HACKM Case Study

Superior Essays
Register to read the introduction… Technicians will use Across Forest Migration to export the GPO and import it into the new Windows 8 production environment. After GPO migration, users will authenticate to the HACKM domain and therefore will not be required to use a Microsoft account with the new Windows 8 systems.
Data Backup & Restore

Data protection is crucial for HACKM continuity after the migration. Technicians will:
1. Identify the critical data that needs to be archived
2. Archive this data to dedicated backup servers provided by HACKM
3. Review data for integrity and quality
Technicians will backup:
1. Program data, software data, user folders and files including offline files identified during auditing and user interviews
2. Offline files will be copied to external USB hard drives (1TB).
3. Backups will be save for 90 days after migration
Full backups will be run nightly with incremental backups weekly during the migration effort. Technicians will perform a full integrity and consistency check of data.
…show more content…
LoadState will be used on the new computer to move files onto the new computer.
Install applications and add other Windows features.
Configure system backups and other protection methods. Take a complete PC backup and schedule regular user data backups.
Roles & Responsibilities

Project Manager: Responsible for managing high performance, interdisciplinary team to meet project milestones and achieving measurable performance outcomes. Project manager will manage and communicate task progress and milestones.
Lead Migration Administrator: Responsible for leading the desktop migration effort. This includes analysis of the existing Windows 7 systems and development of the plan and approach and migration of data to the new the new Windows 8 systems.
Migration Technician: Responsible for user interviews, surveys, data back-up, operating system installation and data migration. Technician will document any issues for escalation and lessons learned. Technician will regularly communicate with Lead Migration Administrator and Project Managers.
Schedule

The migration team will perform stated duties following the attached timeline:

Related Documents

  • Decent Essays

    Xacc/280 Week 4 Paper

    • 318 Words
    • 2 Pages

    Currently the packaging engineering team only provides the approval for the qualification, once we get their approval is when my team in conjunction with planning will plan the run out. Not sure why Bethany was under the impression that the transitioning was in two weeks. Stephen is stating that final qualification results will be ready in two weeks and that we will need to plan the run out carefully in order to ensure a hard transition. We have not agreed on any transition plan yet. I think that once we get the new process rolling, we will be resolving any potential issues as a team and we will be 100% aligned.…

    • 318 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 1 Paper

    • 521 Words
    • 3 Pages

    Wondering if they are putting in the right space or not. Information Technology personal will not have to go to each user machine and copy their data to the Distributed File System (DFS) namespace. Which can take days. Using the group policy to handle the Redirection and the migration will save countless man hours and make the migration run smoothly as it can do multiple machines at once. The group policy will be applied to the user group when they are ready to be…

    • 521 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Nt1330 Unit 7 Exercise 1

    • 756 Words
    • 4 Pages

    6 8. The following parameters are calculated for each of the node in each of the server wings: Voltage, Temperature, Fan Speed, CPU Utilization. After we calculate the theoretical values of the parameters we calculate the threshold value using the above, if the calculated value exceeds the threshold value there is a chances of the node to fail, and hence we take the previously mentioned migration policies to tackle the situation.…

    • 756 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Case Study 1 AIT 652 Sache Bond Executive summary: Towson University is responsible for complying with both Federal and Maryland state laws. It is essential that all employees are aware that the proper procedures must be followed to ensure that the legal action remains unrevised once the legal hold notice is issued. The legal holds notice will inform all necessary employees of their new profound obligation as an employee. The notice refers you to the policy written on the legal hold notices. The guidance of the legal holds notice supersedes all other retention policy guidelines (Records).…

    • 1033 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Information Management Introduction Over the year, I have completed 5 DT internal assessments. These included AS 1.41, AS 1.43, AS 1.45, AS 1.46, and AS 1.50. In completing these assessments, I have became more familiar with the applications that were used to complete these internal assessments, and has given me a better understanding for file structure. Assessments Completed AS 1.43 - First assignment: Website.…

