3. Planning for Windows Server 2012
Deploying Windows Server 2012 is a substantial undertaking, even on a small network. Just the task of planning a Windows Server 2012 deployment can be a daunting process,
especially in a large enterprise. The larger the business, however, the
more important it is that the planning process be thorough and fully
account for the proposed project’s goals, as well as lay out exactly how those goals will be accomplished.
Accommodating the goals of all the business units in a company can be
difficult, and it is best accomplished with a well-planned series of
steps that includes checkpoints and plenty of opportunity for management
participation. The organization as a whole will benefit from your
thorough preparation and so will the Information Technology (IT)
department. Careful planning can also help you avoid common obstacles by
helping you identify potential pitfalls and then determine how best to
avoid them, or at least be ready for any unavoidable complications.
Your plan: The big picture
A clear road map can help with any complex project, and deploying
Windows Server 2012 in the enterprise is certainly a complex project. A
number of firms have developed models to describe IT processes such as
planning and systems management. For our purposes, I’ll break down the
deployment process into a roughly sequential set of tasks:
-
Identify the team
For all but the smallest rollouts of a new operating system, a team of
people will be involved in both the planning and deployment processes.
The actual size and composition of this team will be different in each
situation. Collecting the right mixture of skills and expertise will
help ensure the success of your project. -
Assess your goals
Any business undertaking the move to Windows Server 2012 has many
reasons for doing so, only some of which are obvious to the IT
department. You need to carefully identify the goals of the entire
company before determining the scope of the project to ensure that all
critical goals are met. -
Analyze the existing environment
Examine the current network environment, even if you think that you know exactly
how everything works—you will often find you are only partially
correct. Gather hardware and software inventories, network maps, and
lists of which servers are providing which services. Also, identify
critical business processes, and examine the administrative and security
approaches that are currently in place. Windows Server 2012 offers a
number of improvements, and you’ll find it useful to know which ones are
particularly important in your environment. -
Define the project scope
Project scope is often one of the more difficult areas to pin down, and
one that deserves particular attention in the planning process.
Defining scope requires prioritizing the goals of the various groups
within the organization and then realistically assessing what can be
accomplished within an acceptable budget and time frame. It’s not often
that the wish list of features and capabilities from the entire company
can be fulfilled in the initial, or even later, deployment. -
Design the new network environment
After you have pinned down the project scope, you must develop a detailed design for the new operating system deployment
and the affected portions of the network. During this time, you should
create documentation describing the end state of the network, as well as
the process of getting there. This design document serves as a road map for the people building the testing environment and, with refinements during the testing process, for the IT department later on. -
Test the design
Thorough testing in the lab is an often overlooked, but critically
important, phase of deploying a new network operating system. By
building a test lab and putting a prototype environment through its
paces, you can identify and solve many problems in a controlled
environment rather than in the field. -
Install Windows Server 2012 After you have validated your design in the lab and management has approved the deployment, you can begin to install Windows Server 2012 in your production environment. The installation process has two phases:
-
Pilot phase During
the pilot phase, you deploy and test a small group of servers running
Windows Server 2012 (and perhaps clients running Microsoft Windows 8) in
a production environment. You should pick a pilot group that is
comfortable working with new technology, and for whom minor
interruptions will not pose significant problems. In other words, this
is not a good thing to do to the president of the company or the finance
department just before taxes are due. -
Rollout After you
have determined that the pilot phase was a success, you can begin the
rollout to the rest of the company. Make sure you schedule adequate
downtime, and allow for ongoing minor interruptions and increased
support demands as users encounter changed functionality.
As mentioned, these steps are generally sequential, but not
exclusively so. You are likely to find that as you work through one
phase of planning,
you must return to activities that are technically part of an earlier
phase. This is actually a good thing, because it means you are refining
your plan dynamically as you discover new factors and contingencies.
Identifying your organizational teams
A project like this requires a lot of time and effort as well as a
broad range of knowledge, expertise, and experience. Unless you are
managing a very small network, this project is likely to require more
than one person to plan and implement. Team members are assigned to
various roles, each of which is concerned with a different aspect of the
project.
Each of these roles can be filled by one or more persons, devoting
all or part of their workday—and beyond in some cases—to the project. No
direct correlation exists between a team role and a single individual
who performs it. In a large organization, a team of individuals might
fulfill each of these roles, while in a small organization one person
can fill more than one role.
As with IT processes, a number of vendors and consultants have put
together team models, which you can use in designing your own team.
