How to use Credential Manager in Windows 10 - Security Boulevard

SBN How to use Credential Manager in Windows 10

Introduction

Windows Credential Manager is a Windows feature that, both due to its user friendliness and popularity, was brought over to Windows 10. Since its debut in Windows 7, Credential Manager has helped users store both their web and Windows credentials in one convenient location which can be managed with just a few clicks. 

This article will detail how to use Credential Manager in Windows 10, including an introductory explanation of Credential Manager, security concerns associated with Credential Manager, how to add new login information, how to edit login information, how to delete login information, how to back up credentials and how to restore credentials. 

FinConDX 2021

A little about Credential Manager

Windows Credential Manager is a digital locker that stores your saved login credentials — passwords, usernames and addresses. It is a carry-over from previous Windows versions and allows users to better manage this very sensitive and very useful information. 

These login credentials fall into one of two categories, which are explored below.

Web credentials

The Credential Manager’s web credentials are login information which are stored in Windows, Edge, Internet Explorer, Skype and other apps. This credential categorization first appeared in Windows 8.1 and puts the proverbial hustle in storing your web credentials — those that use the internet frequently will be surprised to find just how many web credentials they use (which will still be dwarfed by the Windows Credential count for most).

Windows credentials

The other categorization of credentials in Credential Manager are Windows credentials login information. This category of login credentials is used by (and only by) Windows services and applications to automatically log you in. 

Security concerns

Despite the usability and convenience of Credential Manager, it is not the most secure as many have noted. 

Most of these concerns stem from (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Greg Belding. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/ObJJBZWXDAw/