windows-itpro-docs/mdop/mbam-v25/planning-to-deploy-mbam-25.md
VSC-Service-Account 858476cf2f CI Update
2019-06-04 22:13:57 +00:00

2.7 KiB

title, description, author, ms.assetid, ms.reviewer, manager, ms.author, ms.pagetype, ms.mktglfcycl, ms.sitesec, ms.prod, ms.date
title description author ms.assetid ms.reviewer manager ms.author ms.pagetype ms.mktglfcycl ms.sitesec ms.prod ms.date
Planning to Deploy MBAM 2.5 Planning to Deploy MBAM 2.5 dansimp 1343b80c-d87a-42e7-b912-e84ba997d7e3 dansimp dansimp mdop, security manage library w10 06/16/2016

Planning to Deploy MBAM 2.5

You should consider a number of different deployment configurations and prerequisites before you create your deployment plan for Microsoft BitLocker Administration and Monitoring (MBAM). This section includes information that can help you gather the necessary information to formulate a deployment plan that best meets your business requirements.

Review the MBAM 2.5 supported configurations

After preparing your computing environment for the MBAM Server and Client feature deployment, make sure that you review the Supported Configurations to confirm that the computers on which you are installing MBAM meet the minimum hardware and operating system requirements. For more information about MBAM deployment prerequisites, see MBAM 2.5 Deployment Prerequisites.

MBAM 2.5 Supported Configurations

Plan for MBAM 2.5 Server and Client deployment

The MBAM Server infrastructure depends on a set of server features that can be configured on one or more server computers, based on the requirements of the enterprise. These features can be configured in a distributed configuration across multiple servers.

Note   An MBAM installation on a single server is recommended only for lab environments.

The MBAM Client enables administrators to enforce and monitor BitLocker drive encryption on computers in the enterprise. The BitLocker client can be integrated into an organization by deploying the client through an enterprise software delivery system or by installing the Client on client computers as part of the initial imaging process.

With MBAM, you can encrypt a computer in your organization either before the end user receives the computer, or afterwards by using Group Policy.

Planning for MBAM 2.5 Server Deployment

Planning for MBAM 2.5 Client Deployment

Other resources for MBAM planning

Planning for MBAM 2.5

Got a suggestion for MBAM?