You are on page 1of 163

Envisioning Phase

se

Summary Details for Assessment


Scenarios

Total Users

Network Incompatibility

Type

Compatible Desktops

Incompatible Desktops

Type

Compatible Applications

Incompatible Applications

Type

Assessment

Assessed Network Configuration


Domain Name

Domain Type

Network Protocols DNS Configuration

DHCP Configuration

sed Network Configuration


Number of Routers

Networked Domain

Network Bandwidth

Trust
Relationships

Users

Planned Network Configuration


Domain
Name

Domain
Type

Network DNS
Protocols Configuration

DHCP
Configuration

Number
of
Routers

Networked
Domain

Network
Bandwidth

Trust
Relationships

Users

Risks

Assessed Active Directory Configuration


Active
Directory
Site Name

Forest

Version

Mode

Namespace

IP Subnets

Servers

Intersite
Transports

n
Trust
Relationships

Users

Planned Active Directory Configuration


Active
Directory Site
Name

Forest

Version

Mode

Namespace

IP
Subnets

Servers

Intersite
Transports

ation
Trust
Relationships

Users

Risks

Assessed Server Roles

Server
Name

IP
Address

Domain

Server Operating Primary


System
Domain Role

Supplementary
Roles

Purchase Date
or Install Date

Network Link
Network Bandwidth
Speed to the
Availability to the
Domain Controller Domain Controller

