Skip to main content
Tech Radar Tech Radar Pro Tech Radar Gaming
TechRadar TechRadar the business technology experts
Asia
flag of Singapore
Singapore
Europe
flag of Danmark
Danmark
flag of Suomi
Suomi
flag of Norge
Norge
flag of Sverige
Sverige
flag of UK
UK
flag of Italia
Italia
flag of Nederland
Nederland
flag of België (Nederlands)
België (Nederlands)
flag of France
France
flag of Deutschland
Deutschland
flag of España
España
North America
flag of US (English)
US (English)
flag of Canada
Canada
flag of México
México
Australasia
flag of Australia
Australia
flag of New Zealand
New Zealand
RSS
Sign in
  • View Profile
  • Sign out
Trending
  • Best office chairs
  • Best web hosting
  • Best website builder
  • Best antivirus
  • Expert Insights
Don't miss these
Person using laptop and phone
Windows Microsoft gives you another reason to hook up your Windows 11 PC and Android smartphone - it's a security feature that could come in seriously handy
World Password Day 2025
Pro I am a cybersecurity expert - here's why it's time for businesses to bolster defenses, beyond just tech
Elmo gets hacked
Cyber Security Elmo got hacked. Don't be like Elmo. This is how I'd explain cybersecurity and 2FA to the beloved Sesame Street character
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
Security Hackers are looking to steal Microsoft logins using some devious new tricks - here's how to stay safe
Visual representation of a passkey on a computer chip
Security Windows Entra IDs can be bypassed worryingly easily - here's what we know
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
Security Hackers can bypass FIDO MFA keys, putting your accounts at risk - here's what we know
1Password home page
Security 1Password Review: Pros & Cons, Features, Ratings, Pricing and more
Futuristic biometric authentication technology concept. Man is touching a fingerprint scan with icons of secured access, data protection, network cyber security in digital interface.
Security Best Authenticator App of 2025
Passkeys on mobile illustration
Security Researchers reveal passkeys may not be as safe as we think they are - here's how to stay safe
Young woman using laptop, looking annoyed
Windows Microsoft is 'removing known mechanisms for creating a local account' from Windows 11 setup - get ready to use a Microsoft account
Microsoft Authenticator by Microsoft ready for download in the App Store on smartphone screen with company website in background
Security Microsoft Authenticator is deleting your passwords today - here is what to do now
Apple iPhone 16 Pro REVIEW
iPhone 5 smart privacy features on iPhone you need to know about
A child using a computer.
Pro I am a cybersecurity expert, these are the online mistakes I made when raising my children that you should avoid
Student using a laptop while moving into new apartment
VPN Privacy & Security New laptop? Don't forget this $2 privacy essential for students
Two phones on a blue background showing the privacy settings in iOS and Android
macOS 4 iPhone security features you might not know about
  1. Pro

How to strengthen and secure your Windows 10 log-in

News
By EZ Bardeguez published 26 August 2015

Double authentication is key

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Introduction

Introduction

Double Authentication adds a second layer of security on your computer, device or account. By adding a primary layer of security, your password, you can log into your computer normally. Double Authentication requires you to input a 6-digit code that is randomly generated after 30 seconds on an app that you install on your phone. If you forget your original password, then Google can send it to a backup email or your phone (via SMS).

So, even if someone steals your password, they would need to have a Google Authentication App to generate a random key.

Page 1 of 5
Page 1 of 5
How to set it up

How to set it up

Download the Google Authenticator app - iOS here and Android here - and download that to your mobile phone.

The next step is harder, I promise.

Page 2 of 5
Page 2 of 5
Getting Windows 10 with Double Authentication

Getting Windows 10 with Double Authentication

Once all the prerequisites are done, open settings in the taskbar and click on Accounts. Note - if you are using a local account on your computer following through with these steps will link your computer with your Microsoft account. To setup your "Microsoft Account" click here.

Click on "Manage my Microsoft Account" and Edge will open to your Microsoft Account page. Once opened, click on "Security and Privacy."

On this page, click on a link for "More security sessions," which is the third link on the left-hand column which is the third one under the "Account security" header. Log in with your Microsoft credentials.

Scroll down and under "Two-step verification" make sure you click on "activate two-step authentication."

