Open the following path: Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options ...
"By isolating the malware and its execution environment within a VM, the attackers effectively bypassed many traditional host ...