Some options to beef up security on your Windows computer aren’t available in the Settings app. You can find them in the Group Policy Editor, provided you’re using Windows Pro or Enterprise editions. Let’s look at several of them.

To access the Group Policy Editor, press Windows+R to open the Run dialog box. Entergpedit.mscin the text and click the “OK” button.

The “Interactive Logon: Machine Inactivity Limit” highlighted in the Group Policy Editor policy on Windows.

1Screen Lockout Time

Enabling the screen lockout policy locks your computer after a specified period of inactivity. Using the computer after being locked out will require authentication, protecting your computer from unauthorized access.

Be sure tocreate a backup of your Group Policy Editor settingsin case you make a mistake. This will give you a way to revert changes to the state they were in before you made the changes.

The “Account Lockout Threshold” policy highlighted in the Group Policy Editor on Windows.

To find the screen lockout policy in the Group Policy Editor, go to Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options. Here, edit the “Interactive Logon: Machine Inactivity Limit” policy.

You will need to enter the number of seconds that should pass before your computer automatically locks. you may pick a number between 0 and 599,940.

The UAC policies in the Group Policy Editor on Windows.

2Password Policies

The default password policies on Windows are not that strict. For instance, users can use the same password indefinitely and don’t need to create complex passwords. Luckily, you can make them stricter by editing the right security policies.

To find the password policies in the Group Policy Editor, go to Computer Configuration > Windows Settings > Security Settings > Account Policies > Password Policy.

The audit policies in the Group Policy Editor on Windows.

There are several group policies to tweak here. Here are the ones I recommend changing:

Enforce password history

Setting an audit policy in the Group Policy Editor on Windows.

24 password remembers

Maximum password age

Opening the Event Viewer using the Run dialog box on Windows.

Forces users to change their password after a specified number of days.

60-90 days

Viewing the security log in the Group Policy Editor on Windows.

Minimum password age

Sets the number of days a user must wait before they can change their password since they last changed it.

1 day

Minimum password length

Sets the minimum number of characters a user can enter when creating a password for their account.

8-12 characters

Password must meet complexity requirements

Password should contain uppercase letters, lowercase letters, numbers, and special characters to be valid.

Enabled

3Account Lockout Threshold

If someone tries to hack into a user’s profile, they might attempt to guess the password. By setting the “Account Lockout Threshold” policy, you may ensure the account is locked for several minutes before the user can attempt to log in again or until an administrator unlocks it.

To find the “Account Lockout Threshold” policy in the Group Policy Editor, go to Computer Configuration > Windows Settings > Security Settings > Account Policies > Account Lockout Policy.

I’d recommend setting it to 3–5 login attempts before the account lockout period is triggered. Doing this will also enable the “Allow Administrator Lockout” policy and set the “Account Lockout Duration” and “Reset Account Lockout Counter After” policies to 10 minutes. You can tweak them individually if you want to if the default values don’t work for you.

4Disable Removable Media

Disabling removable media ensures flash drives, external drives, and other storage devices cannot be accessed on your Windows computer. That means no one can copy data from your computer or infect it with malicious software through these devices.

To disable removable media, navigate to Computer Configuration > Administrative Templates > System > Removable Storage Access. Find the “All Removable Storage classes: Deny All Access” policy and enable it.

If you want to set it for a specific profile instead of the whole computer, log into that profile, and enable the policy there. You will find it by going to User Configuration > Administrative Templates > System > Removable Storage Access.

5User Account Control (UAC)

The UAC is a security feature that prevents users without administrative privileges from changing system settings. When a user wants to perform an action that requires administrator permission, they will receive a prompt asking them to obtain it before proceeding. This ensures that no one can make important changes without the consent of an administrator.

To access the UAC policies in the Group Policy Editor, go to Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options. Look for policies that start with “User Account Control.”

Here is how you should set it up to make your system more secure:

Behavior of the Elevation Prompt for Standard Users

Prompt for Credentials

Behavior of the Elevation Prompt for Administrators in Admin Approval Mode

Detect Application Installations and Prompt for Elevation

Only Elevate Executables that are Signed and Validated

6Enable Account Audit Policies

Windows allows you to track certain actions regarding user accounts on your system. Reviewing the logs lets you look for suspicious activity, such as failed login attempts, unauthorized access, misuse of elevated privileges, or alterations to account settings.

To find these policies in the Group Policy Editor, go to Computer Configuration > Windows Settings > Security Settings > Local Policies > Audit Policy.

Here, edit the following policies by ticking the “Success” and “Failure” checkboxes:

you’re able to find the audit trail of these policies in the Event Viewer. To open it, press Windows+R to bring up Windows Run. Entereventvwrin the textbox and click the “OK” button.

Then, select Event Viewer > Windows Logs > Security to find the logs created for the audit policies.

Combine these group policy edits along withother Windows Security settingsto make your computer as safe as it can be. You can apply these tips whether you’re an IT administrator at a company or someone whose computer is used by others at home.

It’s best to do everything possible to protect your personal data. This includesdisabling features like Command Prompt and clipboard history. The safety of your computer is in your hands.