Entire books have been written on recommendations for securing the Windows desktop. This chapter briefly touched on some of the realistic implementations that a small business consultant can realistically and effectively do to help her clients better protect their desktops and, in turn, better protect the network. The basic protections of the network must be in place for the workstations as well:
And last but not leastcontrol. Control that includes input from the Human Resources Department for security policies first before the technological processes are put in place to enforce that control. Security of the desktops is a process that needs to be carefully discussed with the business owner and the best balance between business needs and business data protection found to fit the environment. |