Specific teams you might want to use include
-
Architecture team
In increasingly
complex IT environments, there needs to be someone responsible for
overall project architecture and providing guidance for integrating the
project into existing architecture. This role is filled by the
architecture team. Specific deliverables include the architecture design
and guidance for the integration solution. -
Program management team
Program management’s
primary responsibility is ensuring that project goals are met within
the constraints set forth at the beginning of the project. Program
management handles the functional design, budget, schedule, and
reporting. Specific deliverables include a vision or scope document,
functional specifications, a master project plan, a master project
schedule, and status reports. -
Product management team
This team is
responsible for identifying the business and user needs of the project
and ensuring that the final plan meets those needs. Specific
deliverables include the project charter and team orientation guidance
as well as documents for project structure documents and initial risk
assessment. -
User experience team
This team manages
the transition of users to the new environment. This includes developing
and delivering user training, as well as conducting an analysis of user
feedback during testing and the pilot deployment.
Specific deliverables include user reference manuals, usability test
scenarios, and user interface graphical elements. -
Development team
The development team
is responsible for defining the physical design and feature set of the
project and estimating the budget and time needed for project
completion. Specific deliverables include any necessary source code or
binaries as well as necessary integrated-solution components. -
Testing team
The testing team is critical in ensuring that the final deployment
is successful. It designs and builds the test environment, develops a
testing plan, and then performs the tests and resolves any issues it
discovers before the pilot deployment occurs. Specific deliverables
include test specifications, test cases with expected results, test
metrics, test scripts, test data, and test reports. -
Release management team
The release
management team designs the test deployment and then performs that
deployment as a means of verifying the reliability of the deployment
before widespread adoption. Specific deliverables include deployment
processes and procedures, installation scripts and configuration
settings for deployment, operations guides, help desk and support
procedures, knowledge base, help and training materials, operations
documentation, and troubleshooting documentation.
Working together, these teams
cover the various aspects of a significant project, such as rolling out
Windows Server 2012. Although all IT projects share some things in
common, and therefore need someone to handle those areas of the project,
that’s where the commonality stops. Each company has IT needs related
to its specific business activities. This might mean additional team
members are needed to manage those aspects of the project. For example,
if external clients, the public, or both also access some of your IT
systems as users, you have a set of user acceptance and testing
requirements different from many other businesses.
The project team needs business managers who understand, and who can
represent, the needs of the various business units. This requires
knowledge of both the business operations and a clear picture of the
daily tasks performed by staff.
Representatives of the IT department bring their technical expertise
to the table not only to detail the inner workings of the network, but
also to help business managers realistically assess how technology can
help their departments and sort out the impractical goals from the realistic ones.
Make sure that all critical aspects of business operations are
covered—include representatives from all departments that have critical
IT needs, and be sure the team takes the needs of the entire company
into account. This means that people on the project team must collect
information from line-of-business managers and the people actually doing
the work. (Surprisingly enough, the latter escapes many a project
team.)
After you have a team together, management must ensure that team
members have adequate time and resources to fulfill the tasks required
of them for the project. This can mean shifting all or part of their
usual workload to others for the project duration or providing resources
such as Internet access, project-related software, and so on. Any
project is easier, and more likely to be successful, with this critical
real-time support from management.
Carefully identifying the goals behind moving to Windows Server 2012 is an important part of the planning
process. Without a clear list of objectives, you are unlikely to
achieve them. Even with a clear set of goals in mind, it is unlikely you
will accomplish them all. Most large business projects involve some
compromises, and the process of deploying Windows Server 2012 is
unlikely to be an exception.
Although deploying a new operating system is ultimately an IT task, most of the reasons behind the deployment
won’t be coming from the IT department. Computers are, after all, tools
used by business to increase productivity, enhance communications,
facilitate business tasks, and so on; the IT department is concerned
with making sure that the computer environment needed by the business is
implemented.
Many discussions of the business
reasons for new software deployments echo common themes: enhance
productivity, eliminate downtime, reduce costs, and the like.
Translating these often somewhat vague (and occasionally lofty)
aspirations into concrete goals
sometimes takes a bit of effort. It is well worth taking the time,
however, to refine the big picture into specific objectives before
moving on. An IT department should serve the needs of the business, not
the other way around; if you don’t understand those needs clearly,
you’ll have a hard time fulfilling them.
Be sure to ask for the input of people close to where the work is
being done—department managers from each business area should be asked
about what they need from IT, what works now, and what doesn’t. These
people care about the day-to-day operations of their computing
environment. Will the changes help their staff do their work? Ask about
work patterns, both static and burst—the finance department’s workflow
is not the same in July as it is in April. Make sure to include all
departments, as well as any significant subsets—human resources (HR),
finance, sales, business units, executive management, and so on.
