Jaa


MBAM 2.5 Planning Checklist

Tuotteet: Microsoft BitLocker Administration and Monitoring 2.5

You can use the following checklists to help you prepare your computing environment for the Microsoft BitLocker Administration and Monitoring (MBAM) deployment. The checklists provide a high-level list of items to consider when planning the deployment. There are separate checklists for the Stand-alone topology and the Configuration Manager Integration topology. You might want to copy the desired checklist into a spreadsheet and customize it for your use.

Planning checklist for an MBAM deployment

  Task References Notes
Valintaluetteloruutu

Review the "Getting started" information to understand the product before you start deployment planning.

Getting Started with MBAM 2.5

Valintaluetteloruutu

Review the recommended high-level architecture for an MBAM deployment. You might also want to review an illustration and description of the individual parts (databases, websites, Reports) of an MBAM deployment.

High-Level Architecture for MBAM 2.5

Illustrated Features of an MBAM 2.5 Deployment

Valintaluetteloruutu

Review and complete the prerequisites for the MBAM Stand-alone and Configuration Manager Integration topologies.

MBAM 2.5 Server Prerequisites for Stand-alone and Configuration Manager Integration Topologies

Valintaluetteloruutu

If you plan to use the Configuration Manager Integration topology, complete the additional prerequisites that apply only to this topology.

MBAM 2.5 Server Prerequisites that Apply Only to the Configuration Manager Integration Topology

Valintaluetteloruutu

Review and meet the prerequisites for the MBAM Client.

Prerequisites for MBAM 2.5 Clients

Valintaluetteloruutu

Plan for and configure MBAM Group Policy requirements.

Planning for MBAM 2.5 Group Policy Requirements

Valintaluetteloruutu

Plan for and create the necessary Active Directory Domain Services security groups.

Planning for MBAM 2.5 Groups and Accounts

Valintaluetteloruutu

Plan how you will secure the MBAM websites.

Planning How to Secure the MBAM Websites

Valintaluetteloruutu

Review the MBAM Supported Configurations to ensure that your hardware meets the installation system requirements.

MBAM 2.5 Supported Configurations

Valintaluetteloruutu

Review the considerations for deploying the MBAM Server features.

Planning for MBAM 2.5 Server Deployment

Valintaluetteloruutu

Review the considerations for deploying the MBAM Client.

Planning for MBAM 2.5 Client Deployment

Valintaluetteloruutu

Review the requirements and steps to deploy MBAM in a highly available configuration.

Planning for MBAM 2.5 High Availability

Valintaluetteloruutu

Review the MBAM security considerations that pertain to the Trusted Platform Module, log files, and transparent data encryption.

MBAM 2.5 Security Considerations

Valintaluetteloruutu

Optionally, review the steps to evaluate MBAM in a test environment.

Evaluating MBAM 2.5 in a Test Environment

Got a suggestion for MBAM?

Add or vote on suggestions here. For MBAM issues, use the MBAM TechNet Forum.

Katso myös:

Muita resursseja

Planning for MBAM 2.5