Sie sind auf Seite 1von 28

Microsoft Assessment and Planning Toolkit

Getting Started Guide


Version 6.0

Published: May 2011 For the latest information, please see Microsoft.com/TechNet/SolutionAccelerators

Copyright 2011 Microsoft Corporation. All rights reserved. Complying with the applicable copyright laws is your responsibility. By using or providing feedback on this documentation, you agree to the license agreement below. If you are using this documentation solely for non-commercial purposes internally within YOUR company or organization, then this documentation is licensed to you under the Creative Commons AttributionNonCommercial License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc/2.5/ or send a letter to Creative Commons, 543 Howard Street, 5th Floor, San Francisco, California, 94105, USA. This documentation is provided to you for informational purposes only, and is provided to you entirely "AS IS". Your use of the documentation cannot be understood as substituting for customized service and information that might be developed by Microsoft Corporation for a particular user based upon that users particular environment. To the extent permitted by law, MICROSOFT MAKES NO WARRANTY OF ANY KIND, DISCLAIMS ALL EXPRESS, IMPLIED AND STATUTORY WARRANTIES, AND ASSUMES NO LIABILITY TO YOU FOR ANY DAMAGES OF ANY TYPE IN CONNECTION WITH THESE MATERIALS OR ANY INTELLECTUAL PROPERTY IN THEM. Microsoft may have patents, patent applications, trademarks, or other intellectual property rights covering subject matter within this documentation. Except as provided in a separate agreement from Microsoft, your use of this document does not give you any license to these patents, trademarks or other intellectual property. Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, email addresses, logos, people, places and events depicted herein are fictitious. Microsoft, Active Directory, Hyper-V, Internet Explorer, Windows, Windows Azure, Windows NT, Windows Server, and Windows Vista are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. You have no obligation to give Microsoft any suggestions, comments or other feedback ("Feedback") relating to the documentation. However, if you do provide any Feedback to Microsoft then you provide to Microsoft, without charge, the right to use, share and commercialize your Feedback in any way and for any purpose. You also give to third parties, without charge, any patent rights needed for their products, technologies and services to use or interface with any specific parts of a Microsoft software or service that includes the Feedback. You will not give Feedback that is subject to a license that requires Microsoft to license its software or documentation to third parties because we include your Feedback in them.

microsoft.com/solutionaccelerators

Contents
Introduction..........................................................................................1 Quick-Start Guidance............................................................................4 How To Use the MAP Toolkit................................................................11 For More Information..........................................................................18 Appendix A: Prepare Your Environment to Run the MAP Toolkit.........19 Appendix B: Computer Discovery Methods..........................................23

microsoft.com/solutionaccelerators

Introduction
The Microsoft Assessment and Planning (MAP) Toolkit helps you understand your current information technology (IT) infrastructure and determine the Microsoft technologies that best fit your IT needs. The MAP Toolkit is a powerful inventory, assessment, and reporting tool that helps to securely inventory small or large IT environments without requiring the installation of agent software in your environment. The data and analysis that this toolkit provides can significantly simplify the planning process for a wide range of migration projects.

How to Use This Guide


This guide provides users with information about installing and using the MAP Toolkit. It is organized into three sections: An introduction to the MAP Toolkit Quick-start guidance How to use the MAP Toolkit

Use this document as a reference as you get started with the toolkit. A good place to begin is the Quick-Start Guidance section, which offers the essential information you need to put the toolkit to work immediately.

How the MAP Toolkit Works


The MAP Toolkit uses Windows Management Instrumentation (WMI), Active Directory Domain Services (AD DS), SMS Provider, and other technologies to collect data in your environment without using agents. After the data is gathered, you can parse and evaluate it for specific hardware and software needs and requirements. The MAP Toolkit is designed to let you quickly and easily perform an inventory of your hardware environment, assess your current IT infrastructure, and determine the right Microsoft technologies for your IT needs. The data and analysis provided by this toolkit greatly simplify the planning process to migrate software, assess device driver availability, and obtain hardware upgrade recommendations. The MAP Toolkit also gathers performance metrics from computers you are considering for virtualization and includes a feature to model a library of potential host and storage hardware configurations.

