{"id":82254,"date":"2018-05-01T09:00:40","date_gmt":"2018-05-01T16:00:40","guid":{"rendered":"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/?p=82254"},"modified":"2023-05-15T23:01:36","modified_gmt":"2023-05-16T06:01:36","slug":"first-things-first-envisioning-your-security-deployment","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/05\/01\/first-things-first-envisioning-your-security-deployment\/","title":{"rendered":"First things first: Envisioning your security deployment"},"content":{"rendered":"
<\/p>\n
This blog post is part of a series that responds to common questions we receive from customers about deployment of Microsoft 365 Security solutions. In this series you\u2019ll find context, answers, and guidance for deployment and driving adoption within your organization. Check out our last blog Accelerate your security deployment with FastTrack for Microsoft 365<\/a>.<\/em><\/p>\n Every successful project begins with a planning phase \u2013 and planning a successful Microsoft 365 Security deployment is no different. Before digging into \u201chow\u201d you will roll out your new security infrastructure, start by asking \u201cwhat\u201d you want to achieve from both a business and technical standpoint. We will cover how to Onboard with FastTrack for Microsoft 365<\/em> in our next blog post.<\/p>\n Do all end users need anytime, anyplace access of data? Do they require access across all devices, or just selected devices? What data do you need to protect? Are different levels of security required for different users or groups? What about compliance considerations and company policies? Do you want your partners and customers to have secure access? This may not even be an option if government regulations restrict what controls you need to put in place.<\/p>\n FastTrack for Microsoft 365<\/a> can help work through these and other critical security planning considerations. FastTrack provides end to end guidance for planning, onboarding, and driving end user adoption for Microsoft 365 which is comprised of Enterprise Mobility + Security (EMS), Windows 10, and Office 365.<\/p>\n Based on thousands of customer experiences, we developed a three-step planning approach: Envision, Onboard, and Drive Value<\/strong>. The Envisioning phase can help you lay the groundwork for an effective security deployment plan.<\/p>\n <\/p>\n Envisioning is a systematic way to match Microsoft 365 Security features with relevant company goals. It involves identifying and prioritizing relevant scenarios while learning about the tools and resources available as you plan for your rollout. In many ways, this stage is the most critical part of your journey, as you\u2019re setting the business goals you\u2019ll measure your success against later.<\/p>\n The following checklist provides a few tips that our FastTrack for Microsoft 365 managers and engineers use to help you get your Envision<\/strong> step underway.<\/p>\n As you\u2019ll discover, Envisioning can quickly add clarity and focus to an otherwise complex security roll-out. Ready to kick off a successful Envisioning process? Check out the FastTrack Envision checklist<\/a>.<\/p>\n Our FastTrack Success Plan<\/a> is an online tool that walks you through each step of your Envisioning experience. The Success Plan can be launched by either you or your Microsoft Partner and provides all the guidance and resources you need to plan a successful Microsoft 365 Security deployment. Once completed, the plan also provides you with a clear path to help you get the most out of your FastTrack services. To get started, simply sign in to FastTrack<\/a>.<\/p>\n More blog posts from this series:<\/em><\/p>\n This blog post is part of a series that responds to common questions we receive from customers about deployment of Microsoft 365 Security solutions. In this series you\u2019ll find context, answers, and guidance for deployment and driving adoption within your organization. Check out our last blog Accelerate your security deployment with FastTrack for Microsoft 365. […]<\/p>\n","protected":false},"author":61,"featured_media":85795,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3662],"topic":[3684],"products":[],"threat-intelligence":[],"tags":[3822],"coauthors":[1868],"class_list":["post-82254","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-news","topic-security-operations","tag-microsoft-security-insights"],"yoast_head":"\nYour envisioning checklist<\/h3>\n
\n
\nDecide what specific products and feature sets you want to enable and why by understanding what they will do for your company and your end users. Here are some examples:<\/p>\n\n
\n
\n
\nDefine the minimum requirements to deploy and determine if those requirements will work on your legacy architecture. You can find product videos, infographics, and demos at Microsoft Docs<\/a> and FastTrack resources<\/a>.<\/li>\n
\nDetermine who will lead your organization\u2019s various teams and departments in this transformation, which employees will need special training based on how the new security tools affect their work, and who will own deployment and ongoing operations. FastTrack will use this information to identify the context of your deployment as it maps to your employees.<\/li>\n<\/ul>\nStart with a success plan<\/h2>\n
\n\n