IN PREVIOUS CHAPTERS, you learned about the Microsoft Windows Operating System and its many security features. You discovered how you can use different security controls in Windows to secure various aspects of computers and networks in a Windows environment. In this chapter, you'll learn how to apply what you've studied to make a computer running a Microsoft Windows Operating System more secure. You'll find out where you should focus your efforts for the most effective use of resources. You'll also learn how to ensure each computer is as secure as possible. You'll read as well how important a documented and repeatable process is when making computers more secure.