Restrict Access</li></ul>Phishing Filter <br /><ul><li>Phishing filter protects you against phishing, a kind of Internet scam.</li></ul>Tabbed Browsing & Previews<br /><ul><li>Tabbed browsing and Quick Tabs allow you to view more than one Web Pages in a single Windows.</li></ul>RSS Reader<br /><ul><li>Lets you read several RSS feeds in a single window.
Built-in support for web feeds</li></li></ul><li>Windows Security Enhancements<br /><ul><li>User Access Control – Prompts you for permission before taking potentially harmful options.
Windows Defender- Protects you from spyware and other potentially dangerous software.
Windows Security Center – Lets you view and change security settings for the Windows Firewall, Windows Update, Windows Defender.
Digital Rights Management – Helps protect content from copyright infringement.
Internet Explorer – Protected Mode</li></li></ul><li>User Account Control<br />Administrator Privileges<br />Ways to request elevation <br />Many Options are configured via Local Security MMC<br />Standard Users Can Do More<br /><ul><li>Elevation prompt for admin – consent/credentials/no prompt
Elevation prompt for standard users – credentials/no prompt
Windows Defender <br />Windows Defender offers three ways to help keep spyware and other potentially unwanted software from infecting your computer:<br /><ul><li>Real-time protection. Windows Defender alerts you when spyware or potentially unwanted software attempts to install itself or to run on your computer. It also alerts you when programs attempt to change important Windows settings.
SpyNet community. The online Microsoft SpyNet community helps you see how other people respond to software that has not yet been classified for risks. Seeing if other members of the community allow software can help you choose whether to allow it on your computer. In turn, if you participate, your choices are added to the community ratings to help other people choose what to do.
Scanning options. You can use Windows Defender to scan for spyware and other potentially unwanted software that might be installed on your computer, to schedule scans on a regular basis, and to automatically remove any malicious software that is detected during a scan.</li></ul>Software Explorer offers detailed information about software that is currently running on your computer that can affect your privacy or the security of your computer. You can see, for example, which programs run automatically when you start Windows and information about how these programs interact with important Windows programs and services.<br />
BitLocker ™ Features <br />BitLocker™ Drive Encryption <br /><ul><li>BitLocker Drive Encryption is an integral new security feature that ensures that data stored on the computer is not revealed to anyone who tampers with the machine while the installed operating system is offline. BitLocker Drive Encryption works with Trusted Platform Module (TPM) by encrypting the entire Windows volume, which assures early boot component integrity and data protection. TPM version 1.2 TPM with the appropriate BIOS modifications (to support the Static Root of Trust Measurement as defined by the Trusted Computing Group) is required to store the encryption keys on the computer. Encryption keys are stored on an USB flash drive to validate the user's identity at startup.</li></ul>Storage Root Key – TPM or USB Key<br />Volume Encryption Key<br />Windows Encrypted<br />
Last But Not The Least <br /><ul><li>Windows Vista Performance Enhancement – Ready Boost, Ready Drive, Super Fetch