0% found this document useful (0 votes)
1K views

Active Directory Migration Checklist

This document provides a high-level checklist of tasks for deploying and migrating an Active Directory domain. It outlines key steps such as designing the new domain structure, setting up domain controllers, configuring trusts between domains, preparing applications and users, testing migrations, and performing the live migration. The checklist is not comprehensive or step-by-step, but rather provides an overview of the major activities needed for an Active Directory deployment or migration project.

Uploaded by

Chinni S
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views

Active Directory Migration Checklist

This document provides a high-level checklist of tasks for deploying and migrating an Active Directory domain. It outlines key steps such as designing the new domain structure, setting up domain controllers, configuring trusts between domains, preparing applications and users, testing migrations, and performing the live migration. The checklist is not comprehensive or step-by-step, but rather provides an overview of the major activities needed for an Active Directory deployment or migration project.

Uploaded by

Chinni S
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Active Directory Migration Checklist

During an AD DS greenfield installation and migration, system engineers need checklists to keep up with what
they should be doing to stand up a new domain.  This checklist is a working checklist, one that has been created
here for peer review and peer additions.  This checklist should try and take into account all the high-level items
one needs to look for and do during an AD DS migration.  This checklist is not meant to be a step-by-step guide
but a high-level overview to keep track of what needs to be discovered.

 Design new target domain


 Start discovery (Source domain)
 Determine the type of migration (restructure then migrate, migrate then restructure)
 Setup and build Target domain
o Create the network connections between the Source and Target domains
o Create DNS forwarders from Source to Target and Target to Source domains
o Forklift DNS zone if needed (needed if Source domain contains the zone named, the same
name as the Target domain)
o Mirror sites from the Source domain to the target domain
o Apply schema updates
o Apply appropriate ACLs
o Create Target domain OU structure
 Create trusts between Domains
 Setup migration software in target domain (ADMT)
o Install software
 Target domain
o Set Auditing
 Source domain
 Target domain
o Disable SID filtering
 Source domain
 Target domain
o Enable SIDHistory
 Source domain
 Target domain
o Create migration user accounts
 Source domain
 Target domain
o Create $$$ groups for NETBIOS names of domains
 Source domain
 Target domain
o Setup and prepare password export service
 Source domain (PDC)
 Test migration after installation with a test user
o Troubleshooting
 IT training plan (ongoing)
o Help Desk
o Desktop team
o Server team
o Storage team
o SharePoint team
o Exchange team
o DBA team
o Application team(s)
o Etc.
 Clean up / Delete stale objects
o Users
o Computers
o Groups
o Contacts
o Etc.
 Prepare applications for migration
o Pre-Migrate and synchronize service accounts from Source domain to Target domain
o Configure applications to point to Source domain and Target domain for authentication
 Alternate: Build virtual directory
 Create proxy user accounts
 Point all applications to virtual directory for authentication
o Test authentication
o Loop until finished
 Troubleshooting
 Migrate or build new GPOs
o Loop until finished
 Troubleshooting
 Prepare scripts for migration of objects
o Test group migration and synchronization
 Loop until finished
 Troubleshooting
o Test user migration and synchronization
 Loop until finished
 Troubleshooting
o Test computer migration
 Loop until finished
 Troubleshooting
 Pre-Migrate Groups with SID History from Source domain to Target domain
 Pre-Migrate Users with SID History from Source domain to Target domain
 Migrate contacts from Source domain to Target domain
 Make configuration changes to Exchange if needed
 Create end user communication plan
o Send EU communication email once a week for 4 weeks prior to migration
 Prepare Computers for Migration
 Re-Migrate all Groups
 Re-Migrate all Users
 User Acceptance Testing (UAT)
o Migrate each desktop image for testing (if the business has 5 different images for desktop
deployments, migrate each one)
o Run through the "Start Live Migration" steps for the above images
o Have real users test the migrated desktops in a live production environment
o List all issues
o Troubleshooting
o Loop until comfortable, then proceed
 START LIVE MIGRATION
o Determine and outline back out plans for critical applications
o Define collection of computers and users to be migrated (may or may not include servers)
 GROUP ONE
 Re-Migrate Groups (Collection 1)
 Re-Migrate Users (Collection 1)
 Users enabled in Target domain, disabled in Source domain
 Migrate passwords (if desired)
 Uncheck require to change password (if desired)
 Disable firewalls
 Migrate Computers (Collection 1)
 Troubleshooting
 GROUP TWO
 Re-Migrate Groups (Collection 2)
 Re-Migrate Users (Collection 2)
 Users enabled in Target domain, disabled in Source
domain
 Migrate passwords (if desired)
 Uncheck require to change password (if desired)
 Disable firewalls
 Migrate Computers (Collection 2)
 Troubleshooting
 GROUP ETC.
 Continuously define and re-migrate users and groups
 Move forward with migrating next round of computers and users
 Loop until finished
 Troubleshooting
 File Server migration
o Pray SIDHistory works
o Backup current permissions
o Lay down new permissions based on old permissions with scripts
 Finalize migration
 Set all users in the Source domain to have a new password that is unknown to user
o Ensure all users in the Source domain have been disabled
o Troubleshooting
o Wait one business week
o Shutdown Source domain, Domain Controllers
 Troubleshooting
 End engagement