Planned Server Roles


Server
Name

IP
Address

Domain

Server Operating
System

Primary
Domain
Role

Supplementary
Roles

Purchase Date
or Install Date

r Roles
Network Link Speed
to the Domain
Controller

Network Bandwidth Availability


to the Domain Controller

Risks

Assessed Desktop Configuration


Computer
Manufacturer

Computer
Model

CPU

RAM

CD Drive

DVD Drive

Display Type

onfiguration
Operating
System

Total

Planned Desktop Configuration


Computer
Manufacturer

Computer
Model

CPU

RAM

Total
Free Hard Number
Hard Disk Disk
of Disk
Space
Space
Drives

Number
of CD
Drives

p Configuration
Number
of DVD
Drives

Display
Type

Peripherals

Operating
System

Total

Risks

Assessed Applications
Application

Manufacturer

Version

Location

Type

Business
Use

Number
of Users

Install
Method

Assessed Applications
Standard
Operating
Environment

Application
Dependencies

Operating System
Dependencies

Compatibility

Configuration

Planned Applications
Application

Manufacturer

Version

Location

Type

Business
Use

Number
of Users

Install
Method

nned Applications
SOE

Application
Dependencies

Operating System
Dependencies
Compatibility

Configuration

Risks

Assessed Network Security


Password Policy
Maximum Age
Domain
Group Policy
Local Policy
Smart Card

Minimum Age

Length

Unique

Must Log On to Account


Change
Lockout

Lockout
Duration

Reset Count

Password
Change

Expired

Complexity

Planned Network Security


Maximum
Age
Domain
Group Policy
Local Policy
Smart Card

Minimum
Age
Length

Unique

Password Policy
Must Log
On to
Account
Change Lockout

Lockout
Duration

Security
Reset
Count

Password
Change

Expired

Complexity

Risks

Assessed User Profile


User
Profile

User
Group

Functional
Area

Function
Objective

Activities

Scenarios

Requirements

New Scenario

Data Gathering T
Tool

Manufacturer

Availability

Purpose

Limitations

Dependencies

Risks

Data Gathering Tools


Hardware
Requirements

Server
Network
Requirements Requirements

User
Interaction

Category Product

Phase

Training

Users

Migration Assessment
Product

Installation
Method

Method
Dependency

File
Storage

Total
Location Users

Risks

nt

Risk Assessment
Risk

Risk Description

Network

Desktop

Application

Operating
System

User

Business

Risk Level

Mediation

Deployment Team
Team

Position

Responsibility

Activity

Skill Required

Training
Required

Availability
Required

Location

ment Team
Team
Member

Support Plan
Area of
Support

Position

Responsibility

Activity

Skill Required

Training Availability
Required Required

Location

Team
Member

Communication Plan
Procedure

Area

Procedure Description

Secondary
Initial Contact Contact

Tracking

Tracker

Tool

Tool
Access

Risk Plan
Risk

Area

Description of Risk

Contingency
Plan

Tracking Tracker

Tracking Tool

Tool
Access

Rollback
Procedure

Area

Procedure
Description

Initial
Contact

Secondary
Contact
Tracking Tracker

Tool

Tool
Access

Tests

Tester

Sign-off

Tracking Database
Database
Type
Version

Size

Location Access

Administrator

Security

Schema

Information

Procedures

Planning Phase

Network Configuration

Domain
Name

Domain
Type

Network DNS
Protocols Configuration

Windows
Internet Naming
DHCP
Service (WINS)
Configuration Configuration
Router

etwork Configuration

Router
Location

Firewall
Location

Networked
Domain

Network
Bandwidth

Trust
Relationships

Users

Active Directory Con


Active
Directory Sites Forest

Version

Mode

Namespace

IP
Subnets

Servers

Active Directory Configuration


Intersite
Transports

Trust
Relationships

Users

Organizational Unit
(OU)
OU Description

Physical Site

Domain
Controller

Speed to
Forest
Root

Server Configuration
Server
Name

IP
Address

Domain

Server Operating
System

Supplementary
Primary Domain Role Roles

Server Configuration
Purchase Date or
Installation Date

Network Link Speed to the


Domain Controller

Network Bandwidth Availability to the Domain


Controller

Deskt
Computer
Manufacturer

Computer
Network
Computer Model Serial Number Location

Physical
Location

CPU

RAM

Desktop Configuration
Total
Free Hard Number
Hard Disk Disk
of Disk
Space
Space
Drives

Number
of CD
Drives

Number
of DVD
Drives

Display
Type

Peripherals

Operating
System

Incompatible
Drivers

New
Drivers

Group
Policy

Local
Policy

Windows Vista Deployment


Stored
Location

Installation
Location

Security

Migration
Method

Application
Dependencies

Incompatibility

ployment
Configuration

Computers to
Migrate To

Windows Vista Configurati


Domain

Location

Installation Method

Source Files Configuration Files

Domain

Location

Local Security Policy

Snap-in

Configuration
Settings

Protocol

Domain

Location

Machine Name

Computer
Serial
Number

Domain

Location

Machine Name

Disk Format Local Drives

Domain

Location

Machine Name

Desktop
Background Screen Saver

Domain

Location

Machine Name

Program
Menu

Accessories

Windows Vista Configuration


Drives

Configuration

Installation
Location

Remote User
Configuration

Wireless
Network
Group
Configuration Policy

Mapped Drives

Directories

Folders

Group
Policy

Appearance

Web

Effects

Display
Settings

Startup

Group Policy

Shortcuts

Group Policy

Microsoft Internet Explorer Configuration


General
Configuration

Home Page

Temporary
Internet Files History

User Group or OU This


Configuration Affects

Security
Configuration

Internet
Security

Security
Level

User Group or OU This


Configuration Affects

Content
Configuration

Content
Advisor

Certificates

Personal Information

User Group or OU This


Configuration Affects

Connections
Configuration

Connection
Setup

Dial-up
Settings

Local Area Network


(LAN) Settings

User Group or OU This


Configuration Affects

Programs
Configuration

E-mail
HTML Editor Program

Newsgroups

Internet Call

Advanced
Configuration

Accessibility Browsing

HTTP Settings

Microsoft Virtual
Machine (VM)

