Assignment Writing Help on Desktop Migration Proposal from Windows 7 to Windows 8

Desktop Migration Proposal from Windows 7 to Windows 8

Introduction

Over the years, software upgrading has become a routine in information technology (IT). Although this might appear to be a waste of time, it helps in enhancing software (Sinchak, 2013). In this report, I will act as a system administrator who has been hired by HACKM, LLC Company to upgrade the company’s system from windows 7 to window 8 without losing files. The company has five hundred laptops/computers that run windows 7. In relation to this, the company would want to migrate to windows 8 and utilize this window as efficiently as possible. Currently, the laptop/computer configuration for windows 7 are Intel Core i3 second generation processor, 4 USB 2.0 USB ports, 21 inch LCD monitor, 350GB hard drive, 10/100/1000 network card and 4GB RAM memory. In addition to system upgrade, the company’s manager has been getting many requests for tablet computers. Accordingly, as I upgrade windows 7 to windows 8, I will also research and recommend the right tablet the company should acquire for its employees.  

New hardware

Before upgrading the company’s system to windows 8, it will be important to evaluate whether the current hardware will be compatible with windows 8.  The first thing in this case will be to evaluate the speed of the processor. This will be necessary because windows 8 require a processor of at least 1 GHz. With regard to this hardware, the second generation Intel Core i3 processor that is available will be suitable because its speed is higher than 1 GHz. The second thing to evaluate will be the size of the memory. For effective migration, the memory size should be at least 1 GB (32-bit) or 2 GB (64-bit), but 4 GB would be the best for full functionality in 64-bit (May, 2012). In my case, I do not require new memory because the current memory of 4 GB will be good for full functionality. The third thing to evaluate will be the size of the hard drives. The minimum hard drives required for effective migration to windows 8 are at least 20 GB for 64-bit and 16 GB for 32-bit (Minasi et al., 2010). The size of the company’s hard drives is 350GB. This means that I do not need to change the company’s hard drives or upgrade them. Nonetheless, I may need to create enough space for each of the hard drives by cleaning them. Even though I will not change the current hardware, I will require either a USB flash drive or an external hard drive to store back up files and other documents.  

After ensuring that all hardware will be compatible with windows 8 and deleting the incompatible ones, I will then select an installation method. At this point, I will have two options. First, I will have the option of upgrading windows 7 to windows 8. Second, I will have the option of erasing every file and then installing new files. Nonetheless, because this is an upgrade process, I will go for the first option of upgrading windows 7 to windows 8. This method will be easier and faster because I will not have to erase files and install new ones (Johnson, 2013). After selecting the installation method and option, I will then install windows 8 and configure user settings. The following diagram illustrates the entire installation process.  

Migrating while minimizing downtime for end users

In order to migrate effectively while minimizing downtime for end users, I will prepare everything before initiating the migration program. By this I mean that I will ensure that everything that I will require will be ready. I will also ensure that all the company’s computers will be compatible with windows 8 and that none will be troublesome during the migration process. Apart from ensuring that everything will be ready, I will also create a virtual machine for all users to keep their documents, files and folders. This virtual machine will also host all shared documents. On the other hand, before initiating the migration process, I will conduct a compatibility test on one of the computers (May, 2012). With the help of this test, I will be able to tell whether the process will be efficient. In case the process will not be efficient, I will address the challenges. Once I successfully conduct this process, I will anticipate that all computers will run windows 8 efficiently. By so doing, I will be able to minimize downtime during the migration process.

Recommended tablet for end-users

Before recommending the right tablet computer, it would be paramount to pinpoint that different tablets serve different needs. Accordingly, the right tablet for this company should be based on the nature of work that company’s employee perform on daily basis (Johnson, 2013). In addition, recommended tablet should be compatible with windows 8. As at now, I would recommend Dell venue 8 tablets. This tablet computer is compatible with windows 8 and fits the nature of work employees do in this company.     

