Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
EventXpo 2025 and Kind Malaysia 2025: Business Events Build Nations
Thai government expands secure email management to close cybersecurity...
Another critical Model Context Protocol vulnerability surfaces within ...
ITSEC Asia Set to Host Southeast Asia’s Largest Critical Infrast...
Cyble Recognized as a Sample Vendor in Three Gartner® Hype Cycle™ Repo...
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      Transcending digital disruption: How financial institutions can integrate innovation, security, and agility

      Transcending digital disruption: How financial institutions can integrate innovation, security, and agility

      Thursday, July 10, 2025, 4:16 PM Asia/Singapore | Features
    • Featured

      Navigating the evolving software supply chain landscape

      Navigating the evolving software supply chain landscape

      Tuesday, July 8, 2025, 4:24 PM Asia/Singapore | Features, Software Development Lifecycle Security
    • Featured

      Redefining the frontlines of digital defense

      Redefining the frontlines of digital defense

      Tuesday, July 1, 2025, 3:16 PM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning

Select Page

Tips

Harden your Windows 11 installation before your life story is leaked!

By L L Seow | Tuesday, June 24, 2025, 11:53 AM Asia/Singapore

Harden your Windows 11 installation before your life story is leaked!

Here are five detailed measures that IT admins/home users can take to control what personal data is being leaked.

Recently, the PC Security Channel used a reputable open-source network protocol analyzer — to monitor network traffic on a freshly installed copy of Windows 11, according to various publications.

By filtering DNS traffic, the group was able to observe Windows 11 reaching out to both Microsoft and third-party servers (such as Steam, McAfee, and Comscore) immediately after installation, without user intervention or consent. For comparison, the same test on Windows XP showed only essential update checks, with no third-party telemetry.

Once a Windows 11 system is fully loaded with other applications, the situation gets much worse. And, as Microsoft updates the operating system, malware, bugs, vulnerabilities and undocumented features that allow usage telemetry to be legally sent out without users’ knowledge could be a ticking time bomb.

Locking down Windows 11 “data sharing”
Some of the convenience features we enable without a second thought could be deemed as our implicit permission to the operating system to share data to provide those conveniences. Other pathways for data “leakage” (whether intentional or hidden) are not so obvious or controllable.

So, here is a list of measures Windows 11 users can take wrestle-back control over what the operating system can do with our data.

  1. Monitor all network traffic: Install software such as Wireshark tools that continuously monitor all outbound connections to detect and analyze any data Windows attempts to send out. Such tools can issue real-time alerts, historical data, and per-app network usage monitoring.
  2. Harden privacy settings (controls built-into the OS)
    • Privacy Dashboard: Regularly review and adjust settings in Settings > Privacy & Security and the Windows Privacy Dashboard.
    • Disable telemetry: Set Diagnostic Data to “Required only” or “Basic” (if available). Also, users can block additional data collection. In the registry, disable the Customer Experience Improvement Program (CEIP) by setting HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\SQMClient\Windows\CEIPEnable to 0. In Group Policy Editor, explore Computer Configuration > Administrative Templates > Windows Components > Data Collection and Preview Builds to further restrict telemetry. Caution: Registry edits can destabilize your system if done incorrectly —seek help if you are unsure.
    • Use Group Policy Editor/registry tweaks: For advanced users, enforce privacy settings at the system level.
    • Turn off your Advertising ID: Disable ad tracking in Settings > Privacy & Security > General.
    • Limit app permissions: Revoke unnecessary access to camera, microphone, location, contacts, etc., for all apps.
    • contacts, etc., for all apps.
    • Disable activity history: Turn off and clear activity history in Settings > Privacy & Security > Activity History.
    • Disable Find My Device: Unless needed, turn this off in Settings > Privacy & Security > Find my device.
    • Turn off Microsoft Tips: Navigate to Settings > System > Notifications > Additional settings and untick all checkboxes to stop receiving tips that could involve data sharing,
    • Disable Custom Inking and Typing personalization: In Settings > Privacy & security > Inking and typing personalization, turn off “Custom inking and typing word list” to stop Microsoft from using your input data for personalization.
    • Disable Delivery Optimization: Go to Settings > Windows Update > Advanced options > Delivery Optimization and turn off “Allow downloads from other PCs” to prevent your PC from distributing updates, potentially limiting data transfer
    • Remove AI assistants and associated features: Such tools collate a lot of data about us that we may sometimes not have control over. In specific situations, disable them or uninstall them to eliminates a potential source of background data collection
    • Adjust Microsoft Edge settings, or switch browsers
      The default Edge browser may send usage data to Microsoft, adding to the telemetry load. In Edge, go to Settings > Privacy, search, and services and turn off tracking, diagnostic data, and personalized ads. For a stronger solution, switch to a privacy-focused browser. Similarly, apps from the Microsoft Store can independently communicate with external servers, bypassing OS privacy controls. Go to Settings > Apps > Apps & features, review installed apps, and uninstall anything unnecessary. Pay attention to apps requesting broad permissions (e.g., location, camera).
    • Configure Windows Update carefully
      Windows Update is a potential telemetry channel that could send data beyond what is necessary for updates. What to do: Use Group Policy Editor (available in Pro and Enterprise editions) or registry settings to minimize data sharing. For example, navigate to Computer Configuration > Administrative Templates > Windows Components > Windows Update and adjust settings to limit non-essential data exchanges. In the registry, you can set HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate to restrict telemetry.
      In Settings: Go to Settings > Windows Update > Advanced options and disable options like “Get me up to date” or “Download updates over metered connections” to reduce unnecessary activity. Note: Perform these steps with care as they may inadvertently expose the system to security risks.
  3. Use third party privacy tools: Various commercial software utilitiescan be installed to achieve the following:
    • Disable hidden telemetry, block data collection, and control system settings not exposed in the standard UI.
    • Gain granular control over telemetry, updates, and privacy settings.
    • Disable telemetry, feedback, advertising ID, and related services.
    • Block unwanted outbound connections at the network layer, allowing only whitelisted traffic.
    • Remove tricky pre-installed apps and bloatware that may communicate with external servers and are difficult to uninstall.
  4. Set network-level protections:
    • Outbound firewall rules: Use the built-in Windows Firewall or third-party firewalls to block all outbound connections except those explicitly allowed.
    • DNS filtering: Use DNS services to block known telemetry and ad domains at the network level.
    • Network segmentation: Place Windows devices on a separate VLAN or behind a firewall with strict egress filtering.
  5. Enforce advanced and persistent monitoring
    • Regular packet captures: Periodically capture and review network traffic using Wireshark to detect new or unexpected outbound connections.
    • Log analysis: Use tools to parse and alert on unusual log or network activity.
    • System integrity monitoring: Tools such as OSQuery or Wazuh can be set to monitor for changes in system files and configurations.