er Configuration

Contact
Calendar List

User Group or OU This


Configuration Affects

Multimedi
a
Printing

Address Bar Search

Security

User Group or OU This


Configuration Affects

2007 Microsoft Office System Deployment

Stored Location

Installation
Location

Security

Migration Method

Application
Dependencies

System Deployment

Incompatibility

Configuration

Computers to
Migrate To

2007 Office System Configuration


Domain

Location

Feature

Installation
State

Source Files

Shortcut

User Group or OU This


Configuration Affects

Additional Custom Files


to Install
Location

Shortcut

User Group or OU This


Configuration Affects

Logging

Location

User Group or OU This


Configuration Affects

User-Defined Setting

Configuration

User Group or OU This


Configuration Affects

Filename

Individual Data
Location
Shared Data Location

Domain

Location

Local Security Policy

Snap-in

Configuration
Configuration
Files
Drives

Configuration
Settings

Installation
Location

Office Outlook 2007 Configuration


Mode

User Group or OU
This Mode Affects

Filter

State

Filter
User Group or OU This
Configuration Filter Affects

User
Interface

Configuration

Registry
Setting

Feature

Installation State

User Group or
OU This
Configuration
Affects

Security
Template

Setting

User Group or OU This


Configuration Configuration Affects

User Group or OU This


Configuration Affects

Application Configuration
Applications to Be Migrated
Application

Manufacturer

Version

Stored
Location

Installation
Location

Security

Applications Not to Be Migrated


Application

Manufacturer

Version

Stored
Location

Migration
Retired Location Method

pplication Configuration
Migration
Method

Application
Dependencies

Application Files Substantiation

Incompatibility

Authorization

Configuration

Computers to
Migrate To

Network Security
Password Policy
Maximum Age

Minimum Age

Must Log On to
Change

Length

Unique

User and
Group
Management

Security Policy Restart,


Changes
Shutdown the
System

Domain

Logon/Logoff

File and Object User of User


Access
Rights

Group Policy

Policy
Configuration

User Group or
OU That Policy
Is Applied To

Local Policy

Policy
Configuration

User Group or
OU That Policy
Is Applied To

Smart Card

Policy
Configuration

User Group or
OU That Policy
Is Applied To

Network Security
Account
Lockout

Process
Tracking

Lockout
Duration

User Group or
OU That Policy
Is Applied To

Reset Count

Password
Change

Expired

Complexity

Migration Preparation
Task

Business Team
Contact Contact

Activities Information

Dependencies

Methods

Completion
Date

Tracking

Migration Stages
Stage

Actions

Dependencies

Data
Collection

Tools

Affected
Resources

Business
Location Unit

Stages
Business
Operations

Team
Start
Members Date

Completion
Date

Risks

Rollback

Team Members
Refer to the Envisioning Phase - Deployment Team worksheet for team roles and responsibilities.
Team
E-mail
Phone
Member Responsibility
Name
Address Contact

sponsibilities.

Installatio
Tool

Manufacturer

Availability

Purpose

Limitations

Dependencies

Risks

Installation Tools
Hardware
Requirements

Server
Requirements

Network
Requirements

User Interaction

Category Product

Phase

Training

Users

Testing Too
Tool

Manufacturer

Availability

Purpose

Limitations

Dependencies

Risks

Testing Tools
Hardware
Requirements

Server
Requirements

Network
Requirements

User Interaction Category Product

Phase

Training

Users

Migration To
Tool

Manufacturer Availability

Purpose

Limitations

Dependencies

Risks

Migration Tools
Hardware
Requirements

Server
Requirements

Network
Requirements User Interaction Category Product

Phase

Training

Users

Deployment
Tool

Manufacturer

Availability

Purpose

Limitations

Dependencies

Risks

Deployment Tools
Hardware
Requirements

Server
Requirements

Network
Requirements

User Interaction

Category Product

Phase

Training

Users

Developing Phase

Migration Methods
Refer to the Planning Phase - Migration Stages worksheet for migration methods.

Rollback
Refer to the Planning Phase - Migration Stages worksheet for rollback procedures.

