Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
Cybercriminals target Battlefield 6 players
AI coding assistant reveals security vulnerabilities linked to politic...
Secure your organization’s future: prioritize trusted digital infrastr...
What AI worries keeps members of the Association of Certified Fraud Ex...
Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Po...
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      The new face of fraud in the AI era

      The new face of fraud in the AI era

      Tuesday, November 25, 2025, 9:57 AM Asia/Singapore | Features, Newsletter, Tips
    • Featured

      Shadow AI – the hidden risk in APAC organizations

      Shadow AI – the hidden risk in APAC organizations

      Monday, November 24, 2025, 4:09 PM Asia/Singapore | Features
    • Featured

      Unlocking cybersecurity’s hidden defenders to preempt cyber vulnerabilities

      Unlocking cybersecurity’s hidden defenders to preempt cyber vulnerabilities

      Saturday, November 22, 2025, 8:17 AM Asia/Singapore | Features, Newsletter
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning

Select Page

Tips

Harden your Windows 11 installation before your life story is leaked!

By L L Seow | Tuesday, June 24, 2025, 11:53 AM Asia/Singapore

Harden your Windows 11 installation before your life story is leaked!

Here are five detailed measures that IT admins/home users can take to control what personal data is being leaked.

Recently, the PC Security Channel used a reputable open-source network protocol analyzer — to monitor network traffic on a freshly installed copy of Windows 11, according to various publications.

By filtering DNS traffic, the group was able to observe Windows 11 reaching out to both Microsoft and third-party servers (such as Steam, McAfee, and Comscore) immediately after installation, without user intervention or consent. For comparison, the same test on Windows XP showed only essential update checks, with no third-party telemetry.

Once a Windows 11 system is fully loaded with other applications, the situation gets much worse. And, as Microsoft updates the operating system, malware, bugs, vulnerabilities and undocumented features that allow usage telemetry to be legally sent out without users’ knowledge could be a ticking time bomb.

Locking down Windows 11 “data sharing”
Some of the convenience features we enable without a second thought could be deemed as our implicit permission to the operating system to share data to provide those conveniences. Other pathways for data “leakage” (whether intentional or hidden) are not so obvious or controllable.

So, here is a list of measures Windows 11 users can take wrestle-back control over what the operating system can do with our data.

  1. Monitor all network traffic: Install software such as Wireshark tools that continuously monitor all outbound connections to detect and analyze any data Windows attempts to send out. Such tools can issue real-time alerts, historical data, and per-app network usage monitoring.
  2. Harden privacy settings (controls built-into the OS)
    • Privacy Dashboard: Regularly review and adjust settings in Settings > Privacy & Security and the Windows Privacy Dashboard.
    • Disable telemetry: Set Diagnostic Data to “Required only” or “Basic” (if available). Also, users can block additional data collection. In the registry, disable the Customer Experience Improvement Program (CEIP) by setting HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\SQMClient\Windows\CEIPEnable to 0. In Group Policy Editor, explore Computer Configuration > Administrative Templates > Windows Components > Data Collection and Preview Builds to further restrict telemetry. Caution: Registry edits can destabilize your system if done incorrectly —seek help if you are unsure.
    • Use Group Policy Editor/registry tweaks: For advanced users, enforce privacy settings at the system level.
    • Turn off your Advertising ID: Disable ad tracking in Settings > Privacy & Security > General.
    • Limit app permissions: Revoke unnecessary access to camera, microphone, location, contacts, etc., for all apps.
    • contacts, etc., for all apps.
    • Disable activity history: Turn off and clear activity history in Settings > Privacy & Security > Activity History.
    • Disable Find My Device: Unless needed, turn this off in Settings > Privacy & Security > Find my device.
    • Turn off Microsoft Tips: Navigate to Settings > System > Notifications > Additional settings and untick all checkboxes to stop receiving tips that could involve data sharing,
    • Disable Custom Inking and Typing personalization: In Settings > Privacy & security > Inking and typing personalization, turn off “Custom inking and typing word list” to stop Microsoft from using your input data for personalization.
    • Disable Delivery Optimization: Go to Settings > Windows Update > Advanced options > Delivery Optimization and turn off “Allow downloads from other PCs” to prevent your PC from distributing updates, potentially limiting data transfer
    • Remove AI assistants and associated features: Such tools collate a lot of data about us that we may sometimes not have control over. In specific situations, disable them or uninstall them to eliminates a potential source of background data collection
    • Adjust Microsoft Edge settings, or switch browsers
      The default Edge browser may send usage data to Microsoft, adding to the telemetry load. In Edge, go to Settings > Privacy, search, and services and turn off tracking, diagnostic data, and personalized ads. For a stronger solution, switch to a privacy-focused browser. Similarly, apps from the Microsoft Store can independently communicate with external servers, bypassing OS privacy controls. Go to Settings > Apps > Apps & features, review installed apps, and uninstall anything unnecessary. Pay attention to apps requesting broad permissions (e.g., location, camera).
    • Configure Windows Update carefully
      Windows Update is a potential telemetry channel that could send data beyond what is necessary for updates. What to do: Use Group Policy Editor (available in Pro and Enterprise editions) or registry settings to minimize data sharing. For example, navigate to Computer Configuration > Administrative Templates > Windows Components > Windows Update and adjust settings to limit non-essential data exchanges. In the registry, you can set HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate to restrict telemetry.
      In Settings: Go to Settings > Windows Update > Advanced options and disable options like “Get me up to date” or “Download updates over metered connections” to reduce unnecessary activity. Note: Perform these steps with care as they may inadvertently expose the system to security risks.
  3. Use third party privacy tools: Various commercial software utilitiescan be installed to achieve the following:
    • Disable hidden telemetry, block data collection, and control system settings not exposed in the standard UI.
    • Gain granular control over telemetry, updates, and privacy settings.
    • Disable telemetry, feedback, advertising ID, and related services.
    • Block unwanted outbound connections at the network layer, allowing only whitelisted traffic.
    • Remove tricky pre-installed apps and bloatware that may communicate with external servers and are difficult to uninstall.
  4. Set network-level protections:
    • Outbound firewall rules: Use the built-in Windows Firewall or third-party firewalls to block all outbound connections except those explicitly allowed.
    • DNS filtering: Use DNS services to block known telemetry and ad domains at the network level.
    • Network segmentation: Place Windows devices on a separate VLAN or behind a firewall with strict egress filtering.
  5. Enforce advanced and persistent monitoring
    • Regular packet captures: Periodically capture and review network traffic using Wireshark to detect new or unexpected outbound connections.
    • Log analysis: Use tools to parse and alert on unusual log or network activity.
    • System integrity monitoring: Tools such as OSQuery or Wazuh can be set to monitor for changes in system files and configurations.

