Surprising fact: within months of its debut, a single on-device timeline feature collected enough screen snapshots to change how people think about what stays on their PCs.
You will learn what this feature does in plain language and why “windows recall privacy” becomes a top concern when your machine saves a visual history of your screen.
The tool uses on-device AI to make a searchable timeline from periodic screenshots. Microsoft introduced it in June 2024, paused it after backlash, then redesigned it with encryption and biometric checks before testing again in April 2025.
This guide gives a quick mental model: productivity gains versus the risk of creating a high-value local database of your life and work. You will get a clear roadmap to check, limit, or delete what’s collected and to handle work or regulated environments.
Key Takeaways
- You’ll see how the feature captures and stores visual data locally and why that matters.
- You’ll learn the core trade-off: findability versus exposure.
- You’ll get steps to confirm whether the feature is enabled and how to disable it.
- You’ll know how to delete existing snapshots and reduce future collection.
- You’ll understand why advice depends on your build (June 2024 → April 2025 redesign → optional rollout).
What Windows Recall Is and Why It’s Controversial Right Now
It creates a local, searchable archive by taking periodic snapshots of your display. The feature indexes those images so you can find past on-screen content quickly.
June 2024 backlash and what triggered alarms
In June 2024 the preview upset many users because the tool was enabled by default and it stored captures in plaintext. That combination raised clear security and privacy risks for shared or managed machines.
April 2025 redesign and the optional rollout
Microsoft later reworked the system. The April 2025 build adds at-rest encryption and access via biometric sign-in to reduce exposure. The update is now an optional Windows 11 package for testers and users, and saving snapshots is documented as off by default.
| Aspect | June 2024 | April 2025 / Later |
|---|---|---|
| Enablement | Opted in by default | Opt-in; saved off by default |
| Storage | Plaintext snapshots | Encrypted on-disk database |
| Access control | None beyond account login | Windows Hello / biometric gating |
| Enterprise behavior | Present unless pulled | Removed by default in managed environments |
Treat “opt-in” as a consent choice you must manage. If you share a PC, sign in with a Microsoft account, or use an employer machine, you should decide whether to accept the tradeoff or disable the feature and remove saved snapshots.
Next: the guide shows how snapshots work, where to check settings, and how to turn off or delete the archive before it grows.
How Recall Snapshots Work on Your PC
Your device keeps a short visual log of activity. It saves a new image when what’s visible changes and at a frequent cadence—reports note captures can occur roughly every five seconds during activity bursts.
What triggers a capture
Switching apps, opening new tabs, or changing windows causes a snapshot to be written. Scrolling or replacing on-screen content can also prompt a save.
How text and meaning become searchable
The system runs local OCR to turn visible text into searchable words. That means chats, account info, and project names can become indexed as information on your device.
Semantic indexing then groups images by meaning, and an on-disk vector database links similar entries so you can find items by idea, not just exact keywords.
Timeline, search, and Click to Do
You browse a timeline and can search by text or by visual matches. Filters let you narrow results by app or time so someone could quickly reconstruct activity.
Click to Do sits on saved images and can copy text or reopen pages in apps. Note that sending content outward can create extra traces beyond the local archive.
Control points to remember: toggles for saving snapshots, app/site exclusions, sensitive-information filters, and deletion/reset tools let you limit exposure.
Check If Recall Is Installed and Recall Enabled on Your Device
First, confirm whether the feature is present before you change anything. Open Settings and look in the Privacy & security section for a control labeled Recall & snapshots. This tells you if the snapshot service is installed on your machine.
If the entry exists, open it and check the Save snapshots toggle to see whether the system is currently saving captures. Note the toggle state so you have a baseline for later steps.

Use Start search to confirm the app
As a second check, press Start and type Recall. If an app result appears, the app is installed even if you never opened its settings.
Why Optional updates matter
If you meet the hardware and OS requirements but don’t see the feature, open Settings → Windows Update → Optional updates. The tool is often shipped as an optional package before it reaches all users by default.
- You get a quick workflow to confirm presence and whether snapshot saving is active.
- Looking under Recall & snapshots avoids confusing this control with other history features.
- Check Start search for a fast second confirmation of installation.
- Monitor Optional updates so you can decide before installing the package on your device.
Copilot+ PC Requirements That Affect Your Privacy and Security
Only high-end Copilot+ pcs with certain NPUs, RAM, and disk space will create and store snapshots. That gate keeps most machines from running the feature at all.
