Redaguoti

Bendrinti naudojant


Protect unmanaged devices with Microsoft 365 Business Premium

With Microsoft 365 Business Premium, you can secure managed devices, such as computers, phones, and tablets. If your business or campaign has people who bring their own devices (BYOD), ask them to following the guidance in this article. This guidance can help people protect business information that might be on their devices. Learn more about managed and unmanaged devices.

Note

This article applies primarily to unmanaged (or BYOD) devices. Guidance for protecting managed devices is available here: Set up and secure managed devices.

Windows 10 or 11

Turn on device encryption

Device encryption is available on a wide range of Windows devices and helps protect your data by encrypting it. If you turn on device encryption, only authorized individuals are able to access your device and data. See turn on device encryption for instructions.

If device encryption isn't available on your device, you can turn on standard BitLocker encryption instead. (BitLocker isn't available on Windows 10 Home edition.)

Protect your device with Windows Security

If you have Windows 10 or 11, you get the latest antivirus protection with Windows Security. When you start up Windows 10 for the first time, Windows Security is on and actively helping to protect your PC by scanning for malware (malicious software), viruses, and security threats. Windows Security uses real-time protection to scan everything you download or run on your PC.

Windows Update downloads updates for Windows Security automatically to help keep your PC safe and protect it from threats.

If you have an earlier version of Windows and are using Microsoft Security Essentials, it's a good idea to move to Windows Security. For more information, see help protect my device with Windows Security.

Turn on Windows Defender Firewall

You should always run Windows Defender Firewall even if you have another firewall turned on. Turning off Windows Defender Firewall might make your device (and your network, if you have one) more vulnerable to unauthorized access. See Turn Windows Firewall on or off for instructions.

Next step for Windows

Now, let's work on securing the email system against phishing and other attacks.