MBAM 2.5 Planning Checklist
You can use the following checklists to help you prepare your computing environment for the Microsoft BitLocker Administration and Monitoring (MBAM) deployment. The checklists provide a high-level list of items to consider when planning the deployment. There are separate checklists for the Stand-alone topology and the Configuration Manager Integration topology. You might want to copy the desired checklist into a spreadsheet and customize it for your use.
Planning checklist for an MBAM deployment
Task | References | Notes | |
---|---|---|---|
![]() |
Review the "Getting started" information to understand the product before you start deployment planning. |
||
![]() |
Review the recommended high-level architecture for an MBAM deployment. You might also want to review an illustration and description of the individual parts (databases, websites, Reports) of an MBAM deployment. |
||
![]() |
Review and complete the prerequisites for the MBAM Stand-alone and Configuration Manager Integration topologies. |
MBAM 2.5 Server Prerequisites for Stand-alone and Configuration Manager Integration Topologies |
|
![]() |
If you plan to use the Configuration Manager Integration topology, complete the additional prerequisites that apply only to this topology. |
MBAM 2.5 Server Prerequisites that Apply Only to the Configuration Manager Integration Topology |
|
![]() |
Review and meet the MBAM 2.5 prerequisites for the MBAM Client. |
||
![]() |
Plan for and configure MBAM Group Policy requirements. |
||
![]() |
Plan for and create the necessary Active Directory Domain Services security groups. |
||
![]() |
Plan how you will secure the MBAM websites. |
||
![]() |
Review the MBAM Supported Configurations to ensure that your hardware meets the installation system requirements. |
||
![]() |
Review the considerations for deploying the MBAM Server features. |
||
![]() |
Review the considerations for deploying the MBAM Client. |
||
![]() |
Review the requirements and steps to deploy MBAM in a highly available configuration. |
||
![]() |
Review the MBAM security considerations that pertain to the Trusted Platform Module, log files, and transparent data encryption. |
||
![]() |
Optionally, review the steps to evaluate MBAM in a test environment. |
Related topics
Got a suggestion for MBAM?
For MBAM issues, use the MBAM TechNet Forum.