You are on page 1of 163

Envisioning Phase

se
Summary Details for Assessment
Scenarios

Total Users

Network Incompatibility Type

Compatible Desktops

Incompatible Desktops Type

Compatible Applications

Incompatible Applications Type


sment
Assessed Network Configuration
Domain Name Domain Type Network Protocols DNS Configuration DHCP Configuration
sed Network Configuration
Trust
Number of Routers Networked Domain Network Bandwidth Relationships Users
Planned Network Configuration
Number
Domain Domain Network DNS DHCP of Networked Network
Name Type Protocols Configuration Configuration Routers Domain Bandwidth
Trust
Relationships Users Risks
Assessed Active Directory Configuration

Active
Directory Intersite
Site Name Forest Version Mode Namespace IP Subnets Servers Transports
n

Trust Relationships Users


Planned Active Directory Configuration

Active Directory IP Intersite


Site Name Forest Version Mode Namespace Subnets Servers Transports
ation

Trust Relationships Users Risks


Assessed Server Roles

Server IP Server Operating Primary Purchase Date or


Name Address Domain System Domain Role Supplementary Roles Install Date
Network Link Network Bandwidth
Speed to the Availability to the
Domain Controller Domain Controller
Planned Server Roles
Primary
Server IP Server Operating Domain Purchase Date or
Name Address Domain System Role Supplementary Roles Install Date
r Roles

Network Link Speed to Network Bandwidth Availability to


the Domain Controller the Domain Controller Risks
Assessed Desktop Configuration
Computer Computer
Manufacturer Model CPU RAM CD Drive DVD Drive Display Type
onfiguration
Operating
System Total
Planned Desktop Configuration

Total Free Hard Number Number


Computer Hard Disk Disk of Disk of CD
Manufacturer Computer Model CPU RAM Space Space Drives Drives
Configuration

Number
of DVD Display Operating
Drives Type Peripherals System Total Risks
Assessed Applications

Number Install
Application Manufacturer Version Location Type Business Use of Users Method
Assessed Applications
Standard
Operating Application Operating System
Environment Dependencies Dependencies Compatibility Configuration
Planned Applications

Business Number Install


Application Manufacturer Version Location Type Use of Users Method
nned Applications

Application Operating System


SOE Dependencies Dependencies Compatibility Configuration Risks
Assessed Network Security
Password Policy
Must Log On to Account Lockout
Maximum Age Minimum Age Length Unique Change Lockout Duration Reset Count
Domain

Group Policy

Local Policy

Smart Card
Password
Change Expired Complexity
Planned Network Security
Password Policy
Must Log
Maximum Minimum On to Account Lockout
Age Age Length Unique Change Lockout Duration
Domain

Group Policy

Local Policy

Smart Card
Security

Reset Password
Count Change Expired Complexity Risks
Assessed User Profile
User User Functional Function
Profile Group Area Objective Activities Scenarios Requirements
New Scenario
Data Gathering T

Tool Manufacturer Availability Purpose Limitations Dependencies Risks


Data Gathering Tools

Hardware Server Network User


Requirements Requirements Requirements Interaction Category Product Phase
Training Users
Migration Assessment
Installation Method File Total
Product Method Dependency Storage Location Users Risks
nt
Risk Assessment
Operating
Risk Risk Description Network Desktop Application System User Business
Risk Level Mediation
Deployment Team
Training Availability
Team Position Responsibility Activity Skill Required Required Required Location
ment Team
Team
Member
Support Plan

Area of Training Availability


Support Position Responsibility Activity Skill Required Required Required Location
Team
Member
Communication Plan
Secondary
Procedure Area Procedure Description Initial Contact Contact Tracking
Tool
Tracker Tool Access
Risk Plan
Contingency
Risk Area Description of Risk Plan Tracking Tracker Tracking Tool
Tool
Access
Rollback
Procedure Initial Secondary Tool
Procedure Area Description Contact Contact Tracking Tracker Tool Access
Tests Tester Sign-off
Tracking Database
Database
Type Version Size Location Access Administrator Security Schema
Information Procedures
Planning Phase
Network Configuration

Windows
Internet Naming
Domain Domain Network DNS DHCP Service (WINS)
Name Type Protocols Configuration Configuration Configuration Router
etwork Configuration

Router Firewall Networked Network


Location Location Domain Bandwidth Trust Relationships Users
Active Directory Con

Active Directory IP Intersite


Sites Forest Version Mode Namespace Subnets Servers Transports
tive Directory Configuration

Organizational Unit Domain


Trust Relationships Users (OU) OU Description Physical Site Controller
Speed to
Forest
Root
Server Configuration

Server IP Supplementary
Name Address Domain Server Operating System Primary Domain Role Roles
Server Configuration

Purchase Date or Network Link Speed to the Domain


Installation Date Controller
Network Bandwidth Availability to the Domain
Controller
Deskt