You should also identify risks that lie at the business level, such
as resistance to change, lack of commitment (frequently expressed as
inadequate resources: budget, staff, time, and so on), or even the
occasional bit of overt opposition. At the same time, look for positives
to exploit—enthusiastic staff can help energize others, and having a
manager in your corner can smooth many bumps along the way. By getting
people involved, you can gain allies who are vested in the success of
the project.
IT goals are often obvious: improve network reliability, provide
better security, deliver enhanced administration, and maybe even
implement a particular new feature. They are also easier to identify
than those of other departments—after all, they are directly related to
technology.
When you define your goals, make sure that you are specific. It is
easy to say you will improve security, but how will you know when you
have done so? What’s improved, and by how much? In many cases, IT goals
map to the implementation of features or procedures; for example, to
improve security you will implement Internet Protocol Security (IPsec)
and encrypt all traffic to remote networks.
Don’t overpromise either—eliminating downtime is a laudable goal, but
not one you are likely to achieve on your network, and certainly not
one on which you want your next review based.
Examining the interaction between IT and business units
A number of aspects of your organization’s business should be
considered when evaluating your overall IT requirements and the business
environment in which you operate. Consider things such as the
following:
-
Business organization
How large is the business? Are there offices in more than one location?
Does the business operate across international, legal, or other
boundaries? What sorts of departmental or functional boundaries exist? -
Stability Does the
business undergo a lot of change? Are there frequent reorganizations,
acquisitions, changes, and the like in business partnerships? What is
the expected growth rate of the organization? Conversely, are
substantial downsizings planned in the future? -
External relationships
Do you need to provide access to vendors, partners, and so on? Are
there external networks that people operating on your network must
access? -
Impact of Windows Server 2012 deployment
How will this
deployment affect the various departments in your company? Are there any
areas of the company that are particularly intolerant of disruption?
Are there upcoming events that must be taken into consideration in
scheduling? -
Adaptability Is
management easily adaptable to change? If not, make sure you get every
aspect of your plan right the first time. Having an idea of how staff
might respond to new technologies and processes can help you plan for
education and support.
Predicting network change
Part of planning
is projecting into the future and predicting how future business needs
will influence the activities of the IT department. Managing complicated
systems is easier when it’s done from a proactive stance rather than a
reactive one. Predicting network change is an art, not a science, but it
will behoove you to hone your skills at it.
This is primarily a business assessment, based on things such as
expected growth, changes in business focus, or possible downsizing and
outsourcing—each of which provides its own challenges to the IT
department. Being able to predict what will happen in the business and
what those changes will mean to the IT department allows you to build in
room for expansion in your network design.
When attempting to predict what will happen, look at the history of
the company. Are mergers, acquisitions, spin-offs, and so on common? If
so, this indicates a considerable need for flexibility from the IT
department, as well as the need to keep in close contact with people on
the business side to avoid being blindsided by a change in the future.
As people meet to discuss the deployment,
talk about what is coming up for the business units. Cultivate contacts
in other parts of the company, and talk with those people regularly
about what’s going on in their departments, such as upcoming projects,
as well as what’s happening with other companies in the same business
sector. Reading the company’s news releases and articles in outside
sources can also provide valuable hints of what’s to come. By keeping
your ear to the ground, doing a little research, and thinking through
the potential impact of what you learn, you can be much better prepared
for whatever is coming up next.
Analyzing the existing network
Before you can determine the path to your new network environment, you must determine where you are right now in terms of your existing
network infrastructure. This requires determining a baseline for
network and system hardware, software installation and configuration,
operations, management, and security. Don’t rely on what you think is
the case; actually verify what is in place.
Evaluating the network infrastructure
You should get an idea of what the current network looks like before
moving to a new operating system. You will require configuration
information while designing the modifications to the network
and deploying the servers. In addition, some aspects of Windows Server
2012, such as the sites used in Active Directory replication, are based
on your physical network configuration. (A site is a segment of the network with good connectivity, consisting of one or more Internet Protocol [IP] subnets.)
