We are the first to admit that security, while necessary, can be a pain to deal with and hard to implement correctly. All kinds of problems can result from improperly configuring your system's security. Vulnerabilities, threats, attacks, and risks are all issues to consider when designing your system's security. In general, the idea is to allow applications to run within a security context that meets its requirements and nothing more (referred to as "run with the least privileges"). You should not be running software under the domain admin account — this is a bad thing. This chapter focuses on the following topics:
Configuring Microsoft Operations Manager (MOM) security
Configuring Systems Management Server (SMS) security
Configuring Windows Server Update Services (WSUS) security
Configuring Windows Update (WU) security