Summary

Implementing policies as well as maintaining the desired state are important in ensuring the integrity of a secure server platform. We started this chapter by evaluating the server types, role, and generating a baseline report based on your requirements. In this chapter, I explained a method using a PowerShell script to monitor the installed roles on a server by comparing them with a baseline server. The latter part of the chapter introduced SMB 3.0 and an encryption method to ensure the data integrity in your environment.

We will be using SMB encryption in the next chapter for virtualization and file server data security. You should be able to leverage information provided in the previous chapters to implement and maintain a secure server ...

Get Getting Started with Windows Server Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.