10.6. Deploying Virus Protection
Now that you have a good idea of how viruses work and what tools are available to prevent infection, let's take a look at some deployment methods to safeguard your network.
These suggestions should only be considered a guide; feel free to make modifications that better fit your specific needs.
The network diagram in Figure 10.1 shows a mixed environment that uses a number of different server operating systems. The desktop environment utilizes a mixture of operating systems, as well. Let's assume that you are consulting for the organization that owns this environment and you have been charged with protecting it from viruses, as well as Trojans and worms. You have also been asked to perform this task with ...