Best practices define practices and procedures that build a consistent environment that is secure while still being useful. The key to sound security practices is to design them to enhance business practices rather than inhibit them. Policies and practices that are too difficult or onerous do not contribute to a secure environment, they encourage "cheating", which is to say that people will find ways to do those things that they need to do accomplish the tasks they have been assigned.
On the other hand, if careful thought is given to practices and procedures that are specifically designed for the environment, they will not only enhance security, they will not get in the way of the business mission, which is, after all, the purpose behind it all.
The server and workstation best practices linked here have been designed to enhance security here at UT Dallas. In principle, they could be used in other environments, because they are based on sound security practices, however they were designed for UT Dallas and that is where they will work best. Following them should result in an environment that is noticeably more secure than one that accepts manufacturers' default settings. Furthermore, much within them can be automated using tools and services provided by UT Dallas Information Resources department.