You need to ensure that in the future, other services that fail do not result in the same type of failure
You need to maintain the ability to run the legacy applications on the terminal servers when the new security requirement is implemented
You need to ensure that all client computers receive valid IP addresses for their subnet even during times of high network usage
You need to ensure that all computers receive security updates, and you must reduce bandwidth requirements