Release to Production
Stage

Release
Criteria

Acceptance
Criteria

Sign-off
Authority

Stabilizing Phase

Test Tools
Refer to the Planning Phase - Testing Tools worksheet for a list of test tools.
Tool
Tool
Name
Tool Description Location

Test Team
Refer to the Envisioning - Deployment Team worksheet for team roles and responsibilities.
Team
E-mail
Phone
Member Responsibility
Name
Address Contact

Test Desktops
Computer
Manufacturer

Computer
Model

CPU

RAM

Number of Disk
Drives

Number of CD
Drives

Desktops
Number of DVD
Drives
Display Type

Peripherals

Number

Test Servers
Computer
Manufacturer

Computer Model CPU

RAM

Number
of Disk
Drives

Number
of CD
Drives

Number
of DVD
Drives

Display
Type

Peripherals

Number

Test Devices
Type

Manufacturer

Additional
Information

Number

Test Printers
Type

Manufacturer

Model

Number

Test Network Design


Server

Server
Role

IP
Address

Domain

Active
Group
Directory Policy

Local
Policy

Build Test Case Requirements


Feature

Requirement ID

Requirement

Test Case
Description

nts

Installation Test Case Requirements


Refer to the Test Specification.doc for Windows Vista Images test cases.
Requirement
Test Case
Feature ID
Requirement
Description

Windows Vista Infrastructure Test Case Requirements


Feature

Requirement ID

Requirement

Test Case
Description

rements

2007 Office System Infrastructure Test Case Requirements


Feature

Requirement
ID

Requirement

Test Case
Description

equirements

Network Integration Test Case Requirements


Feature

Requirement ID Requirement

Test Case
Description

ments

Security Test Case Requirements


Feature

Requirement
ID

Test Case
Requirement Description

Test E-Mail Cases


Feature

Requirement ID

Requirement

Test Case
Description

Internet Access Test Case Requirements


Feature

Requirement ID Requirement

Test Case
Description

Print and File Sharing Test Case Requirements


Feature

Test Case
Requirement ID Requirement Description

ements

Hardware Compatibility Test Case Requirements


Feature

Requirement
ID
Requirement

Test Case
Description

rements

Application Compatibility Test Case Requirements


Refer to the Test Specification.doc for Application Compatibility test cases.

Refer to Chapter 3 of the Microsoft Windows Server 2003 Server Deployment Kit book: "Planning, Testing, and Pilotin
Feature

Requirement ID

Requirement

Test Case
Description

quirements

ning, Testing, and Piloting Deployment Projects."

Operation and Support Test Case Requirements


Feature

Requirement ID

Requirement

Test Case
Description

Deployment and Migration Test Case Requirements


Refer to the Test Specification.doc for Deployment and Migration test cases.
Requirement
Test Case
Feature ID
Requirement
Description

rements

Backup and Restore Test Case Requirements


Feature

Requirement
ID

Requirement

Test Case
Description

Rollback Test Case Requirements


Feature

Requirement
ID

Requirement

Test Case
Description

Deploying Phase

Summary Details for Post-Deployment


Deployed Failed
Scenarios
Total Users
Desktops
Applications

Preparation
Refer to the Developing Phase - Migration Methods worksheet for preparation information.
Blocking
Task
Status
Issues
Completion Date

formation.

Production Impact
Impact

Stage

Actions

Affected
Dependencies Resources

Business
Unit

Business
Operatio
ns
Authority

Start Date

Completion
Date

Known Issues Status


Tracking Known
ID
Issue

Description Impact

Sign-off

E-mail

Software Authorization Status


Software
Name
Version

Manufacturer

License

Virus Checked Virus Scanner Location

Migration
Stage

Pre-production Plan

Refer to the Planning Phase - Migration Preparation and Migration Stages worksheets for a list of pre-production activ

ts for a list of pre-production activities.

Production Plan

Refer to the Planning Phase - Migration Preparation and Migration Stages worksheets for a list of production activities
Refer to the Envisioning Phase - Rollback Plan worksheet for a list of rollback procedures.
Refer to the Envisioning Phase - Support Plan worksheet for a list of support roles and procedures.

r a list of production activities.


es.
procedures.

Cleanup
Documentation

Documentation
Archive
Documentation
Location
Sign-off Status

Documentation
Test
Hardware
Sign-off Authority Hardware ID Description

Cleanup
Hardware Deinstallation Status

Hardware
Storage
Location

Hardware
Hardware Sign- Sign-off
off Status
Authority

Software Version

Software
Storage
Location

Software Software
Sign-off Sign-off
Status
Authority

You might also like