In this section, you will lock down the user’s workstation by restricting the ability to change settings, and then deploying the updated package of security settings.
Steps 9 – 11:
________________________________________________________________________________