Summary
In this chapter, you learned the basics of the registry. The registry contains registry hives, keys, and values. You also learned about the different value types.
You also learned about configuring local policies, such as configuring the audit policy, to monitor, for example, failed login attempts. You also learned how to configure specific user rights to give users, for example, the right to change the system time. With configuring security options, you learned to allow or deny users access to specific sources, such as a CD-ROM drive.
With the implementation of account policies, you have learned how to configure a Password Policy for secure passwords and to configure an Account Lockout Policy to prevent brute-force attacks on a Windows 10 device.
In the next chapter, we will look at how we can secure data and applications within Windows 10 to make use of the features that Windows 10 offers.