The goal of this chapter was to provide you with a few options and frameworks to monitor and audit your Microsoft server environment. The options provided here do not replace a monitoring or auditing solution. This can be used as a supplement to the existing options you may have in your environment. I believe I have provided you with a basic idea for proactively monitoring server infrastructure; it is now up to you to expand this basic idea to achieve the goal, based on your business and technical requirements.
As mentioned earlier in this book, security is a broad term and it has different interpretations, based on the point of view. In this book, I have provided a solid foundation for server security. I would encourage you to use this book and techniques mentioned in the book as a starting point, when considering security in your server infrastructure. I don't believe an administrator can create a security solution by just considering or learning technical details. He or she must...