Linking to Microsoft account

Program developers such as Microsoft continually update their software. This provides users with additional features. For this reason, during the migration process, I will link users to Microsoft account. Although this will not serve any purpose now, it will be helpful later on when there will be updates from Microsoft. Failing to linking users to Microsoft account will mean that I will later on link them to this account. If I link them later on, then Microsoft will request for log in details and I might not have them. In order to address this challenge, I will link users to Microsoft account now so that they can update windows anytime there will be updates from Microsoft (Minasi et al., 2010).

Using group policies

By definition, group policies are restrictions used to specify computer settings or the scope that groups of users can go in utilizing resources. Based on this understanding, group policies manage computer environments as well as users by enforcing IT policies. For this reason, they simplify administrative tasks as well as help in implementing security settings. In order to protect the company from unauthorized access, I will implement group policies (Minasi et al., 2010). These policies will define what users can do and they cannot do on their computers as well as what they can do or not do with their log in details. For this reason, as opposed to implementing local based group policies, I will implement domain based group policies. These policies will restrict users from utilizing some resources based on log in details rather than on computers. As a result, the company’s employees will be able to use any computer in the company, but their access to company’s resources will be limited based on their log in details.       

Managing storage

Storage will be managed by creating storage pools and storage spaces. On one hand, storage pools will comprise of two or more physical disks that will be used for storing data. However, they will not be directly used by the rest of the windows unless I authorized it. On the other hand, storage spaces will be user-configurable spaces that can be used directly by the rest of the windows. This means that users will be able to access some data while they will not be able to access others that will be under the IT department (Johnson, 2013).  

Offline files

During the migration process, I will utilize offline files because users will be able to access them easily. I will also utilize offline files because these files will enhance networking and simplify the migration process by keeping server files in synchronization mode (Pogue, 2013).

Networking

During the migration process, I will utilize both wireless and wired network. The wireless networking will be utilized on tablets while wired network will be utilized on personal computers and other devices. However, in order to secure the company’s system, I will implement all security measures together with utilizing firewall. To a great extent, firewall will block external threats and to some extent internal threats. On the other hand, windows 8 support both IPv4 and IPv6, but with time, IPv4 has become less efficient than IPv6 (Amoss, & Minoli, 2007). For this reason, IPv6 is now taking over from IPv4. Based on this fact, I will implement IPv6 settings rather than implementing IPv4 settings. This will facilitate high internet connectivity because more IP addresses will be available for internet connection. Nonetheless, I will not disable IPv4 because some features may work perfectly with this setting. I will do this because in some instances windows 8 prefer communicating with IPv4 before communicating with IPv6 (Tulloch, 2014). In order to ensure that IPv6 setting will be enabled, I will routinely confirm this from network connections folder from windows 8.   

Folder sharing

Given that system upgrade will be taking place as the company runs, then folders will be shared via local network. In this case, I will create a central computer that will handle all folders in the company and the said computer will be used and accessed by all company employees. This means that company’s employees will have a virtual machine from which folders will be kept for them. SkyDrive will not be used because this device might force me to acquire other applications that will not be in the company (Pogue, 2013).       

System protection

During the migration process, it will be paramount to ensure that data will not be lost. For this reason, it will be necessary to back up all documents, files, videos and other important documents using an external device. For my case, I will copy important documents and keep them in an external hard drive (Knittel, & McFedries, 2012). This will be for security purposes rather than for anything else. Accordingly, after the migration process will be over, I will not require backups even though I might opt to keep them until users connect to the internet.  

Security

It is common knowledge that every time a device is connected to the internet that device is vulnerable to all forms of cyber attacks. In order to address this challenge, I will implement the following encryption security measures to protect the company from possible attacks. First, I will make use of all trusted boot features in windows 8. I will do this because I am aware that some malware programs launch attacks right at the boot process. As a result, they attack computer devices way before windows start or even before antimalware software start. To address this challenge, I will install UEFI 2.3.1. This device will ensure that malwares that target boot process do not succeed in attacking the company’s system before windows 8 start. Second, I will also move antimalware software into windows 8 trusted boot feature. This will ensure that in case malwares manage to tamper with the boot process, windows 8 will detect that problem and repair it automatically (Amoss, & Minoli, 2007). Third, apart from enhancing the boot process right at the start, I will also enhance it at other stages by measuring it. This process will enable all aspects of boot process to be quantified, signed and stored in trusted platform module chips.   

