In every corporate environment, we see all the endpoints provided to the users use the Windows operating system. The likelihood of exploiting Windows is always high due to the usage. In this section, we will focus on some of the specific Windows operating system security controls and how to bypass them post access to the endpoint.