For reasons such as this, you’ll want to assess a number of aspects
related to your physical network environment. Consider such
characteristics as the following:
-
Network topology
Document the systems
and devices on your network, including link speeds, wide area network
(WAN) connections, sites using dial-up connections, and so on. Include
devices such as routers, switches, servers, and clients, noting all
forms of addressing, such as both computer names and IP addresses for Windows systems. -
Network addressing
Are you currently employing Internet Protocol version 4 (IPv4) and
Internet Protocol version 6 (IPv6)? What parts of the address space are
private or public? Which IP subnets are in use at each location? -
Remote locations
How many physical
locations does the organization have? Are they all using broadband
connections, or are there remote offices that connect sporadically by
dial-up? What is the speed of those links? -
Traffic patterns
Monitoring network
traffic can provide insights into current performance, as well as help
you to identify potential bottlenecks and other problems before they
occur. Examine utilization statistics, paying attention to both
regularly occurring patterns and anomalous spikes or lulls, which might
indicate a problem. -
Special cases Are
there any portions of the network that have out-of-the-ordinary
configuration needs, such as test labs that are isolated from the rest
of the network?
As part of planning, you should inventory the existing network servers, identifying
each system’s operating system version, IP address, Domain Name System
(DNS) names, as well as the services provided by that system. Collect
such information by performing the following tasks:
-
Inventory hardware Conduct a hardware inventory
of the servers on your network, noting central processing unit (CPU),
random access memory (RAM), disk space, and so on. Pay particular
attention to older machines that might present compatibility issues if
upgraded. You can use the Microsoft Assessment and Planning
(MAP) toolkit, Microsoft System Center Configuration Manager (SCCM), or
other tools to help you with the hardware inventory. -
Identify operating systems
Determine the current operating system on each computer, including the
entire version number (even if it runs to many digits), as well as
service packs, hot fixes, and other post-release additions. -
Assess your current Microsoft Windows domains
Do you have only Windows domains on the network? Are all domains using
Active Directory? Do you have multiple Active Directory forests? If you
have multiple forests, detail the trust relationships. List the name of
each domain, what it contains (users, resources, or both), and which
servers are acting as domain controllers. -
Identify localization factors
If your organization
crosses international boundaries, language boundaries, or both,
identify the localized versions of Windows Server in use and the
locations in which they are used. This is critical when upgrading to
Windows Server 2012 because attempting an upgrade using a different
localized version of Windows Server 2012 might fail. -
Assess software licenses Evaluate licenses for servers and client access. This will help you select the most appropriate licensing program. -
Identify file storage Review the contents and configuration of existing
file servers, identifying partitions and volumes on each system.
Identify existing distributed file system (DFS) servers and the contents
of DFS shares. Don’t forget shares used to store user data.
You can gather hardware and software inventories of computers that run the Windows operating system by using a tool such as System Center Configuration
Manager. Review the types of clients that must be supported so that you
can configure servers appropriately. This is also a good time to
determine any client systems that must be upgraded (or replaced) to use
Windows Server 2012 functionality.
Note
You can also gather this information with scripts. To find more information on scripting, I recommend Microsoft Windows PowerShell 2.0 Administrator’s Pocket Consultant by William R. Stanek (Microsoft Press, 2009).
Identify network services and applications
Look at your current network
services, noting which services are running on which servers, and the
dependencies of these services. Do this for all domain controllers and
member servers that you’ll be upgrading. You’ll use this information
later to plan for server placement and service hosting on the upgraded network configuration. Some examples of services to document are as follows:
-
DNS services You
must assess your current DNS configuration. If you’re currently using a
non–Microsoft DNS server, you’ll want to carefully plan DNS support
because Active Directory relies on Windows Server 2012 DNS. -
WINS services You
should assess the use of Network Basic Input/Output System (NetBIOS) by
legacy applications and computers running early versions of the Windows
operating system to determine whether NetBIOS support (such as Windows Internet Naming Service [WINS]) will be needed in the new network configuration. -
Print services
List printers and
the print server assigned to each one. Consider who is assigned to the
various administrative tasks and whether the printer will be published
in Active Directory. Also determine whether all of the print servers
will be upgraded in place or whether some will be consolidated. -
Network applications
Inventory your applications, creating a list of the applications that
are currently on the network, including the version number (as well as
post-release patches and such), which server hosts it, and how important
each application is to your business. Use this information to determine
whether upgrades or modifications are needed. Also watch for software
that is never used and thus need not be purchased or supported—every
unneeded application you can remove represents savings of both time and
money.
This list is only the beginning. Your network will undoubtedly have many more services that you must take into account.
Caution
Make sure that you determine any dependencies
in your network configuration. Discovering after the fact that a
critical process relied on the server that you just decommissioned is
not going to make your job any easier. You can find out which Microsoft
and third-party applications are certified to be compatible with Windows
Server 2012 in the Windows Server Catalog (http://www.windowsservercatalog.com/).
