Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Use the following checklist to help you prepare your computing environment for the Microsoft BitLocker Administration and Monitoring (MBAM) deployment. The checklists provide a high-level list of items to consider when planning the deployment. You might want to copy the desired checklist into a spreadsheet and customize it for your use.
| Check | Task | References | Notes |
|---|---|---|---|
|
To understand the product before you start deployment planning, review the getting started information. | About MBAM 2.5 SP1 | |
|
Review the recommended high-level architecture for an MBAM deployment. You might also want to review an illustration and description of the databases, websites, and reports of an MBAM deployment. | High-level architecture for MBAM 2.5 Illustrated features of an MBAM 2.5 deployment |
|
|
Review and complete the prerequisites for the MBAM stand-alone and Configuration Manager integration topologies. | MBAM 2.5 server prerequisites for stand-alone and Configuration Manager integration topologies | |
|
If you plan to use the Configuration Manager integration topology, complete the other prerequisites that apply only to this topology. | MBAM 2.5 server prerequisites that apply only to the Configuration Manager integration topology | |
|
Review and meet the MBAM 2.5 prerequisites for the MBAM client. | Prerequisites for MBAM 2.5 clients | |
|
Plan for and configure MBAM group policy requirements. | Planning for MBAM 2.5 group policy requirements | |
|
Plan for and create the necessary Active Directory Domain Services security groups. | Planning for MBAM 2.5 groups and accounts | |
|
Plan how to secure the MBAM websites. | Planning how to secure the MBAM websites | |
|
Review the MBAM Supported Configurations to ensure that your hardware meets the installation system requirements. | MBAM 2.5 supported configurations | |
|
Review the considerations for deploying the MBAM slient features. | Planning for MBAM 2.5 server deployment | |
|
Review the considerations for deploying the MBAM client. | Planning for MBAM 2.5 client deployment | |
|
Review the requirements and steps to deploy MBAM in a highly available configuration. | Planning for MBAM 2.5 high availability | |
|
Review the MBAM security considerations that pertain to the Trusted Platform Module (TPM), log files, and transparent data encryption. | MBAM 2.5 security considerations | |
|
Optionally, review the steps to evaluate MBAM in a test environment. | Evaluating MBAM 2.5 in a test environment |