Page 3 of 5
Page 3 of 5
Setting up the app

Setting up the app

Click on the "Set up identity verification app" and follow the steps to add Microsoft to your Google Authenticator app. Make sure the app is open and click the '+' button and choose "Scan Barcode." The app is really easy to use. You just point your phone's camera toward the screen and scan the barcode and everything is already setup for you.

Page 4 of 5
Page 4 of 5
Final step

Final step

You will have to sign into your account and it will ask you for Authentication (via the app) but that is it.

Congratulations, and welcome to a safer and more secure Windows 10.

Page 5 of 5
Page 5 of 5
TOPICS
Windows 10 Microsoft
EZ Bardeguez
Read more
Person using laptop and phone
Microsoft gives you another reason to hook up your Windows 11 PC and Android smartphone - it's a security feature that could come in seriously handy
 
 
World Password Day 2025
I am a cybersecurity expert - here's why it's time for businesses to bolster defenses, beyond just tech
 
 
Elmo gets hacked
Elmo got hacked. Don't be like Elmo. This is how I'd explain cybersecurity and 2FA to the beloved Sesame Street character
 
 
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
Hackers are looking to steal Microsoft logins using some devious new tricks - here's how to stay safe
 
 
Visual representation of a passkey on a computer chip
Windows Entra IDs can be bypassed worryingly easily - here's what we know
 
 
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
Hackers can bypass FIDO MFA keys, putting your accounts at risk - here's what we know
 
 
Latest in Pro
PNY Nvidia RTX PRO 6000 Blackwell Workstation Edition GPU deal
Fastest gaming video card in the universe gets massive $2800 discount - PNY RTX 6000 Pro has 96GB RAM, smashes RTX 5090 but you may need to remortgage your house to buy one
 
 
Seagate Exos 30TB
World's largest hard drive on sale drops to its cheapest price ever just after Amazon Prime Day - 30TB Seagate Exos costs only $18.80/TB
 
 
Laptop with warning symbols over the keyboard
Oops - Microsoft Defender issues false end-of-life warning for SQL Server 2017 and 2019
 
 
An Android phone being held in the hand
This devious Android malware spoofs WhatsApp, TikTok and more - here's how to stay safe
 
 
cyber_attacks_festival_india
The silent impersonators: how lookalike domains threaten UK business trust
 
 
Microsoft Word
Good news forgetful typers - Microsoft Word will now save new documents to OneDrive by default
 
 
Latest in News
M4 Mac mini on a desk
The Apple Mac roadmap for 2025 and 2026 may have leaked – through macOS Tahoe 26
 
 
Microsoft Copilot Connectors
Microsoft Copilot assistant can now access your Google account—if you let it
 
 
The Pixel 10 Pro Fold next to a Tag Heuer watch and an OM Systems camera.
ICYMI: the week's 7 biggest tech stories, from Xbox Game Pass controversy to our Wake Up Dead Man review
 
 
Happy person using the Valve Index
Valve's Steam Deck-inspired VR headset might be launching soon – here's what we know
 
 
VPN Shield Security. Phone Concept - stock photo
A Deal with the Devil? Free VPNs still widespread across the UK
 
 
The Fairphone (Gen 6)
‘Of course we’re looking into other markets’: Fairphone CEO on expansion plans and the unique challenges of the US market
 
 
LATEST ARTICLES
  1. 1
    This new point-and-shoot film compact with autofocus reminds me of my classic Olympus Mju – and I’m totally in for the pre-orders
  2. 2
    I tested the Freewell Real Locking filter kit, and now it’s my go-to filter system for photography and video
  3. 3
    Peacemaker season 3: everything we know about the DC Universe TV show's possible return
  4. 4
    The Apple Mac roadmap for 2025 and 2026 may have leaked – through macOS Tahoe 26
  5. 5
    I use the Samsung Art Store every day, and I am totally obsessed

TechRadar is part of Future US Inc, an international media group and leading digital publisher. Visit our corporate site.

  • About Us
  • Contact Future's experts
  • Contact Us
  • Terms and conditions
  • Privacy policy
  • Cookies policy
  • Advertise with us
  • Web notifications
  • Accessibility Statement
  • Careers

© Future US, Inc. Full 7th Floor, 130 West 42nd Street, New York, NY 10036.

Please login or signup to comment

Please wait...