Key Features
The MAP Toolkit: Simplifies the planning process to migrate your portable computers, desktop computers, and servers to the Windows 7, Windows Server 2008 R2, and Windows Server 2008 operating systems and Microsoft Office 2010 and Microsoft Office 365. Inventories your infrastructure to assess and verify what is present in your existing environment to best determine hardware and software readiness for migrationfor example, locating and reporting on instances of legacy operating systems such as the Microsoft Windows 2000 operating system. Tracks software usage for software asset management purposes. Assesses readiness and determines what needs to be done to successfully update all the hardware and software inventoried in your environment to the latest standards.
microsoft.com/solutionaccelerators

Microsoft Assessment and Planning Toolkit

Helps identify underutilized resources and the hardware specifications needed to successfully consolidate servers using Microsoft Hyper-V technology. Runs securely in small or large IT environments without requiring you to install agent software on any computers or devices.

Typical Scenarios for Using the MAP Toolkit


You can use the MAP Toolkit to accomplish the following tasks: Determine your infrastructures readiness for Window 7, Microsoft Office 2010, Microsoft Office 365, and Windows Server 2008 R2. Assess and identify computers running Windows Server operating systems in your environment. Assess and identify computers running virtual technologies in your environment. Discover and report on computers running Microsoft, VMware, and Linux platforms, including Linux, Apache, MySQL, and PHP (LAMP) application stacks in your environment. Assess and identify computers that have outdated or lack security-based software (antispyware, antivirus, and firewall products) in your environment. Discover and report on computers that are virtual machine (VM) candidates. Assess and inventory Microsoft SQL Server instances, databases, and components in your environment. Discover MySQL, Oracle and Sybase databases in your environment and assess migrating these to Microsoft SQL Server.

Where to Get the MAP Toolkit


The MAP Toolkit is available as a free download from the Microsoft Download Center. See the Microsoft Assessment and Planning Toolkit page for information.

System Requirements
The MAP Toolkit works with the Windows 7, Windows Vista, Windows XP Service Pack 3, Windows Server 2008 R2, Windows Server 2008, Windows Server 2003 Service Pack 2. For a list of system requirements for the MAP Toolkit, see the System Requirements section of the Microsoft Assessment and Planning Toolkit webpage on the Microsoft Download Center.

Documentation Roadmap
This Getting Started Guide provides information about installing the tool, describes supported assessment scenarios, and shows how to use the results. The MAP Toolkit also includes the following documents and resources: ReadMe. Provides release notes and information you should read before installing the MAP Toolkit, including installation prerequisites and known issues. Software Usage Tracker User Guide. Provides information about using the new Software Usage Tracker feature of the MAP Toolkit. To access this guide, click Start, and then point to All Programs. Point to Microsoft Assessment and Planning Toolkit, and then click Software Usage Tracker Guide.
microsoft.com/solutionaccelerators

Getting Started Guide

Toolkit Help. Provides detailed information about the tool, including wizard options. To access Help, click Help, or click Start, point to All Programs, point to Microsoft Assessment and Planning Toolkit, and then click Toolkit Help.

Solution Accelerators

microsoft.com/technet/SolutionAccelerators

Microsoft Assessment and Planning Toolkit

Quick-Start Guidance
The goal of the quick-start section of this guide is to provide you with the essential information you need to quickly get the MAP Toolkit up and running in your environment and immediately put it to use.