Identifying security infrastructure
When you document your network
infrastructure, you will need to review many aspects of your network
security. In addition to security concerns that are specific to your
network environment, the following factors should be addressed:
-
Consider exactly who has access to what and why. Identify network
resources, security groups, and assignment of access permissions. -
Determine which security
protocols and services are in place. Are adequate virus protection,
firewall protection, email filtering, and so on in place? Do any
applications or services require legacy NTLM authentication? Have you
implemented a public key infrastructure (PKI) on your network? -
Examine auditing methods, and identify the range of tracked access and objects. -
Determine which staff members have access to the Internet and which
sorts of access they have. Look at the business case for access that
crosses the corporate firewall—does everyone who has Internet
access actually need it, or has it been provided across the board
because it was easier to provide blanket access than to provide access
selectively? Such access might be simpler to implement, but when you
look at Internet access from the security perspective, it presents many
potential problems. -
Consider inbound access as well; for example, can employees access
their information from home? If so, examine the security that is in
place for this type of access.
Important
Security is one area in which well-established methods matter—pay
particular attention to all established policies and procedures, what
has been officially documented, and what isn’t documented as well.
Depending on your existing network security mechanisms, the underlying security methods can change upon deployment
of Windows Server 2012. Windows Server 2003 is the minimum forest and
domain functional level supported by Windows Server 2012. When the forest and domain functional levels are raised to this level or higher from a lower level, Kerberos
is the default authentication mechanism used between computer systems.
This also means that although the Windows NT 4 security model (using
NTLM authentication) continues to be supported, it is no longer the
default authentication mechanism.
Reviewing network administration
Examining the administrative methods currently in use on your network
provides you with a lot of information about what you are doing right,
as well as identifying areas that could use some improvement. Using this
information, you can tweak network procedures where needed to optimize
the administration of the new environment.
Network administrative model Each company has its own sort of approach to network administration—some are very centralized,
with even the smallest changes being made by the IT department, while
others are partially managed by the business units, which control
aspects such as user management. Administrative models fit into these
categories:
-
Centralized
Administration of the entire network is handled by one group, perhaps in
one location, although not necessarily. This provides a high degree of
control at the cost of requiring IT staff for every change to the
network, no matter how small. -
Decentralized
This administrative
model delegates more of the control of day-to-day operations to local
administrators of some sort, often departmental. Certain aspects of
network management might still be managed by a central IT department, in
that a network with decentralized administration often has well-defined
procedures controlling exactly how each administrative task is
performed. -
Hybrid On many
networks, a blend of these two methods is used. A centralized IT
department performs many tasks (generally, the more difficult, delicate
operations, and those with the broadest impact on the network), while
delegating simpler tasks (such as user management) to departmental or
group administrators.
Disaster recovery
The costs of downtime caused by service interruption or data loss can be
substantial, especially in large enterprise networks. As part of your
overall planning,
determine whether a comprehensive IT disaster recovery plan is in place.
If one is in place, this is the time to determine its scope and
effectiveness, as well as to verify that it is being followed. If one
isn’t in place, this is the time to create and implement one.
Document the various data sets being archived, schedules, backup
validation routine, staff assignments, and so on. Make sure there are
provisions for offsite data storage to protect your data in the case of a
catastrophic event, such as a fire, earthquake, or flood.
Examine the following:
-
Systems and servers
Are all critical servers backed up regularly? Are secondary servers,
backup servers, or both available in case of system failure? -
Enterprise data Are regular backups made of core enterprise data stores such as databases, Active Directory, and the like? -
User information
Where is user data stored? Is it routinely archived? Does the backup
routine get all of the information that is important to individuals, or
is some of it stored on users’ personal machines and thus not archived?
Caution
Whatever your current disaster recovery plan is, make sure that it is
being followed before you start making major changes to your network.
Although moving to Windows Server 2012 should not present any major
problems on the network, it’s always better to have your backups and not
need them than the other way around.
Network management tools
This is an excellent
time to assess your current suite of network management tools. Pay
particular attention to those that are unnecessary, incompatible,
redundant, inefficient, or otherwise not terribly useful. You might find
that some of the functionality of those tools is present natively in
Windows Server 2012. Assess the following aspects of your management
tools:
-
Identify the tools currently in use, which tasks they perform, who
uses them, and so on. Make note of administrative tasks that could be
eased with additional tools. -
Decide whether the tools you identified are actually used. A lot of
software ends up sitting on a shelf (or on your hard disk drive) and
never being used. Identifying which tools are truly needed and
eliminating those that aren’t can save you money and simplify the
learning curve for network administrators. -
Disk-management and backup tools deserve special attention because of
file-system changes in Windows Server 2012. These tools are likely to
require upgrading to function correctly under Windows Server 2012.