Computer Computer Physical


Manufacturer Computer Model Serial Number Network Location Location CPU RAM
Desktop Configuration

Total Free Hard Number Number Number


Hard Disk Disk of Disk of CD of DVD Display
Space Space Drives Drives Drives Type Peripherals Operating System
Incompatible New Group Local
Drivers Drivers Policy Policy
Windows Vista Deployment
Installation Migration Application
Stored Location Location Security Method Dependencies Incompatibility
ployment
Computers to
Configuration Migrate To
Windows Vista Configurat
Domain Location Installation Method Source Files Configuration Files

Configuration
Domain Location Local Security Policy Snap-in Settings

Computer
Serial
Domain Location Machine Name Number Protocol

Domain Location Machine Name Disk Format Local Drives

Desktop
Domain Location Machine Name Background Screen Saver

Program
Domain Location Machine Name Menu Accessories
Windows Vista Configuration
Installation
Drives Location

Wireless
Remote User Network Group
Configuration Configuration Configuration Policy

Group
Mapped Drives Directories Folders Policy

Display
Appearance Web Effects Settings Shortcuts

Startup Group Policy


Group Policy
Microsoft Internet Explorer Configuration

General Temporary User Group or OU This


Configuration Home Page Internet Files History Configuration Affects

Security Internet Security User Group or OU This


Configuration Security Level Configuration Affects

Content Content User Group or OU This


Configuration Advisor Certificates Personal Information Configuration Affects

Connections Connection Dial-up Local Area Network User Group or OU This


Configuration Setup Settings (LAN) Settings Configuration Affects

Programs E-mail
Configuration HTML Editor Program Newsgroups Internet Call

Advanced Microsoft Virtual


Configuration Accessibility Browsing HTTP Settings Machine (VM)
er Configuration

Contact User Group or OU This


Calendar List Configuration Affects

Multimed User Group or OU This


ia Printing Address Bar Search Security Configuration Affects
2007 Microsoft Office System Deployment

Installation Application
Stored Location Location Security Migration Method Dependencies
ystem Deployment

Computers to
Incompatibility Configuration Migrate To
2007 Office System Configuration

Domain Location Source Files

Installation User Group or OU This


Feature State Shortcut Configuration Affects

Additional Custom Files User Group or OU This


to Install Location Shortcut Configuration Affects

User Group or OU This


Logging Location Configuration Affects

User Group or OU This


User-Defined Setting Configuration Configuration Affects

Individual Data
Filename Location Shared Data Location

Domain Location Local Security Policy Snap-in


Configuration
Configuration Installation
Files Drives Location

Configuration
Settings
Office Outlook 2007 Configuration
User Group or OU
Mode This Mode Affects

Filter User Group or OU This


Filter State Configuration Filter Affects

User Registry User Group or OU This


Interface Configuration Setting Configuration Affects

User Group or
OU This
Configuration
Feature Installation State Affects

Security User Group or OU This


Template Setting Configuration Configuration Affects
n
Application Configuration
Applications to Be Migrated
Stored Installation
Application Manufacturer Version Location Location Security

Applications Not to Be Migrated


Stored
Application Manufacturer Version Location Retired Location Migration Method
pplication Configuration

Application Computers to
Migration Method Dependencies Incompatibility Configuration Migrate To

Application Files Substantiation Authorization


Network Security
Password Policy
Must Log On to
Maximum Age Minimum Age Length Unique Change
Domain

Logon/Logoff File and Object User of User User and Security Policy Restart,
Access Rights Group Changes Shutdown the
Management System

User Group or
Policy OU That Policy
Group Policy Configuration Is Applied To

User Group or
Policy OU That Policy
Local Policy Configuration Is Applied To

User Group or
Policy OU That Policy
Smart Card Configuration Is Applied To
Network Security

Account Lockout Password


Lockout Duration Reset Count Change Expired Complexity

Process
Tracking User Group or
OU That Policy
Is Applied To
Migration Preparation
Business Team
Task Contact Contact Activities Information Dependencies Methods
Completion
Date Tracking
Migration Stages