Step 1: Install the MAP Toolkit


Install the MAP Toolkit on a single computer that has access to the network on which you want to conduct an inventory and assessment. The Microsoft Assessment and Planning Toolkit Setup Wizard guides you through the installation of application files and Microsoft SQL Server 2008 R2 Express Edition. By default, the MAP Toolkit will download and install SQL Server 2008 R2 Express Edition during setup. You may also use an existing installation of Microsoft SQL Server 2005 or SQL Server 2008 or SQL Server 2008 R2 if you create an instance named "MAPS" before running the MAP Toolkit installer. The MAP Toolkit requires the collation order of the database engine to be set to "SQL_Latin1_General_CP1_CI_AS". The MAP Toolkit requires a non-default instance of SQL Server 2008 R2 Express. If the computer is already running another instance of SQL Server 2008 R2 Express, the wizard must still install a new instance. This instance is customized for the MAP Toolkit wizards and should not be modified. By default, access to this instance is blocked from remote computers. Access to the instance on the local computer is only enabled for users who have local administrator credentials. If you encounter a problem during installation, refer to the installation log files. The log files are located in the path specified in the %TEMP% environment variable on the local computer. You can find additional troubleshooting information by examining the application and system event logs.

Step 2: Prepare Your Environment


The MAP Toolkit primarily uses Windows Management Instrumentation to collect hardware, device, and software information from the remote computers. In order for the MAP Toolkit to successfully connect and inventory computers in your environment, you have to configure your machines to inventory through WMI and also allow your firewall for remote access through WMI. The MAP Toolkit also requires remote registry access for certain assessments. See Appendix A: Prepare Your Environment to Run the MAP Toolkit for additional details about how to enable WMI and other network configuration requirements. In addition to enabling WMI, you need accounts with administrative privileges to access desktops and servers in your environment.

Step 3: Inventory Your Computers


To start using the MAP Toolkit, you need to inventory the computers in your environment. Inventory assessment is the basis for all the scenarios mentioned in the next section. To inventory your computers 1. Open the MAP Toolkit and select a database or create a new one. Before you start the Inventory and Assessment Wizard: a. Ensure that you have administrative permissions for all computers and Virtual Machines you want to assess.

microsoft.com/solutionaccelerators

Getting Started Guide

b. Determine the required credentials. To determine which credentials are required for your scenario, consult Table 1. This table outlines the assessment scenario and type of credentials that the MAP Toolkit requires to inventory the computers. When the account for the credentials is a domain account, include the domain name (for example, Domain\AccountName or AccountName@Domain). Table 1. Required Credentials Inventory Scenario -Windows-based computers -Exchange Server -Windows Azure Platform Migration Linux-based Computers VMware computers Credentials Required Windows credentials with administrative privileges SSH credentials for Linux servers VMware credentials for VMware servers including vCenter, ESX, ESXi, VMware Server. -For installations using Windows Authentication, use Windows credentials with administrative privileges -For SQL Server Authentication installations, provide native administrator credentials Windows credentials with administrative privileges Administrator credentials

SQL Server

MySQL and Sybase Oracle

2. Open the Inventory and Assessment Wizard. 3. On the Inventory Scenarios page shown in Figure 1, select the appropriate inventory scenario and then click Next.

Solution Accelerators

microsoft.com/technet/SolutionAccelerators

Microsoft Assessment and Planning Toolkit

Figure 1. Select your scenario 4. On the Discovery Methods page shown in Figure 2, select one or more discovery methods and then click Next.

microsoft.com/solutionaccelerators

Getting Started Guide

Figure 2. Select your discovery method The MAP Toolkit can discover computers in your environment, or you can specify which computers to inventory using one of the following methods: AD DS. Use this method if all computers and devices you plan to inventory are in AD DS. Windows networking protocols. Use this method if the computers in the network are not joined to an AD DS domain. Microsoft System Center Configuration Manager. Use this method if you have System Center Configuration Manager in your environment and you need to discover computers that System Center Configuration Manager servers manage. Scan an IP address range. Use this method to target a specific set of computers in a branch office or specific subnets when you only want to inventory those computers. You can also use it to find devices and computers that cannot be found using the Computer Browser service or AD DS. Manually enter computer names. Use this method if you want to inventory a small number of specific computers. Import computer names from a file. Use this method if you have a list of up to 120,000 computer names that you want to inventory. For more information about these computer discovery methods and how to choose which method to use, see Appendix B: Computer Discovery Methods. On the Active Directory Credentials page, provide your domain, domain account, and the password that the MAP Toolkit can use to connect to AD DS, and then click Next. If you choose to use the All Computers Credentials option, define a set of credentials that the MAP Toolkit will use to access the computers you plan to inventory. Complete the following sub-steps: a. On the All Computers Credentials page, click Create to create the accounts that the Inventory and Assessment Wizard uses to complete the inventory process for the collector technologies (WMI, SQL Server, and so on) that you need to use. b. In the Account Entry dialog box, in the Credential section, fill in the appropriate boxes to create a new account. In the Collector Technology section, select the check boxes that correspond to the technologies to which this account applies, and then click Save to save this account or Save and New if you need to create additional accounts. For each technology, the Inventory and Assessment Wizard tries the credentials in the order they appear in the list. To sequence credentials, in the left column, click Credentials Order. On the Summary Review page, verify that all selected scenarios have credentials listed for the appropriate collector technologies. This page also provides information to verify that at least one discovery method was chosen for identifying computers. Review the summary to ensure that you have typed all of your settings correctly. Click Finish to start the inventory process.

