We've come a long way so far in this book. We've got our new machines deployed using WDS and Microsoft Deployment. We've set up Roaming Profiles, Redirected Folders, and Offline Files. We've deployed software using Group Policy Software Installation and SoftGrid. And, we've made sure unhealthy machines can't get on our network, with NAP.
We've made a pretty big cake. But no frosting.
Now it's time for what I like to call "the finishing touches."
In this chapter we'll cover three big topics which can round out your desktop experience:
Restricting Access to Hardware Want a way to ensure that only the hardware you sanction gets ...