In this chapter, we discussed the user profile files and system policies. The necessary instructions (a survival guide) on how to use system policies to introduce registry modifications were also provided were.