In this chapter, we discussed the user profile files and system policies. Also provided were the necessary instructions (a survival guide) on the use of system policies to introduce registry modifications.