Summary

In this chapter, we've covered several of the components of Windows security. As stated earlier, this chapter was not intended to be a complete guide to configuring Windows systems but rather to provide the concepts and guidelines for setting up these systems. We've discussed how the Local Security Policy (and Group Policy Objects) can be used to implement security or augment the level of security on a system, as well as how other mechanisms can be used to configure Windows systems. By looking under the hood and seeing what goes on behind the scenes with the Local Security Policy, we've seen other mechanisms that can be employed to not only make modifications to our security settings, but also to review them on a regular basis to ensure ...

Get Windows Forensics and Incident Recovery now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.