Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
Threat researchers uncover jailbreak exposing deep safety vulnerabilit...
When talking sense into AI power mongers fails, talk $$$: A message fr...
O.NE People and Prighter Forge Alliance to Deliver AI-Driven Privacy C...
APT threats: Prevention is better than cure
From insight to action: Securing APAC’s future with AI-driven cy...
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      When talking sense into AI power mongers fails, talk $$$: A message from AI

      When talking sense into AI power mongers fails, talk $$$: A message from AI

      Thursday, August 14, 2025, 12:26 PM Asia/Singapore | Features, Newsletter
    • Featured

      From insight to action: Securing APAC’s future with AI-driven cybersecurity

      From insight to action: Securing APAC's future with AI-driven cybersecurity

      Wednesday, August 13, 2025, 10:07 AM Asia/Singapore | Features
    • Featured

      Experts weigh in on Singapore’s response to UNC3886

      Experts weigh in on Singapore’s response to UNC3886

      Friday, August 8, 2025, 10:45 PM Asia/Singapore | Features, Newsletter, Opinions
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning

Select Page

LOGIN REGISTER
  • Features
    • Featured

      When talking sense into AI power mongers fails, talk $$$: A message from AI

      When talking sense into AI power mongers fails, talk $$$: A message from AI

      Thursday, August 14, 2025, 12:26 PM Asia/Singapore | Features, Newsletter
    • Featured

      From insight to action: Securing APAC’s future with AI-driven cybersecurity

      From insight to action: Securing APAC's future with AI-driven cybersecurity

      Wednesday, August 13, 2025, 10:07 AM Asia/Singapore | Features
    • Featured

      Experts weigh in on Singapore’s response to UNC3886

      Experts weigh in on Singapore’s response to UNC3886

      Friday, August 8, 2025, 10:45 PM Asia/Singapore | Features, Newsletter, Opinions
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning
Tips

Harden your Windows 11 installation before your life story is leaked!

By L L Seow | Tuesday, June 24, 2025, 11:53 AM Asia/Singapore

Harden your Windows 11 installation before your life story is leaked!

Here are five detailed measures that IT admins/home users can take to control what personal data is being leaked.

Recently, the PC Security Channel used a reputable open-source network protocol analyzer — to monitor network traffic on a freshly installed copy of Windows 11, according to various publications.

By filtering DNS traffic, the group was able to observe Windows 11 reaching out to both Microsoft and third-party servers (such as Steam, McAfee, and Comscore) immediately after installation, without user intervention or consent. For comparison, the same test on Windows XP showed only essential update checks, with no third-party telemetry.

Once a Windows 11 system is fully loaded with other applications, the situation gets much worse. And, as Microsoft updates the operating system, malware, bugs, vulnerabilities and undocumented features that allow usage telemetry to be legally sent out without users’ knowledge could be a ticking time bomb.

Locking down Windows 11 “data sharing”
Some of the convenience features we enable without a second thought could be deemed as our implicit permission to the operating system to share data to provide those conveniences. Other pathways for data “leakage” (whether intentional or hidden) are not so obvious or controllable.

So, here is a list of measures Windows 11 users can take wrestle-back control over what the operating system can do with our data.

