Summary
In our opening chapter, we have learned how the Configuration Manager sites interact with each other and how implementing sites in different scenarios can have an impact on the hierarchy. We have also seen how you can manage multiple forests, which are both trusted and un-trusted in an effective and secured manner.
To finish off, we also looked at an example design scenario and went through the steps involved in making sure our design is fit for purpose, is scalable, and is also highly available. In the next chapter, we will take our hierarchy one step further and look at securing the environment using certificates.