mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-16 07:17:24 +00:00
Updates to language
This commit is contained in:
parent
92bee2676b
commit
d13b295493
@ -64,17 +64,17 @@ At the time they are launched, whether inadvertently by a user or automatically,
|
||||
|
||||
By default, Windows uses [User Account Control (UAC)](https://docs.microsoft.com/windows/access-protection/user-account-control/user-account-control-overview) to provide automatic, granular control of privileges—it temporarily restricts privileges and prompts the active user every time an application attempts to make potentially consequential changes to the system. Although UAC helps limit the privileges of admin users, users can simply override this restriction when prompted. As a result, it is quite easy for an admin user to inadvertently allow malware to run.
|
||||
|
||||
To help ensure that your everyday activities do not result in malware infection and other potentially catastrophic changes, you can use a non-administrator account for regular use. By using a non-administrator account, you can prevent installation of unauthorized apps and prevent inadvertent changes to system settings. Avoid browsing the web or checking email using an account with administrator privileges.
|
||||
To help ensure that everyday activities do not result in malware infection and other potentially catastrophic changes, it is recommended that you use a non-administrator account for regular use. By using a non-administrator account, you can prevent installation of unauthorized apps and prevent inadvertent changes to system settings. Avoid browsing the web or checking email using an account with administrator privileges.
|
||||
|
||||
Whenever necessary, you can log in as an administrator to install apps or make configuration changes that require admin privileges.
|
||||
Whenever necessary, log in as an administrator to install apps or make configuration changes that require admin privileges.
|
||||
|
||||
[Read about creating user accounts and giving administrator privileges](https://support.microsoft.com/help/4026923/windows-create-a-local-user-or-administrator-account-in-windows-10)
|
||||
|
||||
## Other safety tips
|
||||
|
||||
To further ensure that your data is protected from malware as well as other threats, make sure you:
|
||||
To further ensure that data is protected from malware as well as other threats:
|
||||
|
||||
* Backup your files. Follow the 3-2-1 rule: make **3 copies**, store in at least **2 locations**, with at least **1 offline copy**. You can use [OneDrive](https://onedrive.live.com/about/?ocid=cx-wdsi-articles) for reliable cloud-based copies that allow you to access your files from multiple devices and help you recover damaged or lost files, including files locked by ransomware.
|
||||
* Backup files. Follow the 3-2-1 rule: make **3 copies**, store in at least **2 locations**, with at least **1 offline copy**. Use [OneDrive](https://onedrive.live.com/about/?ocid=cx-wdsi-articles) for reliable cloud-based copies that allows access to files from multiple devices and helps recover damaged or lost files, including files locked by ransomware.
|
||||
|
||||
* Be wary when connecting to public hotspots, particularly those that do not require authentication.
|
||||
|
||||
@ -82,13 +82,11 @@ To further ensure that your data is protected from malware as well as other thre
|
||||
|
||||
* Do not use untrusted devices to log on to email, social media, and corporate accounts.
|
||||
|
||||
* Monitor and safeguard your [family’s online computing experience](https://support.microsoft.com/help/4013209/windows-10-protect-your-family-online-in-windows-defender).
|
||||
|
||||
## Software solutions
|
||||
|
||||
Microsoft provides comprehensive security capabilities that help protect against threats. We recommend:
|
||||
|
||||
* [Automatic Microsoft updates](https://support.microsoft.com/help/12373/windows-update-faq) keeps software up-to-date to get the latest protections.
|
||||
* [Automatic Microsoft updates](https://support.microsoft.com/help/12373/windows-update-faq) keeps software up-to-date to get the latest protections.
|
||||
|
||||
* [Controlled folder access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard) stops ransomware in its tracks by preventing unauthorized access to your important files. Controlled folder access locks down folders, allowing only authorized apps to access files. Unauthorized apps, including ransomware and other malicious executable files, DLLs, and scripts are denied access.
|
||||
|
||||
@ -112,8 +110,8 @@ Microsoft provides comprehensive security capabilities that help protect against
|
||||
|
||||
* [Microsoft Security Essentials](https://www.microsoft.com/download/details.aspx?id=5201) provides real-time protection for your home or small business PC that guards against viruses, spyware, and other malicious software. For Windows 7, Windows Vista. See Windows Defender Advanced Threat Protection for later versions of Windows.
|
||||
|
||||
## What to do if you have a malware infection
|
||||
## What to do with a malware infection
|
||||
|
||||
Windows Defender Antivirus helps reduce the chances of infection and will automatically remove threats that it detects.
|
||||
Windows Defender ATP antivirus capabilities helps reduce the chances of infection and will automatically remove threats that it detects.
|
||||
|
||||
In case threat removal is unsuccessful, read about [troubleshooting malware detection and removal problems](https://www.microsoft.com/wdsi/help/troubleshooting-infection).
|
Loading…
x
Reference in New Issue
Block a user