Defining objectives and scope
A key aspect of planning any large-scale IT deployment
of an operating system is determining the overall objectives for the
deployment and the scope of users, computers, networks, and organization
divisions that are affected. The fundamental question of scope is this:
What can you realistically expect to accomplish in the given time
within existing project constraints, such as staffing and budget?
Some of the objectives that you identified in the early stages of the
project are likely to change as constraints become more apparent and
new needs and requirements emerge. To start with, you must identify who
will be affected—which organizational
subdivisions and which personnel—as well as who will be doing what.
These are questions that map to the business goals that must be
accomplished.
You also must identify the systems that will be affected—which WANs,
local area networks (LANs), subnets, servers, and client systems? In
addition, you must determine the software that will be changed—which
server software, client software, and applications?
Specifying organizational objectives
Many goals of the various business units and IT are only loosely
related, while others are universal—everyone wants security, for
example. Take advantage of the places where goals converge to engage
others in the project. If people can see that their needs are met, they
are more likely to be supportive of others’ goals and the project in
general.
You have business objectives at this point; now they must be
prioritized. You should make lists of various critical aspects of
projects, as well as dependencies within the project plan, as part of
the process of winnowing the big picture into a set of realistic
objectives. Determine what you can reasonably accomplish within the
constraints of the current project. Also, decide what is outside the
practical scope of this Windows Server 2012 deployment but is still important to implement at some later date.
The objectives that are directly related to the IT department will
probably be clearer, and more numerous, after completing the analysis of
the current network. These objectives should be organized to conform to
existing change-management procedures within your enterprise network.
When setting goals, be careful not to promise too much. Although it’s
tempting and sometimes easier in the short run to try to do everything,
you can’t. It’s unlikely that you will implement every single item on
every person’s wish list during the first stage of this project, if at
all. Knowing what you can’t do is as important as knowing what you can.
You should create a project
schedule, laying out the timeline, tasks, and staff assignments.
Including projected completion dates for milestones helps you keep on
top of significant portions of the project and ensure that dependencies
are managed.
You must be realistic when considering timelines—not just a little bit realistic, but really realistic.
This is, after all, your time you are allocating. Estimate too short a
time and you are likely to spend evenings and weekends at the office
with some of your closest coworkers.
A number of tasks will be repeated many times during the rollout of
Windows Server 2012, which should make estimating the time needed for
some things fairly simple: a 1-hour process repeated 25 times takes 25
hours (unless it’s automated). If, for example, you are building 25 new
servers in-house, determine the actual time needed to build one and then
do the math.
When you have a rough idea of the time required, do the following:
-
Assign staff members to the various tasks to make sure you have adequate staff assistance to complete the project. -
Add some time to your estimates—IT projects always seem to take more
time than you thought they would. This is the only buffer you are likely
to get, so make sure you build in some “extra” time from the start. -
As much as possible, verify how long individual tasks take. You might
be surprised at how much time you spend doing a seemingly simple task,
and if your initial estimate is significantly off, you could end up
running significantly short on time. -
Develop a schedule that clearly shows who is doing what and when they are doing it. -
Get drop-dead dates, which should be later than the initial target date. -
Post the schedule in a place where the team, and perhaps other staff,
can view it. Keep this schedule updated with milestones reached,
changes to deliverable dates, and so on.
Note
You might want to use a project-management tool, such as Microsoft
Project, to develop the schedule. This sort of tool is especially useful
when managing a project with a number of staff members working on a set
of interdependent tasks.
Determining the budget is a process constrained by many factors,
including, but not limited to, IT-related costs for hardware and
licensing. In addition to fixed IT costs, you also must consider the
project scope and the
non-IT costs that can come from the requirements of other departments
within the organization. Thus, to come up with the budget, you need
information and assistance from all departments within the organization
and you must consider all aspects of the project.
Many projects end up costing more than is initially budgeted.
Sometimes this is predictable and preventable with proper research and a
bit of attention to ongoing expenses. As with timelines, pad your
estimates a little bit to allow for the unexpected. Even so, it helps if
you can find out how much of a buffer you have for any cost overruns.
In planning the
budget, also keep in mind fiscal periods. If your project is crossing
budget periods, find out if next year’s budget for the project is
allocated and approved.
Allowing for contingencies
No matter how carefully you plan any project, it is unlikely that
everything will go exactly as planned. Accordingly, you should plan for
contingencies that might present themselves. By having a number of
possible responses to unforeseen events ready, you can better manage the
vagaries of the project.