On the other hand, to protect company’s data from theft and illegal access, I will do the following. First, I will implement bitlocker drive encryption. This process will encrypt all hard drives in the company rather than encrypting some files. Although this operation will take more time, it will offer more protection especially to laptops that may go missing at any given time. To execute this process, I will utilize bitlocker feature on windows 8. In other words, I will manually enable bitlocker feature because it does not activate automatically. Second, I will make use of applocker technology to restrict users from using or installing non-standard software (Johnson, 2013). Unlike access control technologies that deny access to unauthorized people, this technology will enable me to create a group policy that will prevent non-approved applications from running on company’s system. This practice will protect the company from external attacks. Third, apart from restricting users from installing or using non-standard programs, I will also protect the company from malicious internet-based programs using smart application reputation. By installing this technology, I will ensure that users will not download programs from the internet. This will not only protect the company from viruses, but it will also protect the company’s system from crashing (Minasi et al., 2010). Fourth, I will also make use of claim-based access control. With the help of this feature, I will set up and manage policies for using shared resources, folders and files. In addition, I will give users access to data based on their roles in the company. By so doing, I will secure the company from possible attacks from within the company.

Monitoring workstation

Monitoring workstation will be an essential part of the migration process. This will not only ensure that migration process does not interfere with the way the company runs, but it will also ensure that computers perform as expected. As part of the monitoring process, I will monitor CPU usage of all computers and ensure that only the right program will be installed on the company’s system. This will enhance performance by ensuring that only the right programs will be installed. On the other hand, I will centralize all information into one computer so that as I upgrade windows 7 to windows 8, I will be able to monitor the performance of other computers (Pogue, 2013). This will not only help me in detecting possible errors in the migration process, but it will also help me in tackling those problems as soon as they arise. By so doing, I will minimize downtime thereby enhance performance. 

Virtualization features

Virtualization stimulates an application running on another computer device and in so doing; it allows one to run an entire operating system as though it is an application program. By this, it helps one to work on various operating systems without rebooting. For my case, virtualization will help me to operate both windows 7 and windows 8 without rebooting computers. In relation to this fact, I will utilize client hyper-V feature on windows 8. This feature will help me to upgrade windows 7 to windows 8 without rebooting computers as well as without purchasing additional hardware. I will also use virtualization to test for compatibility features in the two windows. To install hyper-V, I will go to the control panel and turn windows features on. Afterwards, I will check the hyper-V box and click OK (Knittel, & McFedries, 2012).        

Conclusion

In this report, I have taken the role of a system administrator in charge of upgrading windows 7 to windows 8 for HACKM, LLC Company. Based on what the company utilizes now, I have established that I will not change the current hardware. However, I will require an USB hard drive or an external hard drive for backup purposes. I have outlined what I will do at various stages to ensure the installation process will be successful and utilize windows 8 efficiently. I have also recommended the right computer tablet the company’s manager may acquire for employees. In order to minimize downtime, I have proposed to make the necessary preparations before initiating the migration process.  

References

Amoss, J., & Minoli, D. (2007). Handbook of ipv4 to ipv6 transition: methodologies for institutional and corporate networks. Boca Raton: CRC Press.

Johnson, S. (2013). Microsoft windows 8: illustrated introductory. Stamford: Cengage Learning.

Knittel, B., & McFedries, P. (2012). Windows 8 in depth. Indianapolis: Que Publishing.

May, S. (2012). Windows 8 for tablets plain & simple. Redmond, Wash: Microsoft Press.

Minasi, M. et al. (2010). Mastering Microsoft Windows Server 2008 R2. New York, NY: John Wiley & Sons.

Pogue, D. (2013). Windows 8. Beijing, Sebastopol: O’Reilly.

Sinchak, S. (2013). Windows 8 tweaks. Hoboken, New Jersey: John Wiley & sons.

Tulloch, M. (2014). Training guide: Installing and configuring Windows Server 2012 R2. Redmond, Wash: Microsoft Pre