Summary
Since installed applications can change the state of the server, maintaining the integrity and security can be a challenge for any organization. In this chapter, you have gone through a few options to secure popular application services such as file, print, and virtual servers. The method of classifying your application server components into server type, operating system, access mechanism, and data can apply to any server, regardless of which application you are using on the server. The methods mentioned in the chapter can be used as a general guideline for your application security requirement. It is always recommended to validate your security policies in an isolated development environment prior to implementing in production.
The next chapters in this book will provide methods for securing Microsoft network services-related components such as Active Directory, Domain Name Service, Dynamic Host Configuration Protocol (DHCP), and so on.