{"id":82254,"date":"2018-05-01T09:00:40","date_gmt":"2018-05-01T16:00:40","guid":{"rendered":"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/?p=82254"},"modified":"2023-05-15T23:01:36","modified_gmt":"2023-05-16T06:01:36","slug":"first-things-first-envisioning-your-security-deployment","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/05\/01\/first-things-first-envisioning-your-security-deployment\/","title":{"rendered":"First things first: Envisioning your security deployment"},"content":{"rendered":"

\"Image<\/p>\n

This blog post is part of a series that responds to common questions we receive from customers about deployment of Microsoft 365 Security solutions. In this series you\u2019ll find context, answers, and guidance for deployment and driving adoption within your organization. Check out our last blog Accelerate your security deployment with FastTrack for Microsoft 365<\/a>.<\/em><\/p>\n

Every successful project begins with a planning phase \u2013 and planning a successful Microsoft 365 Security deployment is no different. Before digging into \u201chow\u201d you will roll out your new security infrastructure, start by asking \u201cwhat\u201d you want to achieve from both a business and technical standpoint. We will cover how to Onboard with FastTrack for Microsoft 365<\/em> in our next blog post.<\/p>\n

Do all end users need anytime, anyplace access of data? Do they require access across all devices, or just selected devices? What data do you need to protect? Are different levels of security required for different users or groups? What about compliance considerations and company policies? Do you want your partners and customers to have secure access? This may not even be an option if government regulations restrict what controls you need to put in place.<\/p>\n

FastTrack for Microsoft 365<\/a> can help work through these and other critical security planning considerations. FastTrack provides end to end guidance for planning, onboarding, and driving end user adoption for Microsoft 365 which is comprised of Enterprise Mobility + Security (EMS), Windows 10, and Office 365.<\/p>\n

Based on thousands of customer experiences, we developed a three-step planning approach: Envision, Onboard, and Drive Value<\/strong>. The Envisioning phase can help you lay the groundwork for an effective security deployment plan.<\/p>\n

\"\"<\/p>\n

Envisioning is a systematic way to match Microsoft 365 Security features with relevant company goals. It involves identifying and prioritizing relevant scenarios while learning about the tools and resources available as you plan for your rollout. In many ways, this stage is the most critical part of your journey, as you\u2019re setting the business goals you\u2019ll measure your success against later.<\/p>\n

Your envisioning checklist<\/h3>\n

The following checklist provides a few tips that our FastTrack for Microsoft 365 managers and engineers use to help you get your Envision<\/strong> step underway.<\/p>\n