Topic last updated—November 2007

Use the following best practices for desired configuration management in Configuration Manager 2007.

Note
For best practices relating to security and desired configuration management, see Desired Configuration Management Security Best Practices and Privacy Information.

See Also