable USB, a Windows installation USB, or a computer ghost. Let's see how to download Windows 10!
Microsoft will officially stop supporting Windows 10 in less than three months, which means millions of users will have to upgrade to new hardware to run Windows 11.
You don't need to spend a dime to secure your documents and other important data. Use trusted free apps to lock everything down and send it securely to anyone.
Several free tools can predict drive failures before they happen, giving you time to back up your data and replace the drive in time.
Blue screen errors, also known as blue screen of death, have been around for a long time on Windows. These errors contain important information related to the sudden crash of the system.
This article will attempt to cover the CCNA commands in both ICND part 1 and 2 as well as the current CCNA exam (640-802).
Windows 10 has proven to be a reliable operating system, but like other versions, users may face many problems while using Windows 10. One of the “worst” problems that users often encounter is the black screen error.
Ctrl + Z is an extremely common key combination on Windows. Ctrl + Z basically allows you to undo actions in all areas of Windows.