Summary
In this chapter, you learned about the use of User Account Control to prevent unwanted programs, such as malware, from being installed on a computer. You learned about the two types of elevation prompts and also learned how to configure UAC notifications.
Furthermore, you learned what threat protection is and what types of threat protection there are. Using many of the built-in Windows Defender features makes your computer much safer. You learned what the security baselines are and how you can implement them. To protect company information, you can use Windows Information Protection.
Another form of security that you can implement is encryption. In this chapter, you learned about BitLocker and Encrypted File System. More organizations are embracing BitLocker rather than EFS, but EFS is not a bad choice.
The last thing you learned about is how AppLocker works and how you can configure AppLocker with specific application-independent rules.
In the next chapter, you...