Five phases from first DNS query to full SD-WAN rollout. Each phase includes key tasks, realistic timelines, watch-outs from real deployments, and clear success criteria. Print it, pin it to your wall, check things off.
Printable PDF version
Same content, formatted for print. One page per phase.
Deploy cloud DNS resolution to block malicious and unwanted domains before any connection is established. This is the lowest-friction first step — no TLS decryption, no agent required, no user-visible changes.
Create allow-list for business-critical domains that might be miscategorized
Enable DNS query logging to establish a baseline of your traffic patterns
Watch out
!Split-horizon DNS for internal domains — make sure internal .corp or .local zones still resolve internally
!DNS-over-HTTPS (DoH) in browsers can bypass your DNS resolver — consider blocking DoH endpoints or deploying agents
+
SUCCESSAll DNS queries route through SASE, malicious domain blocks are active, zero user-reported breakage.
02
SWG web inspection
1 – 3 weeks
Deploy the Secure Web Gateway with TLS decryption to inspect web traffic inline. This gives you URL filtering, malware scanning, and visibility into encrypted traffic.
Deploy endpoint agents (or PAC files for agentless) to route web traffic through the SWG proxy
Roll out TLS decryption with a custom root CA — push via MDM/GPO to managed devices
Start in monitor-only mode for 1–2 weeks to identify false positives before enforcing blocks
Build TLS bypass list: certificate-pinned apps, healthcare/finance portals, personal banking
Enable URL filtering policies: block high-risk categories, warn on uncategorized
Enable inline malware scanning and file type controls (block executables from unknown sources)
Watch out
!TLS decryption breaks certificate-pinned applications — build your bypass list before enforcement
!Expect 5-10% of sites to need bypass rules; track user-reported issues in a shared channel
!macOS and Linux require explicit root CA trust store configuration — test across all OS variants
+
SUCCESS80%+ web traffic inspected, TLS decryption active without major breakage, URL filtering enforced.
03
VPN to ZTNA migration
1 – 3 months
Replace VPN concentrators with Zero Trust Network Access. Start with low-risk internal web apps to build user confidence, then onboard critical applications.
Run shadow IT discovery for 2–4 weeks to identify all SaaS applications in use
Categorize discovered SaaS into sanctioned, tolerated, and unsanctioned tiers
Enable CASB inline controls: block uploads to unsanctioned cloud storage, enforce DRM on downloads
Connect API-based CASB to your sanctioned SaaS (Microsoft 365, Google Workspace, Salesforce)
Define DLP policies starting with high-confidence patterns: credit card numbers, SSNs, API keys
Start DLP in alert-only mode, review incidents for 2–3 weeks, then switch to block mode
Watch out
!DLP false positives erode user trust fast — start narrow with high-confidence patterns only
!API-based CASB requires OAuth app permissions in each SaaS tenant — get admin consent early
!Shadow IT discovery will surface 200–500+ SaaS apps — focus enforcement on the top 20 by usage
+
SUCCESSShadow IT visibility complete, DLP blocking active for top-3 data patterns, CASB controls on sanctioned SaaS.
05
SD-WAN rollout
3 – 6 months
Deploy SD-WAN at branch locations to replace or augment MPLS with application-aware routing, automated failover, and direct internet breakout for SaaS traffic.
Key tasks
Audit current MPLS contracts — identify renewal dates, bandwidth costs, and SLA terms
Deploy SD-WAN edge appliances at pilot branches (start with 3–5 sites, include one remote location)
Configure application-aware routing: direct-to-internet for SaaS (Microsoft 365, Salesforce), backhaul for internal
Set per-application SLA thresholds for latency, jitter, and packet loss with automatic failover
Establish dual-transport at each site: broadband + LTE/5G backup (or MPLS + broadband hybrid)
Monitor for 30 days, then begin MPLS reduction at sites where broadband SLA meets requirements
Watch out
!Do not decommission MPLS until SD-WAN has proven 30+ days of stable operation at each site
!Real-time applications (voice, video) need QoS policies with packet duplication or FEC enabled
!Zero-touch provisioning depends on reliable internet at branch — ship pre-staged for sites with poor connectivity
+
SUCCESSSD-WAN active at pilot branches, application SLAs met, MPLS reduction plan in progress.
Ready to evaluate vendors?
See how Cisco, Fortinet, Palo Alto, and Check Point stack up across all SASE components.