Data Affected Business


Stage Actions Dependencies Collection Tools Resources Location Unit
tages

Business Team Start Completion


Operations Members Date Date Risks Rollback
Team Members
Refer to the Envisioning Phase - Deployment Team worksheet for team roles and responsibilities.
Team E-mail Phone
Member Responsibility Name Address Contact
Installatio
Tool Manufacturer Availability Purpose Limitations Dependencies Risks
Installation Tools
Hardware Server Network
Requirements Requirements Requirements User Interaction Category Product
Phase Training Users
Testing Too
Tool Manufacturer Availability Purpose Limitations Dependencies Risks
Testing Tools
Hardware Server Network
Requirements Requirements Requirements User Interaction Category Product Phase
Training Users
Migration Too
Tool Manufacturer Availability Purpose Limitations Dependencies Risks
Migration Tools
Hardware Server Network User
Requirements Requirements Requirements Interaction Category Product Phase
Training Users
Deployment
Tool Manufacturer Availability Purpose Limitations Dependencies Risks
Deployment Tools
Hardware Server Network
Requirements Requirements Requirements User Interaction Category Product Phase
Training Users
Developing Phase
Migration Methods
Refer to the Planning Phase - Migration Stages worksheet for migration methods.
Rollback
Refer to the Planning Phase - Migration Stages worksheet for rollback procedures.
Release to Production
Release Acceptance Sign-off
Stage Criteria Criteria Authority
Stabilizing Phase
Test Tools
Refer to the Planning Phase - Testing Tools worksheet for a list of test tools.
Tool Tool
Name Tool Description Location
Test Team
Refer to the Envisioning - Deployment Team worksheet for team roles and responsibilities.
Team E-mail Phone
Member Responsibility Name Address Contact
Test Desktops
Computer Number of Disk Number of CD
Manufacturer Computer Model CPU RAM Drives Drives
Desktops
Number of DVD
Drives Display Type Peripherals Number
Test Servers
Number Number Number
Computer of Disk of CD of DVD Display
Manufacturer Computer Model CPU RAM Drives Drives Drives Type
Peripherals Number
Test Devices
Additional
Type Manufacturer Information Number
Test Printers
Type Manufacturer Model Number
Test Network Design
Server IP Active Group Local
Server Role Address Domain Directory Policy Policy
Build Test Case Requirements
Test Case
Feature Requirement ID Requirement Description
nts
Installation Test Case Requirements
Refer to the Test Specification.doc for Windows Vista Images test cases.
Requirement Test Case
Feature ID Requirement Description
Windows Vista Infrastructure Test Case Requirements
Test Case
Feature Requirement ID Requirement Description
rements
2007 Office System Infrastructure Test Case Requirements
Requirement Test Case
Feature ID Requirement Description
equirements
Network Integration Test Case Requirements
Test Case
Feature Requirement ID Requirement Description
ments
Security Test Case Requirements
Requirement Test Case
Feature ID Requirement Description
Test E-Mail Cases
Test Case
Feature Requirement ID Requirement Description
Internet Access Test Case Requirements
Test Case
Feature Requirement ID Requirement Description
s
Print and File Sharing Test Case Requirements
Test Case
Feature Requirement ID Requirement Description
ements
Hardware Compatibility Test Case Requirements
Requirement Test Case
Feature ID Requirement Description
rements
Application Compatibility Test Case Requirements
Refer to the Test Specification.doc for Application Compatibility test cases.
Refer to Chapter 3 of the Microsoft Windows Server 2003 Server Deployment Kit book: "Planning, Testing, and Pilotin
Test Case
Feature Requirement ID Requirement Description
uirements

ning, Testing, and Piloting Deployment Projects."


Operation and Support Test Case Requirements
Test Case
Feature Requirement ID Requirement Description
Deployment and Migration Test Case Requirements
Refer to the Test Specification.doc for Deployment and Migration test cases.
Requirement Test Case
Feature ID Requirement Description
rements
Backup and Restore Test Case Requirements
Requirement Test Case
Feature ID Requirement Description
Rollback Test Case Requirements
Requirement Test Case
Feature ID Requirement Description
Deploying Phase
Summary Details for Post-Deployment
Deployed Failed
Scenarios

Total Users

Desktops

Applications
Preparation
Refer to the Developing Phase - Migration Methods worksheet for preparation information.
Blocking
Task Status Issues Completion Date
formation.
Production Impact
Business
Affected Business Operatio
Impact Stage Actions Dependencies Resources Unit ns Authority
Completion
Start Date Date
Known Issues Status
Tracking Known
ID Issue Description Impact Sign-off E-mail
Software Authorization Status
Software
Name Version Manufacturer License Virus Checked Virus Scanner Location
Migration
Stage
Pre-production Plan
Refer to the Planning Phase - Migration Preparation and Migration Stages worksheets for a list of pre-production activ
t of pre-production activities.
Production Plan
Refer to the Planning Phase - Migration Preparation and Migration Stages worksheets for a list of production activitie
Refer to the Envisioning Phase - Rollback Plan worksheet for a list of rollback procedures.
Refer to the Envisioning Phase - Support Plan worksheet for a list of support roles and procedures.
or a list of production activities.
es.
procedures.
Cleanup
Documentation
Archive Documentation Documentation Test Hardware
Documentation Location Sign-off Status Sign-off Authority Hardware ID Description
Cleanup
Hardware Hardware Software
Hardware De- Storage Hardware Sign-off Storage
installation Status Location Sign-off Status Authority Software Version Location
Software Software
Sign-off Sign-off
Status Authority

You might also like