Active Directory Domain Deployment


Checklist
During an AD DS greenfield installations, system engineers always need checklists to keep up with what they
should be doing to stand up a new domain.  This checklist is a working checklist, one that has been created here
for peer review and peer additions.  This checklist should try and take into account all the high-level items one
needs to look for and do during an AD DS deployment.  This checklist is not meant to be a step-by-step guide
but a high-level overview to keep track of what needs to be discovered.

For a checklist on Active Directory Domain Discovery check out:


https://social.technet.microsoft.com/wiki/contents/articles/38512.active-directory-domain-discovery-
checklist.aspx

 Plan and Design High-Levell Information listed only)


o Number ofForestst
o Number of Domains
o Namespace
 FQDN
 NetBIOS name
o DNS
o FSMO Roles
o Sites and Services
 Stand up new domain
o Assign Domain Name
o Build DCs
 DC Name
 DC IP addressing
 Install AD DS role
 Configure AD DS role
 Complete AD DS configuration
 Restart DCs
o Update DCs
o FSMO placement
 Move FSMO roles
 Schema Master on PDCe of the forest root domain
 Domain Naming Master on PDCe of the forest root domain
 Place RID Master on PDCe in the same domain
 Infrastructure Master on a non-global catalog
 Or
 Infrastructure Master on a global catalog when all DCs are GCs
o Health Checks
 Run diagnostics to ensure health
 Check event logs
o Time sync
 Set PDCe to synchronization with reliable internal or external time source
 GPO to WMI filter time synchronization to PDCe
 or
 Set time settings manually on PDCe
o Backup system state
 As built documentation draft
o Configure security
 DC Security
 Configuration
 BitLocker
 Security Baseline
 AppLocker
 Windows Defender
 Credential Guard
 Windows Firewall
 Block outbound internet
 Black hole proxy (proxy set to 127.0.0.1, allow internally)
 Redirect
 Computers Container
 Users Container
 Set OU Permissions
 Register Schema DLL
 Remove 2 groups - In schema
 Account Operators
 Print Operators
 Adjust Add Workstation to domain
 Remove "Authenticated Users" from being able to add
computers to domain
 Create group to add workstations to domain
 Drop Server Team group into "Add Workstations
to Domain" group
 Drop Desktop Team(s) group into "Add
Workstations to Domain" group
 Create and drop service accounts into "Add
Workstations to Domain" group
 Administrative workstations (PAWs)
 Configuration
 BitLocker
 Security Baseline
 AppLocker
 Windows Defender
 Credential Guard
 Windows Firewall
 Install LAPS
 Install ATA
 Enable DS auditing
 Set appropriate SACLs
 Develop and implement a least-privileged access delegation model
 Verify and audit all delegations and privileged access
 Identify and minimize the number of users who possess privileged access in AD
 Ensure only Domain Controllers have sufficient effective permissions to replicate
secrets in the domain 
 If modified AdminSDHolder, audit effective permissions to make sure you know what
access it is actually entitling
o Create Sites
 Site Mirroring of old/trusted domain (migration)
o DNS Configuration
 Forklift name space(s) (migration)
 Conditional Forwarders
 Secondary Zone
 Enable Scavenging
 On server
 On zone
o Install Central Store
o Install AD Recycle Bin
o Create base OU structure
o Create Trust (if needed)
o Extend Schema
 Exchange
 Gather requirements
 Implement change
 SCCM
 Gather requirements
 Implement change
 Other.
 Gather requirements
 Implement change
o Baseline
 Take a baseline snapshot of the new environment
 Packet capture baseline traffic
 Monitor incoming and outgoing TCP/IP traffic patterns
 Monitor current CPU and RAM utilization levels
 ATA learning burn-in
o Complete "As Built" documentation

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy