This session looks at some different social engineering and physical attacks on the Windows stack and also provides guidance on how to mitigate these attacks. The session covers several different social, engineering, and physical attacks and shows mitigations through configuration.