
Microsoft security help and learning
Get security info and tips about threat prevention, detection, and troubleshooting. Including tech support scams, phishing, and malware.
Virus and Threat Protection in the Windows Security App
Learn how to use virus and threat protection options in Windows Security to scan your device for threats and view the results.
Change privacy settings in Windows - Microsoft Support
How to access and change the privacy settings in Windows 10 and 11.
What's new in Windows Security - Microsoft Support
Microsoft Defender helps easily manage your online security in one centralized view, with industry-leading cybersecurity for you, your family, and your devices.
Stay protected on Windows 11 with smart security features
Going passwordless is the next generation of sign-in security - it's simple, fast, secure. To help enhance security, passwordless login options such as Windows Hello and Passkeys provide a faster, easier, …
Protect my PC from viruses - Microsoft Support
Keep Windows updated - Periodically, Microsoft releases special security updates that can help protect your PC. These updates can help prevent viruses and other malware attacks by closing possible …
Get help with Windows security - Microsoft Support
Windows Security app update - Microsoft Support
Learn more about the Windows Security app here.
Windows Security App Overview - Microsoft Support
With features like Microsoft Defender Antivirus, Windows Firewall, and Smart App Control, you can easily access and configure robust security settings. Built into Windows, this app ensures your …
Sign-In Options in Windows - Microsoft Support
Security keys are devices used for authentication, typically in the form of a USB dongle, NFC, or Bluetooth. Instead of a password, you can use a security key to sign in to apps, websites, and, if you …
Firewall and Network Protection in the Windows Security App
Windows Firewall helps protect your device by filtering network traffic and blocking unauthorized access. It lowers the risk of network security threats by allowing or restricting connections based on specific …