Blog

Privacy settings in Windows 11 – what to turn off, what to keep

Privacy settings in Windows 11 – what to turn off, what to keep

Why privacy settings in Microsoft's operating system matter

When installing a new operating system on a computer, we often instinctively click “Next” just to get to the desktop as quickly as possible. However, it is precisely during the initial setup and in the “Privacy and Security” section that we decide how much information about our activity will be shared with the manufacturer, apps, and online services. Properly configured privacy means less tracking, fewer unnecessary notifications, and greater transparency regarding what happens to our data on a daily basis. The recommendations described below apply to the default configuration after a fresh installation of Windows 11 on a home or work computer, but they can also be successfully applied to devices that have been in use for a long time—all it takes is a few minutes to calmly review the relevant tabs in the settings.

Where to find the most important settings – an overview of the "Privacy and Security" panel

To get started, open the Settings app. Click the Start button, select the gear icon, or type "settings" into the system search bar and press Enter. In the menu on the left, you’ll find the “Privacy & Security” section—this is where most of the options related to data protection, telemetry, location, app permissions, and many other elements that affect how user information is processed are gathered. Later in this article, we’ll walk through the most important groups of settings in this section and highlight what—from the perspective of a typical home user or small business—is usually worth turning off, and what’s better to leave on so as not to hinder your daily work.

General – Ad ID and content suggestions

Advertising ID – what is it and do you need one?

In the "General" section, you'll find, among other things, a setting for the so-called advertising ID. The system assigns a unique identifier to your device, which apps can use to create interest profiles and display targeted ads. Turning this feature off won't make ads disappear, but it will limit the ability to create detailed profiles based on your activity in apps.

What you should usually turn off

In most cases, you can disable the following without significantly compromising your convenience: the option that allows apps to display personalized ads based on your advertising ID; the ability to share your list of preferred languages with websites; and content suggestions and recommendations in the Settings app, which are based on data about how you use the system and apps. This reduces the amount of data used for profiling and, at the same time, minimizes the number of suggestions and ads that distract you while you work.

What can you leave behind?

If you’re just setting up a new environment and frequently install apps from the manufacturer’s store, you might want to consider keeping the default recommendations for new apps. However, it’s a good idea to periodically revisit this screen and check whether the level of personalization still meets your expectations.

Diagnostics and reports – how much data really needs to be sent

Diagnostic data – why it can't be completely disabled

The operating system collects diagnostic data to detect errors, plan updates, and improve system stability. A basic set of this information (e.g., general device status, system version, basic configuration data) is required for the update mechanism to function properly and, as a rule, cannot be completely disabled. From a privacy perspective, it is crucial not to allow the sending of extended reports, which may contain more detailed information about how the application is used.

What to safely limit

In the "Diagnostics and Feedback" tab, you may want to consider: disabling the sending of additional (optional) diagnostic data, disabling the “personalized experiences” feature, which uses diagnostic data to display tips, recommendations, and ads in the system, and blocking the option to improve handwriting and keyboard recognition if you don’t use a touchscreen or stylus. In practice, this means that the manufacturer will receive only the minimum set of information necessary to keep the system in good working order, and you will retain greater control over what leaves your device.

What should you leave turned on?

In a corporate environment, a reasonable compromise is to retain basic diagnostic capabilities and the ability to manually send error reports when requested by an administrator—this helps resolve issues more quickly. At home, on the other hand, a feature that allows you to review the history of diagnostic data sent may be useful; it provides a better understanding of what types of information are actually sent to the manufacturer’s servers.

Location, camera, and microphone—the most sensitive permissions

Location – when to turn it off and when to leave it on

Location access is useful in weather apps, maps, device-finding features, and for automatically adjusting certain settings. However, it doesn’t always need to be enabled all the time. The system lets you first decide whether to enable location services globally, and then choose which specific apps will have access to them.

What to turn off

Consider turning off location services for: apps you don’t trust or rarely use; programs that don’t need your device’s location to function (e.g., basic office tools); and your browser, if you manually enter your city on weather sites or maps anyway. For desktop computers that never leave the office or home, completely disabling location services is often a sensible solution—the exception might be if you want to use the device-finding feature.

What to usually leave

On laptops and mobile devices, it’s a good idea to keep location services enabled for: device tracking in case of loss or theft, map and navigation apps, and a specific weather app that you actually use. It’s a good habit to regularly review the list of apps with location access and revoke permissions for those you don’t use or don’t recognize.

Camera and microphone – control over online meetings

The following sections in the privacy settings control access to the camera and microphone. These are among the most sensitive permissions—it’s not just about potential eavesdropping or spying, but also about your comfort during online meetings. In the panel, you can specify whether all apps should have access or only those downloaded from the manufacturer’s store, and below that, you can select which specific programs are allowed to use the camera and microphone.

Checklist for granting permissions

Before you grant an app access to your camera or microphone, ask yourself a few simple questions: Does this app really need video or audio to do its job? Do I know the app’s developer and trust them enough to grant such sensitive permissions? Do I use this tool regularly, or was this just a “trial” installation? If you answer “no” to even one of these questions, consider blocking access and using only well-known, trusted communication tools.

Activity history, search, and background apps

Activity history and search engine customization

The privacy panel also includes activity history settings—such as remembering recently opened documents, visited websites, and used apps. This data is later used to suggest recently used files and to sync across devices logged into the same account. If you use only one computer and don’t care about this type of synchronization, you can limit the scope of the information collected and regularly delete your activity history. This gives you a greater sense of control over what appears in the “recently used” lists and what data is associated with your account. For the system search engine, consider disabling the option to send queries directly to the internet if you already use your preferred browser and search engine in a separate window on a daily basis. This reduces the amount of data associated with your account while simplifying search results within the system itself.

Background apps – impact on privacy and performance

Settings for apps running in the background are mainly associated with battery life and performance, but they also affect privacy. Apps that constantly run in the background may connect to the developer’s servers more frequently—to download updates, send statistics, or check for new content. Limiting their activity not only conserves resources but also provides better control over data flow. A good starting point is to allow only those apps that truly need to be active at all times (such as work-related messaging apps or file-syncing tools) to run in the background, and to disable this option for the rest. From time to time, it’s worth reviewing the list of installed programs and uninstalling those you no longer use—the fewer unnecessary apps, the lower the risk of collecting unnecessary data in the background.

Privacy vs. Work Comfort – How to Find the Right Balance

There is no single set of privacy settings that works for everyone. A home user who uses a computer mainly for browsing the internet and entertainment has different needs than a small business, for which remote device management or rapid patch deployment, for example, is important. The most important thing is to understand exactly what a given option does and to make an informed decision, rather than accepting the default settings without thinking. If you plan to reinstall the system or purchase a new license, make sure the product key you choose comes from a trusted source—this will facilitate later activation and help you avoid issues with updates. Before clicking “buy” in an online store, don’t be swayed solely by the low price; check whether the seller (e.g., Key-Soft.pl) also offers technical support and clear information on how a given office suite, such as Office, works with the privacy settings described in this guide. Finally, it’s worth emphasizing that even the best-configured system cannot replace basic caution. Regular updates, sensible use of email and browsers, and a healthy skepticism toward unexpected messages are the foundation of security. Privacy settings are one of the key pillars of this foundation—but only when combined with daily habits do they create a consistent and effective approach to data protection.

Add a comment

Sign in

Megamenu

Your shopping cart

Your cart is empty. Add items