MBAM 2.5 planning checklist
Use the following checklist to help you prepare your computing environment for the Microsoft BitLocker Administration and Monitoring (MBAM) deployment. The checklists provide a high-level list of items to consider when planning the deployment. You might want to copy the desired checklist into a spreadsheet and customize it for your use.
Check | Task | References | Notes |
---|---|---|---|
To understand the product before you start deployment planning, review the getting started information. | About MBAM 2.5 SP1 | ||
Review the recommended high-level architecture for an MBAM deployment. You might also want to review an illustration and description of the databases, websites, and reports of an MBAM deployment. | High-level architecture for MBAM 2.5 Illustrated features of an MBAM 2.5 deployment |
||
Review and complete the prerequisites for the MBAM stand-alone and Configuration Manager integration topologies. | MBAM 2.5 server prerequisites for stand-alone and Configuration Manager integration topologies | ||
If you plan to use the Configuration Manager integration topology, complete the other prerequisites that apply only to this topology. | MBAM 2.5 server prerequisites that apply only to the Configuration Manager integration topology | ||
Review and meet the MBAM 2.5 prerequisites for the MBAM client. | Prerequisites for MBAM 2.5 clients | ||
Plan for and configure MBAM group policy requirements. | Planning for MBAM 2.5 group policy requirements | ||
Plan for and create the necessary Active Directory Domain Services security groups. | Planning for MBAM 2.5 groups and accounts | ||
Plan how to secure the MBAM websites. | Planning how to secure the MBAM websites | ||
Review the MBAM Supported Configurations to ensure that your hardware meets the installation system requirements. | MBAM 2.5 supported configurations | ||
Review the considerations for deploying the MBAM slient features. | Planning for MBAM 2.5 server deployment | ||
Review the considerations for deploying the MBAM client. | Planning for MBAM 2.5 client deployment | ||
Review the requirements and steps to deploy MBAM in a highly available configuration. | Planning for MBAM 2.5 high availability | ||
Review the MBAM security considerations that pertain to the Trusted Platform Module (TPM), log files, and transparent data encryption. | MBAM 2.5 security considerations | ||
Optionally, review the steps to evaluate MBAM in a test environment. | Evaluating MBAM 2.5 in a test environment |