    • 1963 Words
    • 8 Pages
    Improved Essays
  • Decent Essays

    Serving as the N313 Division Officer, I am on track to meet my Critical Elements. - Managed the day-to-day operational management of the ASI management process to include planning and coordinating all activities required to monitor, track, report and communicate maintenance action and resolve and issues that may occur. I have collaborated with DISA, PWM 205, TF 1010, HPES, and our customers to deconflict, and resolve any issues with any maintenance actions being performed by our vendor or DISA. - I am working with the Senior Watch Officer to develop process to improve BWC situational awareness concerning ASIs , PONDS and the updating command CCIR Instruction. - I have develop a Template for the watch to use when drafting TASKORD related…

    • 334 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Hack Heaven Analysis

    • 640 Words
    • 3 Pages

    A young man name Stephen Glass was the youngest writers and editors at The New republic. He was respected all his The New Republic workers. He was hard working and doing his job to make the interesting story. In the beginning Glass admit one mistake “Young Republicans” which some not true story to Michael who was the chief. The new position the magazine’s current editor in chief was Charles “Chuck” Lane after Michael was fired.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    1. PHYSICAL SECURITY POLICY 1.1 Overview This policy is designed to set how Dalton, Walton & Carlton, Inc. (DW&C) strives to protect its employees, visitors and assets (buildings, property, information) against physical threats including but not limited to crimes (criminal damage and theft) and terrorism through the use of physical security controls.…

    • 1248 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    I would also like to learn how to create session plans for the team and review related data as well. I plan on contributing to this role my many of my different skills.…

    • 350 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Data Retention Policy

    • 1877 Words
    • 8 Pages

    1 Data archiving is the process of moving data that is no longer actively used to a separate storage device for long-term retention. Archive data consists of older data that is still important to the organization and may be needed for future reference, as well as data that must be retained for regulatory compliance. Data archives are indexed and have search capabilities so files and parts of files can be easily located and retrieved. Archiving information involves removing old inactive files from the main filing system, thereby freeing space for current 'active' files that need to be accessed regularly but with the advantage that they can be retrieved at a later date if required. Usually it is easy to predict when something needs to be archived…

    • 1877 Words
    • 8 Pages
    Great Essays
  • Great Essays

    Senwes Case Study

    • 2751 Words
    • 12 Pages

    • Ensure sufficient temperature control in the IT control room, in order to protect electronic components from heat and humidity. • Ensure that a sufficient backup recovery plan is in place, and readily available in case of emergencies. • Copies of the disaster recovery plan should be kept on another premises as well • Copies of backup data should be kept on another premise than the IT data centre in order to avoid destruction of backups, in case of emergencies. • Ensure that sufficient anti-virus applications are installed on all computers, as well as the servers, in order to prevent any unauthorised access to the system by third parties.…

    • 2751 Words
    • 12 Pages
    Great Essays
  • Improved Essays

    It could also be beneficial in determining what equipment is needed and how it can be obtained and in place by the time the move…

    • 1008 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    The Project Management Hat is the most complex of the hats. It incorporates its six predecessors and many additional conflicting hats. The PM hat requires one to be empathetic yet be a driver; to be decisive yet inquisitive, to be structured yet adaptive, and to think "big picture" yet "sweat the details. " The role of PM is full of contradictions that must be reconciled in order to succeed. Salient features of the 7th hat are alignment with strategy, doing the right thing, doing things the right way, when to begin and when to end, improving the likelihood of intended outcomes, etc.…

    • 1187 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    To be effective we need to “ask the right people the right question”. That’s why it is important to distinguish software product management from software project management. In other words, we shouldn’t confused these two types of management. P a g e 2 | 10 As the name suggests, the project manager focuses on the project.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The Security Policy

    • 759 Words
    • 4 Pages

    This introduces the security policy, briefly summing up the need of the security policy and the areas it covers. # This section covers who the policy applies too, in this case it is all staff and selected college partners that have access to College information.…

    • 759 Words
    • 4 Pages
    Improved Essays