Start with perhaps the most common issue encountered during projects:
problems in getting the assigned people to do the work. This
all-too-common problem can derail any project, or at least cause the
project manager a great deal of stress. After all, the ultimate success
of any project depends on people doing their assigned tasks. Many of
these people are already stretched pretty thin, however, and you might
encounter times when they aren’t quite getting everything done. Your
plan should include what to do in this circumstance—is the person’s
manager brought in, or is a backup person automatically assigned to
complete the job?
Another possibility to plan for is a change in the feature set being
implemented. Should such shifts occur, you must decide how to adjust to
compensate for the reallocated time and money required. To make this
easier, identify and prioritize the following:
Items on both of these lists should be relatively small and
independent of other processes and services. Avoid incurring additional
expenses; you are more likely to be given extra time than extra funding
during your deployment.
In general, ask yourself what could happen to cause significant
problems along the way. Then, more important, consider what you would do
in response. By thinking through potential problems ahead of time and planning what you might do in response, you can be prepared for many of the inevitable bumps along the way.
You have goals, know the timeline, and have a budget pinned down—now
it’s time to get serious. Starting with the highest-priority aspects of
the project, estimate the time and budget needed to complete each
portion. Work your way through the planned scope, assessing the time and
costs associated with each portion of the project. This will help
ensure that you have enough time and budget to successfully complete the
project as designed.
As you finalize the project plan, each team member should review the
final project scope, noting any concerns or questions he or she has
about the proposal. Encourage the team to look for weak spots, unmet
dependencies, and other places where the plan might break down. Although
it is tempting to ignore potential problems that are noted this late in
the game, you do so at your own peril. Avoiding known risks is much
easier than recovering from unforeseen ones.
Defining the new network environment
When you have determined the overall scope
of your Windows deployment project and the associated network changes,
you must develop the technical specifications for the project, detailing
server configuration, changes to the network infrastructure, and so on.
As much as possible, describe the process of transitioning to the new
configuration. Care should be taken while developing this document
because it will serve as the road map for the actual transition, much of
which is likely to be done by staff members who were not in the planning meetings.
In defining the new (updated) network environment, you must review
the current and projected infrastructure for your network. Analyze the
domains in use on your network, and evaluate the implications for
security operations and network performance.
If you are implementing Active Directory for the first time, designing the domain
architecture is probably going to take a substantial amount of work.
Businesses already using Microsoft Windows Server 2008 or Windows Server
2008 Release 2 (R2) to manage their network, on the other hand, will
probably not have to change much, if they change anything at all. Also,
consider whether you are going to be changing the number of domains you
currently have. Will you be getting rid of any domains through
consolidation?
Impact on network operations
You also must assess the impact of the projected changes on your
current network operations. Consider issues such as the following:
-
Will network traffic change in ways that require modifications to the
network infrastructure? Assess additional loads on each network segment
as well as across WAN links. -
Do you need to make changes to network naming or addressing schemes? Are new DNS namespaces needed and, if so, have the DNS names been registered? -
Will you use Read-Only Domain Controllers (RODCs) in remote offices? If so, will you also use read-only DNS (RO DNS) zones? -
Can you phase out NetBIOS and WINS reliance completely? If so, will you use LLMNR and DNS global names?
Identify security requirements
This is a good time to seriously review the security
measures implemented on your network. Scrutinize the security devices,
services, and protocols, as well as administrative procedures to ensure
that they are adequate, appropriate, well documented, and adhered to
rigorously.
Security in Windows Server 2012 is not the same as in early versions
of Windows server operating systems—the security settings for the
default (new)
installation of Windows Server 2012 are much tighter than in those early
versions. This might mean that services that were functioning perfectly
prior to an upgrade don’t work the same way afterward. Some services
that were previously started by default are now disabled when first
installed.
Assign staff members to be responsible for each aspect of your
security plan and have them document the completion of tasks. Among the
tasks that should be assigned are the following:
-
Applying regular updates of virus software Antivirus
software is only as good as its virus definition files, so make sure
yours are current. This means checking the vendor site every day, even
on weekends if possible. Many antivirus packages can perform automatic
updates, yet you should verify that the updates are occurring. -
Reviewing security alerts
Someone should read the various sites that post security alerts on a regular basis, receive their newsletters and alerts, or do both. The sites should include Microsoft (http://technet.microsoft.com/security/), vendors of your other security software (for example, http://www.symantec.com/), network device vendors (for example, http://www.cisco.com/), and at least one non-vendor site (such as http://www.SANS.org/). -
Checking for system software updates
IT staff should
consider implementing the Windows Server Update Services (WSUS) to help
keep up to date on security updates, service packs, and other critical
updates for both servers and clients. Administrators can use WSUS to
automatically scan and download updates to a centralized server and then
configure Group Policy so that client computers get automatic updates
from WSUS. -
Checking for hardware firmware updates
It is important that the various devices on the network, especially security-related ones such as firewalls, have up-to-date firmware.
