2.5 Given a scenario, manage and configure basic security settings in the Microsoft Windows OS 2.6 Given a scenario, configure a workstation to meet best practices for security