

If you are using disk encryption software, then you might need to modify your organization's policies to address the capabilities of BitLocker. If your organization is not currently using disk encryption software, none of these policies will exist. Begin by reviewing your existing corporate security policies as they relate to disk encryption software. Conduct an informal audit to define your current policies, procedures, and hardware environment. To plan your enterprise deployment of BitLocker, you must first understand your current environment. The following topics will help you collect information that you can use to frame your decision-making process about deploying and managing BitLocker systems. When you design your BitLocker deployment strategy, define the appropriate policies and configuration requirements based on the business requirements of your organization.

This topic for the IT professional explains how can you plan your BitLocker deployment.
