Skip to main content
Tech Radar Tech Radar Pro Tech Radar Gaming
TechRadar TechRadar the business technology experts
Asia
flag of Singapore
Singapore
Europe
flag of Danmark
Danmark
flag of Suomi
Suomi
flag of Norge
Norge
flag of Sverige
Sverige
flag of UK
UK
flag of Italia
Italia
flag of Nederland
Nederland
flag of België (Nederlands)
België (Nederlands)
flag of France
France
flag of Deutschland
Deutschland
flag of España
España
North America
flag of US (English)
US (English)
flag of Canada
Canada
flag of México
México
Australasia
flag of Australia
Australia
flag of New Zealand
New Zealand
RSS
Sign in
  • View Profile
  • Sign out
  • News
  • Reviews
  • Features
  • Expert Insights
  • Website builders
  • Web hosting
  • Security
Trending
  • Best web hosting
  • Best office chairs
  • Best website builder
  • Best antivirus
  • Expert Insights
Recommended reading
Person using laptop and phone
Windows Microsoft gives you another reason to hook up your Windows 11 PC and Android smartphone - it's a security feature that could come in seriously handy
A phone showing the download page for Microsoft Authenticator
Cyber Security Microsoft is phasing out passwords soon – here's why passkeys are replacing them and what to do next
Pink iPhone chained up
Phones Worried about phone snatchers? These 5 invaluable iPhone and Android settings will keep you safe and connected this summer
Elmo gets hacked
Cyber Security Elmo got hacked. Don't be like Elmo. This is how I'd explain cybersecurity and 2FA to the beloved Sesame Street character
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
Security Hackers are looking to steal Microsoft logins using some devious new tricks - here's how to stay safe
Visual representation of a passkey on a computer chip
Security Windows Entra IDs can be bypassed worryingly easily - here's what we know
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
Security Hackers can bypass FIDO MFA keys, putting your accounts at risk - here's what we know
  1. Pro

How to strengthen and secure your Windows 10 log-in

News
By EZ Bardeguez published 26 August 2015

Double authentication is key

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Introduction

Introduction

Double Authentication adds a second layer of security on your computer, device or account. By adding a primary layer of security, your password, you can log into your computer normally. Double Authentication requires you to input a 6-digit code that is randomly generated after 30 seconds on an app that you install on your phone. If you forget your original password, then Google can send it to a backup email or your phone (via SMS).

So, even if someone steals your password, they would need to have a Google Authentication App to generate a random key.

Page 1 of 5
Page 1 of 5
How to set it up

How to set it up

Download the Google Authenticator app - iOS here and Android here - and download that to your mobile phone.

The next step is harder, I promise.

Page 2 of 5
Page 2 of 5
Getting Windows 10 with Double Authentication

Getting Windows 10 with Double Authentication

Once all the prerequisites are done, open settings in the taskbar and click on Accounts. Note - if you are using a local account on your computer following through with these steps will link your computer with your Microsoft account. To setup your "Microsoft Account" click here.

Click on "Manage my Microsoft Account" and Edge will open to your Microsoft Account page. Once opened, click on "Security and Privacy."

On this page, click on a link for "More security sessions," which is the third link on the left-hand column which is the third one under the "Account security" header. Log in with your Microsoft credentials.

Scroll down and under "Two-step verification" make sure you click on "activate two-step authentication."

Page 3 of 5
Page 3 of 5
Setting up the app

Setting up the app

Click on the "Set up identity verification app" and follow the steps to add Microsoft to your Google Authenticator app. Make sure the app is open and click the '+' button and choose "Scan Barcode." The app is really easy to use. You just point your phone's camera toward the screen and scan the barcode and everything is already setup for you.

Page 4 of 5
Page 4 of 5
Final step

Final step

You will have to sign into your account and it will ask you for Authentication (via the app) but that is it.

Congratulations, and welcome to a safer and more secure Windows 10.

Page 5 of 5
Page 5 of 5
TOPICS
Windows 10 Microsoft
EZ Bardeguez
Read more
Person using laptop and phone
Microsoft gives you another reason to hook up your Windows 11 PC and Android smartphone - it's a security feature that could come in seriously handy
A phone showing the download page for Microsoft Authenticator
Microsoft is phasing out passwords soon – here's why passkeys are replacing them and what to do next
Pink iPhone chained up
Worried about phone snatchers? These 5 invaluable iPhone and Android settings will keep you safe and connected this summer
Elmo gets hacked
Elmo got hacked. Don't be like Elmo. This is how I'd explain cybersecurity and 2FA to the beloved Sesame Street character
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
Hackers are looking to steal Microsoft logins using some devious new tricks - here's how to stay safe
Visual representation of a passkey on a computer chip
Windows Entra IDs can be bypassed worryingly easily - here's what we know
Latest in Pro
Dark Web monitoring
Nevada forced to close state government offices following wide-ranging 'network security incident' - here's what we know
Bambu Lab HS2 3D printer during our review
Bambu Lab H2S 3D printer review
An abstract image of a cloud raining data.
How much do you trust your cloud? Hackers exploit weakness to target customers - here's what we know
Users display warnings about the use of artificial intelligence (AI), access to malicious software or threats to online hackers. computer cyber security Warning concept or tech scam.
Vicious malware found in Android apps with over 19 million installs - here's how to stay safe
SaaS Concept, Software as a Service, A man types smartphone with digital icons representing various aspects of Software as a Service (SaaS), emphasizing modern technology platforms and cloud computing
Companies spending too much on SaaS could cost them more than just money
A hand reaching out to touch a futuristic rendering of an AI processor.
How AI and the age of hyper-personalization is reshaping business strategies
Latest in News
Poketomo
Sharp’s Poketomo targets millennial loneliness with a glowing meerkat robot AI
The Rokid Glasses being worn by a person
These impressive new smart glasses with a screen put Meta on notice
Nintendo Switch 2 Pro Controller
'Just rely on backwards compatibility' – Switch 2 dev kits aren't making their way to some studios, and it could be a deliberate move from Nintendo
Smartphone with logo of instant messaging app Google
Google Messages is getting a new weapon to keep you safe from impersonation scams – here’s how it works
A screenshot of Mario from Mario Kart World
The next Nintendo Direct showcase will reportedly air next month, just in time for Super Mario Bros.' 40th anniversary
Apple Event September 9 2025 Invite
iPhone 17 launch date official as Apple sends out invites for ’Awe dropping’ event – here are 5 things to expect
LATEST ARTICLES
  1. 1
    Sharp’s Poketomo targets millennial loneliness with a glowing meerkat robot AI
  2. 2
    Scientists find a way to potentially reach terabit speeds wirelessly around obstacles using machine learning, AI - and yes, metasurfaces
  3. 3
    This impossibly cool turntable uses a removable disc instead of any visible controls – it's a weird minimalist dream
  4. 4
    The LG Ultragear GX9 Gaming Monitor engulfed me with its ultrawide, immersive OLED screen, and I don't want to give it back
  5. 5
    The Lenovo Yoga Slim 9i has just about everything you'd want in a Windows laptop, but falls short of perfection

TechRadar is part of Future US Inc, an international media group and leading digital publisher. Visit our corporate site.

  • About Us
  • Contact Future's experts
  • Contact Us
  • Terms and conditions
  • Privacy policy
  • Cookies policy
  • Advertise with us
  • Web notifications
  • Accessibility Statement
  • Careers

© Future US, Inc. Full 7th Floor, 130 West 42nd Street, New York, NY 10036.

Please login or signup to comment

Please wait...