Changing the administrative approach
While you are rolling out Windows Server 2012 is an excellent time to fine-tune your administration
methods and deal with any issues introduced by the growth and change in
the project scope. Well-designed administrative methods with clearly
documented procedures can make a huge difference in streamlining both
the initial rollout and ongoing operations.
Active Directory provides the framework for flexible, secure network
management, allowing you to implement the administration method that
works best in your environment. There are mechanisms that support both
centralized and distributed administration; group policies offer
centralized control, while selected administrative capabilities can be
securely delegated at a highly granular level. The combination of these
methods allows administration to be handled with the method that works
best for each business in its unique circumstances.
Important
Make sure that all administrative tasks and processes are clearly defined and that each task has a person assigned to it.
Some administrative changes will be required because of the way
Windows Server 2012 works. You might find that existing administration
tools no longer work or are no longer needed. So, be sure to question
the following:
-
Whether your existing tools work under the new
operating system. A number of older tools are incompatible with Windows
Server 2012—management utilities must be Active Directory–aware, work
with NTFS, and so on. -
Whether current tools will be needed once you move to Windows Server
2012. If a utility such as PKZIP, for example, is in use now, it might
not be required for operations under Windows Server 2012, which has
incorporated the functionality of ZIP into the operating system.
Eliminating unneeded tools could well be one goal of the Windows Server
2012 deployment
project, and it will have a definite payoff for the IT department as
well in terms of simplified management, lower costs, and so forth.
Select and implement standards
You will also want to select and implement standards. If your IT department has not implemented standards
for naming and administration procedures, this is a good time to do so.
You’ll be gathering information about your current configuration, which will show you the places where standardization is in place, as well as places where it would be useful.
Make sure that any standards you adopt allow for likely future growth
and changes in the business. Using an individual’s first name and last
initial is a very simple scheme for creating user names and works well
in a small business. Small businesses, however, don’t necessarily stay
small forever—even Microsoft initially used this naming scheme, although
it has been modified greatly over the years.
You can also benefit from standardization of system hardware and
software configuration. Supporting 100 servers (or clients) is much
easier if they share a common set of hardware, are similarly configured,
and have largely the same software installed. This is possible, of
course, only to a limited degree and is dependent on the services and
applications that are required from each system. Still, it’s worth
considering.
When standardizing
server hardware, keep in mind that the minimum functional hardware
differs for various types of servers—that is, application servers have
very different requirements than file servers. Also, consider the impact
of the decisions the IT department makes on other parts of the company
and individual employees. There are some obvious things to watch for,
such as unnecessarily exposing anyone’s personal data—although
surprising numbers of businesses and agencies still do.
Formalized change-management processes are very useful, especially
for large organizations and those with distributed administrative
models. By creating structured change-control processes and implementing
appropriate auditing, you can control the ongoing management of
critical IT processes. This makes it easier to manage the network and reduces the opportunity for error.
Although this is particularly important when dealing with big-picture
issues such as domain creation or Group Policy implementation, some
organizations define change-control mechanisms for every possible
change, no matter how small. You’ll have to determine for which IT
processes you must define change-management processes, finding a balance
between managing changes effectively and over-regulating network
management.
Even if you’re not planning
on implementing a formal change-control process, make sure that the
information about the initial configuration is collected in one spot. By
doing this, and collecting brief notes about any changes that are made,
you will at least have data about the configuration and the changes
that have been made to it. This will also help later on, if you decide
to put more stringent change-control mechanisms in place, by providing
at least rudimentary documentation of the current network state.
Final considerations for planning and deployment
If you are doing a new installation—perhaps, for a new business or a new
location of an existing one—you have a substantial amount of additional
planning to do. This extends well beyond your Windows Server 2012
systems to additional computers (clients, for a start), devices,
services, applications, and so on.
The details of such a project are far beyond the scope of this book;
indeed, entire books have been written on the topic. If you have to
implement a network from the ground up, you might want to pick one up.
You must plan the entire network, including areas such as the following:
-
Infrastructure architecture (including network topology, addressing, DNS, and so on) -
Active Directory design -
Servers and services -
Administration methods -
Network applications -
Clients -
Client applications -
Client devices (printers, scanners, and the like)
This is a considerable undertaking and requires educated, dedicated staff, as well as adequate time and other resources.
|