Measures outside of this set of this list can also include: sandboxing Windows 11 in a virtual machine (optionally within a more secure OS); blocking telemetry at the router level with a custom DNS service; and supporting privacy advocacy groups (e.g., Electronic Frontier Foundation) that push for laws requiring transparency in telemetry and data collection.

Caveats to keep in mind

Even with all the above measures, Windows 11 may still attempt to send encrypted telemetry, making it impossible to guarantee zero data leakage without network-level blocking and continuous monitoring.

The only way to be absolutely sure nothing leaks is to block all outbound traffic and manually allow only essential services, or to use an alternative OS.

Also, bear in mind that Microsoft’s leader, Satya Nadella, had ever compelled the organization to rethink everything it had failed in, in terms of protecting users. With Windows 10 on track to be phased out by Oct 2025, users who face data privacy and cybersecurity issues with Windows 11 can resort to social media pressure to remind their national cybersecurity authorities and Microsoft of their key directives.

Share:

PreviousNexusguard’s 2025 DDoS Trends Report Uncovers Record-Breaking Attacks and Emerging Threats Transforming Cybersecurity
NextHow ready are global organizations to navigate autonomous AI securely, sustainably?

Related Posts

Transactional fraud and abuse: are they the same?

Transactional fraud and abuse: are they the same?

Thursday, June 23, 2022

Even Jeff Bezos and Elon Musk have been hacked, so protect your data!

Protect your data! even Jeff Bezos and Elon Musk have been hacked

Wednesday, June 2, 2021

Cybercriminals are waiting to prey on Olympics fans as a sport  

Cybercriminals are waiting to prey on Olympics fans as a sport  

Friday, July 26, 2024

When your petrol pump’s LCD screen shows “cyber attack SMILE”

When your petrol pump’s LCD screen shows “cyber attack SMILE”

Thursday, February 10, 2022

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • What AI worries keeps members of the Association of Certified Fraud Examiners sleepless?

    What AI worries keeps members of the Association of Certified Fraud Examiners sleepless?

    This case study examines how many anti-fraud professionals reported feeling underprepared to counter rising AI-driven …Read more
  • Meeting the business resilience challenges of digital transformation

    Meeting the business resilience challenges of digital transformation

    Data proves to be key to driving secure and sustainable digital transformation in Southeast Asia.Read more
  • Upgrading biometric authentication system protects customers in the Philippines: UnionDigital Bank

    Upgrading biometric authentication system protects customers in the Philippines: UnionDigital Bank

    An improved dual-liveness biometric framework can counter more deepfake threats, ensure compliance, and protect underbanked …Read more
  • HOSTWAY gains 73% operational efficiency for private cloud operations  

    HOSTWAY gains 73% operational efficiency for private cloud operations  

    With NetApp storage solutions, the Korean managed cloud service provider offers a lean, intelligent architecture, …Read more

Bottom sidebar

  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2025 CybersecAsia All Rights Reserved.