O'Reilly logo

Creating the Secure Managed Desktop: Using Group Policy, SoftGrid, Microsoft Deployment Toolkit, and Other Management Tools by Jeremy Moskowitz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

10.4. Final Thoughts

The cake might be yummy, but we appreciate the frosting first.

In this chapter, we added some frosting to our already hearty secure and managed desktop cake. We used Hardware Control to keep the bad devices off our network, ensured that users had Printers exactly when they needed them, and made sure we could recover user's junk, I mean, files, using Shadow Copies.

And we did a lot of it using the new Group Policy Preference Extensions. If you haven't gotten your head around all the ins and outs of those, be sure to check out Chapter 10 of the companion book, Group Policy Fundamentals, Security, and Troubleshooting, where we give them the full treatment.

In if at this point, you still aren't feeling secure enough, prepare ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required