MBAM 2.5 planning checklist
Use the following checklist to help you prepare your computing environment for the Microsoft BitLocker Administration and Monitoring (MBAM) deployment. The checklists provide a high-level list of items to consider when planning the deployment. You might want to copy the desired checklist into a spreadsheet and customize it for your use.
Check | Task | References | Notes |
---|---|---|---|
![]() |
To understand the product before you start deployment planning, review the getting started information. | About MBAM 2.5 SP1 | |
![]() |
Review the recommended high-level architecture for an MBAM deployment. You might also want to review an illustration and description of the databases, websites, and reports of an MBAM deployment. | High-level architecture for MBAM 2.5 Illustrated features of an MBAM 2.5 deployment |
|
![]() |
Review and complete the prerequisites for the MBAM stand-alone and Configuration Manager integration topologies. | MBAM 2.5 server prerequisites for stand-alone and Configuration Manager integration topologies | |
![]() |
If you plan to use the Configuration Manager integration topology, complete the other prerequisites that apply only to this topology. | MBAM 2.5 server prerequisites that apply only to the Configuration Manager integration topology | |
![]() |
Review and meet the MBAM 2.5 prerequisites for the MBAM client. | Prerequisites for MBAM 2.5 clients | |
![]() |
Plan for and configure MBAM group policy requirements. | Planning for MBAM 2.5 group policy requirements | |
![]() |
Plan for and create the necessary Active Directory Domain Services security groups. | Planning for MBAM 2.5 groups and accounts | |
![]() |
Plan how to secure the MBAM websites. | Planning how to secure the MBAM websites | |
![]() |
Review the MBAM Supported Configurations to ensure that your hardware meets the installation system requirements. | MBAM 2.5 supported configurations | |
![]() |
Review the considerations for deploying the MBAM slient features. | Planning for MBAM 2.5 server deployment | |
![]() |
Review the considerations for deploying the MBAM client. | Planning for MBAM 2.5 client deployment | |
![]() |
Review the requirements and steps to deploy MBAM in a highly available configuration. | Planning for MBAM 2.5 high availability | |
![]() |
Review the MBAM security considerations that pertain to the Trusted Platform Module (TPM), log files, and transparent data encryption. | MBAM 2.5 security considerations | |
![]() |
Optionally, review the steps to evaluate MBAM in a test environment. | Evaluating MBAM 2.5 in a test environment |