- Secured-core Copilot+ system with a 40 TOPs NPU, 16 GB RAM, and 256 GB base storage.
- At least 50 GB free to enable snapshot saving; saving pauses if free space falls under 25 GB.
- If your device does not meet these requirements, the feature simply won’t run.
Why device encryption and BitLocker are mandatory
The snapshots and the on-disk index live in an encrypted database. BitLocker or Device Encryption protects that database at rest to reduce risk from lost or stolen drives.
What Windows Hello Enhanced sign-in protects — and what it doesn’t
Microsoft requires Windows Hello Enhanced (ESS) with at least one biometric. ESS enforces authentication and enables just-in-time decryption so you must authenticate to open the timeline or change settings.
Practical takeaway: these controls raise security, but they do not stop an attacker with an active, authenticated session or stolen credentials. Later sections show the exact toggles you should check: encryption status, Windows Hello enrollment, and snapshot filters.
windows recall privacy: What Data Can Be Captured and What Can Leak
Anything visible on your screen can become part of a local timeline—no special label required. If content appears while the snapshot service runs, it can be captured, indexed, and later searched.
Sensitive information that can still show up
Passwords, one-time codes, and password-manager previews can appear in screenshots. Banking pages, invoices, tax forms, and medical portals are also at risk.
Independent testing found that full credit card numbers, expiration and CVC, plaintext password lists, bank balances, and Social Security numbers sometimes bypass the default filter.
“Filter sensitive information” limitations
The filter aims to hide obvious secrets, but it is not foolproof. Unlabeled numbers or unusual formats can slip through.
“Testing shows some highly sensitive data remains captured despite the enabled filter.”
Other personal data that can leak
Names, addresses, dates of birth, and project codenames may not be flagged as sensitive, yet they support identity theft or targeted attacks.
Third-party exposure and consent
You can also capture other people’s chats, documents, and files when they appear on your screen. Those users never consented to being stored in your timeline.
- Visual rule of thumb: if it’s on-screen, it can end up in snapshots.
- Common leak sources: password managers, banking pages, invoices, HR dashboards, and medical records.
- Mitigation preview: later sections show how to exclude apps and websites, pause captures, or remove the feature entirely.
Threat Model: Real-World Ways Recall Data Can Be Misused
Think like an attacker: a local timeline that indexes months of screen content becomes a single, high-value target.
Local attackers vs. remote session takeover
If someone gains physical access—stolen laptop or a malicious housemate—they can try to open your timeline or extract the indexed data. Biometric gating helps when a device is off, but it won’t stop an attacker who can operate an active session.
Remote access tools and session hijacking let an intruder browse snapshots while you appear logged in. That makes your active desktop a live attack surface for discovery tools and data theft.
Why the snapshot database is a prime ransomware target
The on-disk archive compresses browsing, chats, and documents into one searchable database. Attackers value that because it proves what you viewed or worked on and raises extortion leverage beyond simple file encryption.
Policy drift and long-term exposure
Product and data-use statements change over time. Even if a vendor limits sharing today, future policy shifts or legal demands can broaden access. Minimizing collection reduces long-term risk.
- Practical model: weigh stolen-device, insider, and remote-session scenarios.
- Risk note: ransomware actors prize searchable snapshots.
- Action hint: next sections show the fastest steps to stop and remove captures in your settings.
Disable Recall Through System Settings (Fastest Option)
Disabling capture from system settings is the fastest way to halt new screenshots. You will stop future collection immediately by changing one toggle and then verify the change.
Turn off the Save snapshots toggle
Open Settings → Privacy & security → Recall & snapshots and toggle off the control labeled “Save snapshots.” This is the single-step method to disable recall on your device.
Pause snapshots temporarily and confirm the pause
Use the system tray icon to pause captures when you need a short privacy window (banking, medical pages, HR systems). Look for a slash on the tray icon and verify the timeline stops updating.
Keep the filter and tighten exclusions
Leave the sensitive filter enabled as a backup, but add exclusions for high-risk apps and websites first: password managers, payroll, finance, and client portals.
| Action | How to do it | What it stops |
|---|---|---|
| Disable capture | Settings → Privacy & security → Recall & snapshots → toggle off | Prevents future snapshots |
| Pause quickly | System tray icon → Pause until tomorrow | Short-term stop; resumes after authentication |
| Exclude apps/sites | Recall settings → App & website exclusions | Prevents listed content from being indexed |
Verify: confirm the settings page reflects the toggle and that the timeline no longer grows. Remember this stops new snapshots but does not delete images already stored.
