At the perimeter of our environments reside our workstations. As part of a secure environment, we should know the approaches that harden the systems of our end users.