The cake might be yummy, but we appreciate the frosting first.
In this chapter, we added some frosting to our already hearty secure and managed desktop cake. We used Hardware Control to keep the bad devices off our network, ensured that users had Printers exactly when they needed them, and made sure we could recover user's junk, I mean, files, using Shadow Copies.
And we did a lot of it using the new Group Policy Preference Extensions. If you haven't gotten your head around all the ins and outs of those, be sure to check out Chapter 10 of the companion book, Group Policy Fundamentals, Security, and Troubleshooting, where we give them the full treatment.
In if at this point, you still aren't feeling secure enough, prepare ...