  1. Monitor all network traffic: Install software such as Wireshark tools that continuously monitor all outbound connections to detect and analyze any data Windows attempts to send out. Such tools can issue real-time alerts, historical data, and per-app network usage monitoring.
  2. Harden privacy settings (controls built-into the OS)
    • Privacy Dashboard: Regularly review and adjust settings in Settings > Privacy & Security and the Windows Privacy Dashboard.
    • Disable telemetry: Set Diagnostic Data to “Required only” or “Basic” (if available). Also, users can block additional data collection. In the registry, disable the Customer Experience Improvement Program (CEIP) by setting HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\SQMClient\Windows\CEIPEnable to 0. In Group Policy Editor, explore Computer Configuration > Administrative Templates > Windows Components > Data Collection and Preview Builds to further restrict telemetry. Caution: Registry edits can destabilize your system if done incorrectly —seek help if you are unsure.
    • Use Group Policy Editor/registry tweaks: For advanced users, enforce privacy settings at the system level.
    • Turn off your Advertising ID: Disable ad tracking in Settings > Privacy & Security > General.
    • Limit app permissions: Revoke unnecessary access to camera, microphone, location, contacts, etc., for all apps.
    • contacts, etc., for all apps.
    • Disable activity history: Turn off and clear activity history in Settings > Privacy & Security > Activity History.
    • Disable Find My Device: Unless needed, turn this off in Settings > Privacy & Security > Find my device.
    • Turn off Microsoft Tips: Navigate to Settings > System > Notifications > Additional settings and untick all checkboxes to stop receiving tips that could involve data sharing,
    • Disable Custom Inking and Typing personalization: In Settings > Privacy & security > Inking and typing personalization, turn off “Custom inking and typing word list” to stop Microsoft from using your input data for personalization.
    • Disable Delivery Optimization: Go to Settings > Windows Update > Advanced options > Delivery Optimization and turn off “Allow downloads from other PCs” to prevent your PC from distributing updates, potentially limiting data transfer
    • Remove AI assistants and associated features: Such tools collate a lot of data about us that we may sometimes not have control over. In specific situations, disable them or uninstall them to eliminates a potential source of background data collection
    • Adjust Microsoft Edge settings, or switch browsers
      The default Edge browser may send usage data to Microsoft, adding to the telemetry load. In Edge, go to Settings > Privacy, search, and services and turn off tracking, diagnostic data, and personalized ads. For a stronger solution, switch to a privacy-focused browser. Similarly, apps from the Microsoft Store can independently communicate with external servers, bypassing OS privacy controls. Go to Settings > Apps > Apps & features, review installed apps, and uninstall anything unnecessary. Pay attention to apps requesting broad permissions (e.g., location, camera).
    • Configure Windows Update carefully
      Windows Update is a potential telemetry channel that could send data beyond what is necessary for updates. What to do: Use Group Policy Editor (available in Pro and Enterprise editions) or registry settings to minimize data sharing. For example, navigate to Computer Configuration > Administrative Templates > Windows Components > Windows Update and adjust settings to limit non-essential data exchanges. In the registry, you can set HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate to restrict telemetry.
      In Settings: Go to Settings > Windows Update > Advanced options and disable options like “Get me up to date” or “Download updates over metered connections” to reduce unnecessary activity. Note: Perform these steps with care as they may inadvertently expose the system to security risks.
  3. Use third party privacy tools: Various commercial software utilitiescan be installed to achieve the following:
    • Disable hidden telemetry, block data collection, and control system settings not exposed in the standard UI.
    • Gain granular control over telemetry, updates, and privacy settings.
    • Disable telemetry, feedback, advertising ID, and related services.
    • Block unwanted outbound connections at the network layer, allowing only whitelisted traffic.
    • Remove tricky pre-installed apps and bloatware that may communicate with external servers and are difficult to uninstall.
  4. Set network-level protections:
    • Outbound firewall rules: Use the built-in Windows Firewall or third-party firewalls to block all outbound connections except those explicitly allowed.
    • DNS filtering: Use DNS services to block known telemetry and ad domains at the network level.
    • Network segmentation: Place Windows devices on a separate VLAN or behind a firewall with strict egress filtering.
  5. Enforce advanced and persistent monitoring
    • Regular packet captures: Periodically capture and review network traffic using Wireshark to detect new or unexpected outbound connections.
    • Log analysis: Use tools to parse and alert on unusual log or network activity.
    • System integrity monitoring: Tools such as OSQuery or Wazuh can be set to monitor for changes in system files and configurations.

Measures outside of this set of this list can also include: sandboxing Windows 11 in a virtual machine (optionally within a more secure OS); blocking telemetry at the router level with a custom DNS service; and supporting privacy advocacy groups (e.g., Electronic Frontier Foundation) that push for laws requiring transparency in telemetry and data collection.

Caveats to keep in mind

Even with all the above measures, Windows 11 may still attempt to send encrypted telemetry, making it impossible to guarantee zero data leakage without network-level blocking and continuous monitoring.

The only way to be absolutely sure nothing leaks is to block all outbound traffic and manually allow only essential services, or to use an alternative OS.

Also, bear in mind that Microsoft’s leader, Satya Nadella, had ever compelled the organization to rethink everything it had failed in, in terms of protecting users. With Windows 10 on track to be phased out by Oct 2025, users who face data privacy and cybersecurity issues with Windows 11 can resort to social media pressure to remind their national cybersecurity authorities and Microsoft of their key directives.

Share:

PreviousNexusguard’s 2025 DDoS Trends Report Uncovers Record-Breaking Attacks and Emerging Threats Transforming Cybersecurity
NextHow ready are global organizations to navigate autonomous AI securely, sustainably?

Related Posts

The Philippines money-lending platform breach: did you get the message?

The Philippines money-lending platform breach: did you get the message?

Friday, March 5, 2021

Staying safe at the year-end massive e-sales, starting with Prime Day

Staying safe at the year-end massive e-sales, starting with Prime Day

Tuesday, October 13, 2020

Watch out for increased hacktivism in 2024 

Watch out for increased hacktivism in 2024 

Thursday, January 25, 2024

The hackers’ mission: You scrape my back, I scrape your data

The hackers’ mission: You scrape my back, I scrape your data

Monday, April 12, 2021

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper
  • Mitigating Ransomware Risks with GRC Automation

    Mitigating Ransomware Risks with GRC Automation

    In today’s landscape, ransomware attacks pose significant threats to organizations of all sizes, with increasing …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • PT Kereta Api Indonesia announces nationwide email and communication overhaul

    PT Kereta Api Indonesia announces nationwide email and communication overhaul

    The state railway operator’s upgraded email system improves privacy, operational reliability, and regulatory alignment for …Read more
  • Operationalizing sustainability in cybersecurity: Group-IB’s approach

    Operationalizing sustainability in cybersecurity: Group-IB’s approach

    See how the firm turned malware-group takedowns into measurements of sustainability and resilience gains: by …Read more
  • Thai government expands secure email management to close cybersecurity gaps

    Thai government expands secure email management to close cybersecurity gaps

    New measures address cybersecurity gaps in public sector communications, deploying advanced protections and operational support …Read more
  • How Iress optimized global DevSecOps

    How Iress optimized global DevSecOps

    Scaling compliance, security & efficiency – while seamlessly migrating to the cloud – with JFrog.Read more

Bottom sidebar

  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2025 CybersecAsia All Rights Reserved.