6.5 Use Anti-Exploit tools Install and use anti-exploit tools such as EMET (if applicable), or the exploit protection built into windows. 7.1 Enable BitLocker Enable BitLocker drive encryption for all ...