Measures outside of this set of this list can also include: sandboxing Windows 11 in a virtual machine (optionally within a more secure OS); blocking telemetry at the router level with a custom DNS service; and supporting privacy advocacy groups (e.g., Electronic Frontier Foundation) that push for laws requiring transparency in telemetry and data collection.

Caveats to keep in mind

Even with all the above measures, Windows 11 may still attempt to send encrypted telemetry, making it impossible to guarantee zero data leakage without network-level blocking and continuous monitoring.

The only way to be absolutely sure nothing leaks is to block all outbound traffic and manually allow only essential services, or to use an alternative OS.

Also, bear in mind that Microsoft’s leader, Satya Nadella, had ever compelled the organization to rethink everything it had failed in, in terms of protecting users. With Windows 10 on track to be phased out by Oct 2025, users who face data privacy and cybersecurity issues with Windows 11 can resort to social media pressure to remind their national cybersecurity authorities and Microsoft of their key directives.

Share:

PreviousNexusguard’s 2025 DDoS Trends Report Uncovers Record-Breaking Attacks and Emerging Threats Transforming Cybersecurity
NextHow ready are global organizations to navigate autonomous AI securely, sustainably?

Related Posts

Four cyber threats expected to get even more worrisome next year

Four cyber threats expected to get even more worrisome next year

Wednesday, November 29, 2023

Know the 4 tenets of productive WFH security

Know the 4 tenets of productive WFH security

Tuesday, February 23, 2021

The greatest threat to industrial cybersecurity may actually be red tape!

The greatest threat to industrial cybersecurity may actually be red tape!

Tuesday, September 29, 2020

Address medtech technical debt NOW

Address medtech technical debt NOW

Monday, November 22, 2021

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper
  • Mitigating Ransomware Risks with GRC Automation

    Mitigating Ransomware Risks with GRC Automation

    In today’s landscape, ransomware attacks pose significant threats to organizations of all sizes, with increasing …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • Thai government expands secure email management to close cybersecurity gaps

    Thai government expands secure email management to close cybersecurity gaps

    New measures address cybersecurity gaps in public sector communications, deploying advanced protections and operational support …Read more
  • How Iress optimized global DevSecOps

    How Iress optimized global DevSecOps

    Scaling compliance, security & efficiency – while seamlessly migrating to the cloud – with JFrog.Read more
  • St Luke’s ElderCare enhances operations and capabilities through a centralized secure, scalable network

    St Luke’s ElderCare enhances operations and capabilities through a centralized secure, scalable network

    With only a small IT team, the digital transformation has united operations across 30 locations, …Read more
  • Automating border control and security with facial recognition technology

    Automating border control and security with facial recognition technology

    Indonesia Immigration & Seaport Authorities enhances security and speeds up border control queues at Batam …Read more

Bottom sidebar

  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2025 CybersecAsia All Rights Reserved.