Before launching an operation, complete these reconnaissance steps: - Identify backup systems and validate they can be reached - Map network topology and domain admin accounts - Locate and catalog high-value data stores - Verify encryption will cause maximum business impact - Confirm ability to exfiltrate data if needed