10.4. Final Thoughts

The cake might be yummy, but we appreciate the frosting first.

In this chapter, we added some frosting to our already hearty secure and managed desktop cake. We used Hardware Control to keep the bad devices off our network, ensured that users had Printers exactly when they needed them, and made sure we could recover user's junk, I mean, files, using Shadow Copies.

And we did a lot of it using the new Group Policy Preference Extensions. If you haven't gotten your head around all the ins and outs of those, be sure to check out Chapter 10 of the companion book, Group Policy Fundamentals, Security, and Troubleshooting, where we give them the full treatment.

In if at this point, you still aren't feeling secure enough, prepare ...

Get Creating the Secure Managed Desktop: Using Group Policy, SoftGrid, Microsoft Deployment Toolkit, and Other Management Tools now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.