Remove Recall Completely with Turn Windows Features On or Off
If you want the feature gone rather than merely paused, use the built-in feature removal tool to fully uninstall it.
When to remove: choose full removal if you do not want the module on your system at all. This reduces attack surface and prevents accidental re-enablement after updates.
To remove it, open Start and type Turn Windows features on or off. In that dialog, find Recall, uncheck the box, and restart your PC to complete the uninstall.
Uncheck Recall and restart to uninstall the feature
Unchecking the entry uninstalls the optional component. A restart finalizes file removal and configuration cleanup so the service no longer loads.
What happens to existing snapshots when Recall is removed
Microsoft documents that removing the feature deletes any snapshots previously saved by the tool. That differs from simply disabling snapshot saving in Settings, which leaves saved images on disk until you delete them.
- Verify removal: search Start for the app and check the Recall & snapshots settings entry; both should be gone or inactive after restart.
- Operational note: enterprise images or reinstall scripts may reintroduce the component. Watch major updates and optional feature installs.
- Cleanup hint: even after removal, search for exported or shared copies and confirm no backups contain snapshots.
| Action | Path | Result |
|---|---|---|
| Uninstall component | Start → Turn Windows features on or off → uncheck Recall → Restart | Removes module; stops service from running |
| Disable capture only | Settings → Privacy & security → Recall & snapshots → toggle off | Stops new snapshots; existing files remain |
| Post-removal check | Start search for Recall; open Settings entry | Confirms uninstall and deleted snapshots |
Delete Snapshots and Reduce Residual Risk After Disabling Recall
Turning the feature off is only the start. You must actively remove saved images to stop months of captured content from becoming a future liability.
Delete snapshots from settings and search
Open the Recall settings and use the “…” menu to remove individual items. You can also delete snapshots directly from timeline or search results as you find sensitive entries.
Bulk-delete by app or website
When one source poses disproportionate risk — payroll, bank portals, or a password manager — use the bulk-delete option to remove all snapshots tied to that app or website. This is a fast way to remove many exposures at once.

Use Reset Recall to wipe the entire snapshot database and restore default settings. This deletes all stored images and is the clearest path when you cannot audit what was captured.
Watch for residual data and use third-party tools
Reset does not erase exported copies or content copied into other apps. Third-party tools like BCWipe Privacy Guard can monitor for silent re‑enablement and securely wipe the snapshot database if needed.
“Disabling collection reduces new risk — deleting stored snapshots removes the old risk.”
- Stop new captures first, then delete stored snapshots.
- Use bulk deletion by app/website for high-impact cleanup.
- Choose Reset when you need a full wipe and default restore.
- Consider third-party tools for monitoring and secure database erasure if your threat level is high.
Work, School, and Regulated Environments: What You Should Do Before IT Does
In managed organizations, system-level controls often decide what runs on your device before you do. That means your personal choices may differ from corporate defaults. If you use a device for work or school, assume some controls are set by admins and may be greyed out in settings.
How managed environments can restrict or remove the feature by policy
Microsoft says commercial and education fleets usually ship with the module removed until IT allows it. Administrators can also disable saving snapshots, set disk and time limits, and define excluded apps and websites.
Group Policy path to disable system-wide captures
If you need to validate policy, the common Group Policy path is:
- User Configuration → Administrative Templates → Windows Components → Windows AI → “Allow Recall to be enabled” → Disabled.
This setting prevents the feature from being enabled for affected users and scopes. Note: per Microsoft, admins cannot turn on snapshot saving without an individual opting in.
Why this creates compliance and investigation risk
Recall can capture anything shown on screen. That includes client NDAs, case notes, patient portals, and financial dashboards. Such captures can create retention and disclosure problems under regulation and during legal discovery.
“If the tool exists on a work device, legal or security teams may request its data during an incident.”
Before you enable or challenge a policy, ask IT these questions: Is the feature allowed? Is snapshot saving permitted? What retention limits and deletion audits apply? Document their answers.
- Do not assume personal settings apply on managed machines.
- Verify policy enforcement via the Group Policy path above.
- Minimize on-screen exposure for confidential work to reduce data and information risk.
