If security is a concern then you need to dump the 98 boxes. There is no security built into it, you can bypass login by hitting escape!
Upgrade all of your Mac clients to the latest OS. Your older Macs won't play well, but the OS X machines can actually be joined to the domain.
1. Open '/Applications/Utilities/Directory Access.app.
2. Enable the Active Directory service.
3. Configure the Active Directory service as follows:
Active Directory forest -- 'example.com'
Active Directory domain -- 'example.com' or
'childdomain.example.com'
Computer ID -- Enter the host name of the computer.
Cache last user logon for offline operation -- Checked.
Authenticate in multiple domains -- Depends on whether you
want to allow cross-domain authentication.
Prefer this domain server -- Unfortunately, until the computer
account has time to replicate to all domain controllers in
the domain, configure the client to only communicate with one
of the domain controllers, e.g. 'dc1.example.com'.
Map UID to attribute -- NOT checked. I haven't figured out
how to make this work without extending the Active Directory
schema. If you already use Services for Unix, you can map
the UID to the 'uid' attribute (created by SFU's NIS
component).
Allow administration by -- For example, 'EXAMPLE\Domain Admins'.
4. Click the Bind button, enter the user name and password of
someone who has rights to create computer accounts in Active
Directory, and change the OU to where you want the account
created,
e.g. OU=SBSComputers,OU=Computers,OU=MyBusiness,DC=example,DC=com
(for those of us running Windows Small Business Server 2003).
5. Change the authentication search path to 'Custom path' and add
'/Active Directory/example.com'.
6. Restart the computer.
I hope you find this post helpful.
Regards,
Mark