The Last Word

In this chapter, I've taken you through the various considerations of security in a network environment and then shown you how to implement a basic layer of security using tools built in to Windows Server 2008 or that are freely available. Recall that I mentioned in the introductory section of this chapter that I didn't intend to present an exhaustive list of tweaks and settings to adjust to allow Windows Server 2008 to be at its most secure. Rather, I've given you a comprehensive foundation so that you can build on the concepts and procedures you learned in this chapter to create a secure infrastructure around your servers.

Get Windows Server 2008: The Definitive Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.