Summary
Implementing policies as well as maintaining the desired state are important in ensuring the integrity of a secure server platform. We started this chapter by evaluating the server types, role, and generating a baseline report based on your requirements. In this chapter, I explained a method using a PowerShell script to monitor the installed roles on a server by comparing them with a baseline server. The latter part of the chapter introduced SMB 3.0 and an encryption method to ensure the data integrity in your environment.
We will be using SMB encryption in the next chapter for virtualization and file server data security. You should be able to leverage information provided in the previous chapters to implement and maintain a secure server infrastructure in your business environment. Now it is time for us to work on securing other application-related components and roles of Windows Server 2012. You will see these details in the coming chapters.