Practical final note: treat on-screen captures as potential records. Keep collection minimal, track decisions, and insist on documented safeguards when you must use the device for regulated work.
Conclusion
This feature can make a routine screen session into a lasting, searchable record you should control.
Core takeaway: recall is optional, requires opt-in for saving snapshots, and uses encryption plus Windows Hello for access. Those protections raise security but do not stop all sensitive content from being captured.
For most readers the safest path is simple: disable snapshot saving in settings, remove the recall module if you do not need it, and then delete or reset any stored images.
Before you finish, verify installation, confirm toggle states, apply app and site exclusions if you keep the feature, and delete old snapshots. If you use a shared or regulated device, choose removal, strict policy controls, or third‑party wiping.
Act now: follow the steps in this guide so your timeline does not become weeks or months of searchable personal data.
FAQ
What is this new screen-capture and search feature, and why are experts warning about it?
It’s a built-in tool that continuously captures screen snapshots, indexes text and images, and makes them searchable on your device. Security specialists warn because that database can contain sensitive content—passwords, credit card numbers, and private conversations—and becomes a high-value target if an attacker gets local or admin access.
How often are snapshots taken and what triggers a capture?
Captures happen when significant on-screen changes occur, like opening an app, navigating a web page, or switching windows. The system uses change detection rather than constant video, but frequency depends on activity and hardware thresholds set by the device.
Where does the system store the indexed data and how is it protected?
The feature stores a compact on-disk index and vector database alongside snapshot files. Encryption such as device-level encryption or BitLocker is required on supported devices to protect that store; without it, files are easier to access if someone gains file-system or physical access.
Can the built-in filters reliably remove sensitive items like credit card numbers and passwords?
No filter is perfect. The tool includes filters for patterns such as credit cards and personal identifiers, but independent tests show some false negatives. You should not rely solely on automatic redaction for highly sensitive workflows.
How can you check whether the feature is installed and currently enabled on your machine?
Look for the “Recall & snapshots” entry in Settings → Privacy & security, and use Start menu search to confirm the app exists. Optional Windows updates can also add the feature later, so check after major updates.
If I disable the feature in Settings, are snapshots still being saved anywhere?
Turning off “Save snapshots” stops new captures, but existing snapshots remain unless you delete them. Pause controls exist for temporary stops, but you should verify by checking the snapshot database or performing a manual delete to remove residual data.
How do I completely remove the feature from my device?
Use Turn Windows Features On or Off to uncheck the component and restart. That removes the app, though you should follow up by deleting any remaining snapshot files and indexes to reduce residual risk.
What happens to stored snapshots when the feature is uninstalled or reset?
Uninstalling the component typically stops future captures, but files often persist on disk. Use the app’s delete options, bulk-delete by app/website, or a full Reset of the feature to wipe databases. Consider secure file-deletion tools if you need stronger guarantees.
Which hardware or account requirements change how data is handled?
Devices with Copilot+ PC requirements, device encryption, and secure sign-in like Windows Hello Enhanced have stricter rules for storing and encrypting snapshots. Lack of these protections can mean snapshots are stored without the same protections, increasing exposure.
Could snapshots capture content belonging to other people and create legal or consent problems?
Yes. The tool can capture chats, shared documents, and third-party content. In workplaces or meetings, that may violate consent, contractual, or regulatory obligations. Treat captured content as broadly accessible until you delete or protect it.
What are realistic attacker scenarios involving the snapshot database?
Local attackers with physical access, malware running with elevated rights, or ransomware that targets the index can exfiltrate or encrypt captured content. Remote session hijacking or admin abuse can also expose the database, making it a high-value target.
How can IT teams block or remove the feature across managed devices?
Administrators can use Group Policy or endpoint management tools to disable the component, uninstall it, or prevent it from being provisioned. Policies also help ensure the feature never runs on systems handling regulated or confidential data.
Are there practical steps you should take now to reduce risk on personal or work devices?
Turn off “Save snapshots,” pause captures during sensitive tasks, and delete the snapshot database. Enable device encryption and strong sign-in protections. On managed machines, coordinate with IT to apply policy controls and audit whether the feature is present after updates.
When are third-party privacy tools helpful, and which tasks should they handle?
Use privacy tools to monitor re-enablement, detect new snapshot files, and securely wipe residual databases. They can also alert you if an update reinstalls the component and automate deletion of captured content tied to sensitive apps or sites.