Windows has detected you do not have a keyboard. Press ‘F9" to continue.
Occasionally, despite you take all necessary precautions, your system could crash (a buggy update) or it could become infected and locked by a virus or malware that prevents it from starting normally.
Hardening workstations is an important part of reducing this risk. By following these hardening best practices, you can significantly improve the security of your Windows systems and protect against a wide range of cyber threats.
Create a rescue USB drive that combines a bootable Windows recovery drive, system backup, and multiple rescue utilities on one stick.
If you have a computer or laptop with important, private, or sensitive files, data, and information, you should encrypt your entire drive. Basically, encryption is a method of making your data unreadable, so that only authorized parties can access and read it. Enable BitLocker encryption: Settings, Privacy & security, Device encryption, toggle it on. Alternatively, Control Panel, System and Security, BitLocker drive encryption, and smash the Turn on BitLocker option.
Next, select how to save the recovery key: Save to your Microsoft account (it is convenient, but not safe. If your Microsoft account is compromised, attackers can decrypt your drive), Save to a file/USB drive, print it, or use a trusted password manager like KeePass or Bitwarden (offline storage). You will be prompted to choose how much of your drive you want to encrypt (Encrypt entire drive) and encryption mode (Compatible mode), click the Run BitLocker system check option and smash the Continue button.
Malware Protection & Windows Security.
Privacy Settings & Management.
Create a System Restore Point in Windows 11.
Clone Your Windows 11 Disk to an NTFS Drive Using Clonezilla.
Remove Unnecessary Software and use portable apps when possible. Disable unused services and uninstall software that’s not needed, reducing potential vulnerabilities.
Enforce secure passwords. Use password managers to store and manage all your passwords.
Regularly apply security patches and updates to address known vulnerabilities.
Disable Remote Access: If remote access isn’t needed, disable it to reduce the potential for unauthorized access.
The Windows Security app is a built-in tool in Windows that helps manage your device’s security. Let’s leverage Windows built-in tools to safeguard your system against malware and unauthorized access. Press Win + S (Start menu) and search for Windows Security
. Review the dashboard for security status at a glance.
Address any items marked with yellow or red warnings.
Microsoft Defender is an anti-malware component of Microsoft Windows. It is one of the most effective software when it comes to eliminating threats and viruses in your computer. Enable it: Settings, Privacy & Security, Windows Security, Virus and Threat Protection, Virus and Threat Protection - Manage settings, and turn on the Real-time protection switch.
Let me insist, ensure real-time protection is enabled. Virus & Threat Protection settings, Manage settings, toggle on Real-time protection, cloud-delivered protection (provides increased and faster protection with access to the latest protection data in the cloud), and Tamper protection to prevent security settings changes (Prevent others -malware- from tampering with important security features, e.g., disabling protections).
The Device Security section in Windows Security helps manage built-in security features. Includes Core Isolation (it helps keep your device safe by protecting the Windows Kernel), Memory Integrity, and Secure Boot. Go to Settings, navigate to Privacy & security, Windows Security, Device security.
Activate Ransomware Protection. Blocks ransomware from encrypting critical folders (e.g., Documents, Pictures). Go to Settings, Privacy & Security, Windows Security, Virus and Threat Protection, Manage Ransomware Protection, and toggle on Controlled folder access
(it blocks unfriendly apps to modify your files and data), and make sure that you add all your important files and directories by clicking on Protected Folders. Besides, add allow apps you trust that need access (e.g., backup software) to modify any controlled folder: Allow an app through Controlled folder access, Add an allowed app.
Reputation-based protection is a security feature that helps safeguard your PC from potentially unwanted applications and malicious software. It works by evaluating the reputation of apps, downloads, and websites using Microsoft’s extensive threat intelligence network. Go to Settings, navigate to Privacy & security, Windows Security, App & browser control, click on Reputation-based protection settings and toggle on the settings to enable Potentially unwanted app blocking.
Secure Sign-In Options. Prevent unauthorized account access. Open Settings, go to Accounts. Click on Sign-in options. Review Windows Hello settings, set up facial recognition, fingerprint, or a PIN. Enable Dynamic lock (Allow Windows to automatically lock your Bluetooth device when you’re away).
Firewall & Network Protection. Block unauthorized inbound/outbound traffic.
Open source KVM software service
, Private and Public, Path: C:\Program Files\Barrier\barriers.exe
.Additional Best Practices.
Security intelligence is up to date
.Location services
on/off to control global location access. Under the same Location settings, scroll down to Let apps access your location to manage permissions for individual applications.Camera access
on/off to control system-wide access. Below this toggle, manage individual app permissions under Let apps access your camera
. Similarly, open Settings, navigate to Privacy & Security, Microphone. Toggle Microphone access
on/off to control system-wide access. Below this toggle, manage individual app permissions under Let apps access your microphone
.Search history on this device
to stop Windows from storing your search history locally. Under Search history in the cloud, click Privacy dashboard. Sign in to your Microsoft account to control what activity data Microsoft collects across all your devicesSystem Restore is a feature in Windows that allows you to revert your computer's state (including system files, installed applications, Windows Registry, and system settings) to that of a previous point in time where your computer was working fine.
create a restore point
and click on the Create a restore point result from the Control Panel. Under Protection Settings, look at your system drive (e.g., Local Disc C: System).W11InitialSetup
,Legacy Support
or CMS Enabled
if available. Save changes and exit (F10).Your laptop or desktop may use a key other than F12. Try escape, delete, F1 or even F9.
en_US.UTF-8 English
) and keyboard layout: Change keyboard layout?, keep
. The default keyboard layout is US keyboard. Then, Start Clonezilla or enter login shell (command line)?, select Start Clonezilla
.local_dev
to use a local device (e.g., external drive, USB drive) as the image storage location. Plug in your NTFS-formatted external drive (e.g., sda Samsung SSD M.2 500GB) if not already connected. Clonezilla will scan for devices. Once you see the device you have inserted shown on the status, press Ctrl-C to exist this windows. Select the correct partition (e.g., sda1 | ntfs | BackupWindows to mount a device as /home/partimag). Before mounting the device sda1, it allows you to do a file system check: no-fsck Skip checking/reparing the file system before mounting
. and confirm mounting point (/dev/sda1
).Beginner mode: Accept the dafault options
is recommended for most users.savedisk Save_local_disk_as_an_image
– the whole disk- and type the name for the saved image, e.g., W11_2025_image
.nvme0n1
| SKHynixHFS001… where nvme0n1 is my primary NVMe (Non-Volatile Memory Express) solid-state drive installed in my Lenovo ThinkStation P3 Ultra Mini, SKHynix is a SSD manufacturer, and HFS001… is part of the model number.-z9p zzstdmt_compression_(Very fast and small image like gzip for multicore/CPU).
Skip checking/repairing source file system
. I typically say no to check and repair the file system. Then, Clonezilla will ask if you want to check the saved image for restorability; I usually say “Yes, check the saved image” to this because it’s useful to know if the image is going to work OK.-senc Not to encrypt the image.
It depends on your own security needs. I typically encrypt these images, but you might not feel your data requires this level of security.New Install
to install a new copy of the PortableApps.com Platform to your local PC, cloud drive, or portable device.Portable - install to a portable device
(a USB stick).D:\
, and press click Install to start the installation. Then, check Run PortableApps.com Platform and click Finish.