Question: You are a security administrator responsible for providing secure configuration requirements for new laptop deployments. After reading Module 2 of Certified Secure Computer User v2exercises, apply the configuration settings below on your Windows® or Mac® computer and take screenshots of each step:
Windows:
1. Lock system when not in use
2. Create and change user account password
3. Disable Guest Account
4. Enable Automatic Software Updates
5. Enable Firewall
6. Create a New Firewall Rule
7. Turn on Windows Defender
8. Enable bitlocker
9. Decrypt file using EFS
10. Disable Unnecessary Services
Paste screenshots into a Microsoft® Word document to demonstrate you applied the configurations.
Write a 1-page explanation on how and why these settings create a secure operating system.