The User Protection Module is designed to prevent hackers from illegally creating users and escalating user privileges, with different setup methods for Windows and Linux systems.
Friendly reminder: For Linux systems, please refrain from changing the default administrator username unless absolutely necessary.
1. Windows
a. Prohibit Creating New Users
Prevent the creation of new system users.
2. Lock User Groups
Prohibit adding users to locked user groups to prevent privilege escalation. It is generally recommended to lock the "administrators" group.

2. Linux
a. Lock /etc/passwd
After locking, it is impossible to create, modify, or delete users and user groups.
b. Lock /etc/group
After locking, it is impossible to create users or modify user groups.
c. Lock /etc/sudoers
After locking, /etc/sudoers cannot be modified, which can prevent hackers from using the sudo command to escalate privileges.