News: 1770735934

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Microsoft dials up the nagging in Windows, calls it security

(2026/02/10)


Microsoft is introducing a raft of Windows security features that users and administrators alike might assume are already part of the operating system.

Dubbed "Windows Baseline Security Mode" and "User Transparency and Consent," the [1]updates are intended to deal with suspect behavior behind the scenes while also prompting the user when an app tries to use a sensitive resource, such as the device's camera or microphone, or wanders into a user's sensitive files.

Starting with the Baseline Security Mode, the plan is for Windows to operate with runtime integrity safeguards enabled by default. This means only properly signed apps, services, and drivers. However, users and administrators can still override the safeguards for that one weird legacy app, and app developers can check if the protections are active and if any exceptions have been granted.

[2]

For User Transparency and Consent, it looks like there could be a lot more nagging in store. The current User Account Control (UAC) prompt often triggers little more than an eye roll and a swift click. But Microsoft's new approach will be more granular, asking for explicit consent when apps access sensitive resources or try to install other software.

[3]

[4]

"Just like on your smartphone," said Microsoft, although hopefully without all the restrictions that come with a walled garden of vendors like Apple has.

So users are set to face more prompts, although Microsoft stated: "These prompts are designed to be clear and actionable, and you'll always have the ability to review and change your choices later."

[5]

Those same users might wonder why Microsoft's operating system does not already have such restrictions in place, but their arrival is laudable nonetheless, even if it is one more thing for administrators to either explain to users or deactivate ahead of the inevitable flood of support tickets.

Alex Ionescu, Chief Technology Innovation Officer at CrowdStrike, said: "CrowdStrike is looking forward to being an early partner in the development of a new, more secure and resilient runtime model for Windows applications, which helps raise the bar for user security and privacy.

[6]Microsoft boffins figured out how to break LLM safety guardrails with one simple prompt

[7]Azure power hiccup gives Windows admins a rare break from updates

[8]Microsoft starts the countdown for the end of Exchange Web Services

[9]Microsoft declares 'reliability' a priority for Visual Studio AI

"When applications and agentic workloads are well-behaved and respect user consent settings with proper security boundaries, security software can better protect users from attackers with reduced performance overhead."

CrowdStrike, lest we forget, was the outfit [10]responsible for an update that bricked Windows devices worldwide in 2024. The incident was at least partly responsible for Microsoft having a serious [11]rethink about Windows security and what third-party components should be allowed to do.

Microsoft has been talking about beefing up Windows security for years. Its Secure Future Initiative (SFI) [12]predated the CrowdStrike incident, but didn't prevent a piece of malformed code from taking down millions of Windows instances.

[13]

In this case, user concerns about AI agents are also at play. Microsoft said: "Apps and AI agents will also be expected to meet higher transparency standards, giving both users and IT administrators better visibility into their behaviors."

Microsoft did not give a timeline for the updates, only the direction of travel. The company said the changes would "roll out through a phased approach." ®

Get our [14]Tech Resources



[1] https://blogs.windows.com/windowsexperience/2026/02/09/strengthening-windows-trust-and-security-through-user-transparency-and-consent/

[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_software/oses&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aYtkNgwdZtmUakr258egQgAAAEE&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_software/oses&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aYtkNgwdZtmUakr258egQgAAAEE&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_software/oses&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aYtkNgwdZtmUakr258egQgAAAEE&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_software/oses&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aYtkNgwdZtmUakr258egQgAAAEE&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[6] https://www.theregister.com/2026/02/09/microsoft_one_prompt_attack/

[7] https://www.theregister.com/2026/02/09/azure_west_us_disruption/

[8] https://www.theregister.com/2026/02/06/microsoft_ews_shutdown/

[9] https://www.theregister.com/2026/02/05/microsoft_visual_studio_ai/

[10] https://www.theregister.com/2024/07/19/crowdstrike_falcon_sensor_bsod_incident/

[11] https://www.theregister.com/2024/11/25/microsoft_talks_up_beefier_windows/

[12] https://www.theregister.com/2023/11/03/microsoft_secure_future_initiative/

[13] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_software/oses&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aYtkNgwdZtmUakr258egQgAAAEE&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[14] https://whitepapers.theregister.com/



"or wanders into a user's sensitive files."

Andy Non

WARNING: Windows is trying to access your files! You are recommended to block this action.

Re: "or wanders into a user's sensitive files."

seven of five

"A program tries to access you outlook address book...."

What did I do? right click a file in explorer, "send to email reciepient"

This should be entertaining

Dan 55

It's what Apple added to Mac OS because when they've run out of ideas the only thing left is to make it more like iOS. I think Apple only managed to make it work because of the more organised home directory format, but even so it's just a pointless pain in the arse. I can't see this working at all in Windows with the amount of files thrown around everywhere.

Doctor Syntax

It looks like what's needed is a big global No.

intended to deal with suspect behavior behind the scenes...

ParlezVousFranglais

...like, for instance, Copilot hoovering up all your data and activities and sending them off to Redmond?...

Re: intended to deal with suspect behavior behind the scenes...

xcdb

Don't be silly! That will be controlled with a specific combination of 15 switches, found behind "Beware of the Leopard" signs...

Re: intended to deal with suspect behavior behind the scenes...

seven of five

...behind the "Beware of the Leopard" sign on door behind the Leopard.

Re: intended to deal with suspect behavior behind the scenes...

steviebuk

And Recall

Long gone

may_i

The time where anything Microsoft does with Windows could be described as "laudable" has well passed.

Re: Long gone

GregC

I dunno, they could take it out back and put it out of our misery. I'd appreciate that.

Crawl

elsergiovolador

Windows is crawling with just the Teams on and they want to mimic malware with a host of pop ups?

What could go wrong.

Re: Crawl

ThatOne

> What could go wrong.

For Microsoft, nothing. For the users though...

Anyway, once this is released, you will run to buy that new computer with a beefy CPU (or two) and at least 64 GB of RAM. Just to run Windows.

Re: Crawl

PCScreenOnly

Not spending £10k on a machine with that much RAM

App signing

Alberto Malich

"This means only properly signed apps, services, and drivers. However, users and administrators can still override the safeguards for that one weird legacy app, and app developers can check if the protections are active and if any exceptions have been granted."

I agree that a way of allowing granular access to whether or not software should be able to access the microphone and camera, should be present (and optional). However the above quote about "app signing" has me worried. How long will it be until they turn the screws some more and don't allow any unsigned software at all? Android is currently about to face this reality thanks to Google having complete control over the vast majority of the platform, and as a result a lot of software simply won't be able to run any more, or else it will be subject to restrictions put in place by Google.

I am not against the idea of software being able to be signed by the developer: rather, I worry that the signing keys, and ability to meaningfully distribute Windows software, will be locked behind an agreement dictated by Microsoft at some point.

JcRabbit

They really are intent on making everyone move to Linux (or anything else BUT Windows).

Not even properly OV signed apps from independent developers can escape SmartScreen now (unless you are a corporation and can afford/get EV certs), and most AV software assumes anything writing to a sub-folder of Public Documents (a perfectly legit folder to hold read/write application data until the advent of ransomware) can only be malware trying to encrypt all your files, so it MUST be SILENTLY blocked without warning the user MUCH LESS giving him a choice (daddy knows best, and users are too stupid to know what they are doing anyway). The application being silently blocked will take the fall as being "buggy" anyway, so win-win for the AV companies.

So sick of this.

Cogito cogito ergo cogito sum --
"I think that I think, therefore I think that I am."
-- Ambrose Bierce, "The Devil's Dictionary"