Securing down and properly configuring restrictions on Windows servers, workstations and laptops has long been a pillar of best practices in cyber security. Yet almost every day we read or hear about ...