Microsoft offers some key advice for foiling ransomware attacks in Windows 11

Representational image of data security
(Image credit: Kingston)

Microsoft has asked users to enable Microsoft Defender for Endpoint's Tamper Protection feature to protect themselves against ransomware campaigns, as it released the final version of its security configuration baseline settings for Windows 11

Microsoft helps businesses swim through the ocean of security-related settings and tweakable parameters by providing guidance in the form of security baselines.

As part of its guidance for Windows 11, the software giant asked its users to enable the Tamper Protection feature to prevent threat actors from overriding the security features of the installation.

TechRadar needs you!

We're looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won't take more than 60 seconds of your time, and we'd hugely appreciate if you'd share your experiences with us.

>> Click here to start the survey in a new window <<

“While you are enabling the Microsoft Security Baseline for Windows 11 (and/or Windows 10, and/or Windows Server 2022/2019/2016), make sure to enable Microsoft Defender for Endpoint's "Tamper Protection" to add a layer of protection against Human Operated Ransomware,” noted Microsoft security consultant Rick Munck.

Security compliance toolkit

Munck pointed users to the Microsoft Security Compliance Toolkit 1.0, which allows enterprise security administrators to download, analyze, test, edit and store Microsoft-recommended security configuration baselines, while comparing them against other security configurations.

As part of the release, Microsoft is suggesting users to enable Defender’s Tamper Protection functionality.

“Bad actors like to disable your security features to get easier access to your data, to install malware, or to otherwise exploit your data, identity, and devices. Tamper protection helps prevent these kinds of things from occurring,” explains Microsoft.

Tamper protection works by ensuring Defender’s secure, default values are locked, and can’t be modified through the Registry Editor, PowerShell cmdlets, or via Group Policy, which are usually exploited by malware to disable the security protections.

TOPICS
Mayank Sharma

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.

Read more
Representational image of a hacker
Best ransomware protection of 2025
Frustrated unhappy laptop user girl touching head at work table with computer
Five essential tips for keeping your new PC secure
Hack The Box crisis simulation event
“Everyone will experience a hack” - how incident response can protect your organization
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
Phone scammer
Microsoft thinks it could stop this dangerous scam forever
Representational image of a cybercriminal
Microsoft discovers five potentially damaging attacks against its own software
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Sunday, March 23 (game #385)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Sunday, March 23 (game #651)
Google Pixel 9 Pro Fold main display opened
Apple is rumored to be prioritizing battery life on the foldable iPhone – which could also feature a liquid metal hinge for added durability
Google Pixel 9
The Google Pixel 10 just showed up in Android code – and may come with a useful speed boost
L-mount alliance
Sirui joins L-Mount Alliance to deliver its superb budget lenses for Leica, DJI, Sigma and Panasonic cameras