Summary
In this chapter, we looked at how we can secure our Windows infrastructure to reduce the risk of it being compromised by a ransomware attack. We learned what kind of security mechanisms we have available in the OS that are often overlooked and how these can be useful as additional security barriers in Windows.
Hopefully, the content of this book has provided you with valuable insight into the different attack vectors and what you can do to protect against them. I just hope that as few readers as possible encounter a ransomware attack and that many of these tips and services can be used as a foundation solution for your future security posture. Thanks for reading!