MBAM 2.5 Planning Checklist
You can use the following checklists to help you prepare your computing environment for the Microsoft BitLocker Administration and Monitoring (MBAM) deployment. The checklists provide a high-level list of items to consider when planning the deployment. There are separate checklists for the Stand-alone topology and the Configuration Manager Integration topology. You might want to copy the desired checklist into a spreadsheet and customize it for your use.
Planning checklist for an MBAM deployment
Task | References | Notes | |
---|---|---|---|
Review the "Getting started" information to understand the product before you start deployment planning. |
|||
Review the recommended high-level architecture for an MBAM deployment. You might also want to review an illustration and description of the individual parts (databases, websites, Reports) of an MBAM deployment. |
|||
Review and complete the prerequisites for the MBAM Stand-alone and Configuration Manager Integration topologies. |
MBAM 2.5 Server Prerequisites for Stand-alone and Configuration Manager Integration Topologies |
||
If you plan to use the Configuration Manager Integration topology, complete the additional prerequisites that apply only to this topology. |
MBAM 2.5 Server Prerequisites that Apply Only to the Configuration Manager Integration Topology |
||
Review and meet the MBAM 2.5 prerequisites for the MBAM Client. |
|||
Plan for and configure MBAM Group Policy requirements. |
|||
Plan for and create the necessary Active Directory Domain Services security groups. |
|||
Plan how you will secure the MBAM websites. |
|||
Review the MBAM Supported Configurations to ensure that your hardware meets the installation system requirements. |
|||
Review the considerations for deploying the MBAM Server features. |
|||
Review the considerations for deploying the MBAM Client. |
|||
Review the requirements and steps to deploy MBAM in a highly available configuration. |
|||
Review the MBAM security considerations that pertain to the Trusted Platform Module, log files, and transparent data encryption. |
|||
Optionally, review the steps to evaluate MBAM in a test environment. |
Related topics
Got a suggestion for MBAM?
For MBAM issues, use the MBAM TechNet Forum.