This chapter provided the information you need to ensure that all of your network management tools are properly secured. This helps alleviate a variety of problems, including unauthorized users installing updates for their local machines, MOM operators gaining access to information that they should not be privy to, and so on. To recap, we covered the following topics:
Now that you can rest a little easier knowing that your management tools are locked down, you should start to obtain some of the useful information that these products supply you with. The next chapter covers reporting capabilities for the Microsoft management products as well as an application that integrates data from MOM, SMS, and Active Directory.