5. 6.

7. 8.

9.

While the inventory collection is in progress, MAP provides a status of the progress as seen in Figure 3.

Solution Accelerators

microsoft.com/technet/SolutionAccelerators

Microsoft Assessment and Planning Toolkit

Figure 3. Inventory collection status

1. Total Discovered: These are summary counts for each of the Discovery Collector
types. A total is provided at the bottom that should match the sum of each type. This number may exceed the number of machines on the network because of duplications created by the different methods of discovery. Inventory Data (Guest/Host): This category is used to represent the discovery of a host or other guest machines discovered because they are on the same physical machine. Success: The number of devices where at least one class was collected successfully. Failure: The number of devices where 100% of the collector classes failed. Not Applicable: The number of devices where the collection of 100% of the collector classes was skipped due to a CollectIf test. Object Count: For each collector class type, this is a count of the total number of collector class objects collected across all devices. This column is only provided as a means of validating that the inventory is doing something. We do not expect you to validate the numbers displayed here as there is no way for you to effectively test it. Just make sure that some number, not 0, is being displayed. Duplicates/Inactive Removed: After inventory completes we run a stored proc that removes the duplicate devices by building a list of unique devices. This box just reports the number of duplicates or inactive IP addresses removed so you can
microsoft.com/solutionaccelerators

2. 3. 4. 5. 6.

7.

Getting Started Guide

understand why there is a discrepancy between the sum of the numbers in boxes 5 and 6, and the number of devices you see in the UI and/or reports. When the inventory process is complete, you now have data about computers in your environment that can be used to create reports for analysis. The Inventory and Assessment Wizard must complete its process in order for data to be displayed. If the Wizard is canceled before it can complete the assessment, no data collected during that run will be displayed, even if some machines were shown to be successfully inventoried before the process was canceled.
Note For computers running Windows XP and Windows Server 2003, the number of physical hyperthreading-enabled processors or physical multicore processors is incorrectly reported. For more information, see the Microsoft Help and Support article The number of physical hyperthreading-enabled processors or the number of physical multicore processors is incorrectly reported in Windows XP.

Solution Accelerators

microsoft.com/technet/SolutionAccelerators

10

Microsoft Assessment and Planning Toolkit

Your Next Options


After completing your computer inventory, you can perform several different tasks in the Discovery and Readiness node of the Inventory and Assessment section of the MAP Toolkit. See the section Typical Scenarios for Using the MAP Toolkit earlier in this document for examples. Figure 4 shows this node and section of the MAP Toolkit.

Figure 4. Configure inventory and assessment for your chosen scenario The MAP Toolkit generates a series of reports and proposals that you can use to simplify the planning process for operating system migration and server virtualization. Each report provided allows you to quickly filter results to find detailed information about each computer discovered during the inventory process. The summary proposal document provides presentation-ready information for your use. You can use the Inventory Summary Results Report to help validate inventory results.

Uninstall the Toolkit


You can use the Microsoft Assessment and Planning Toolkit Setup Wizard to uninstall the MAP Toolkit. The wizard provides the option to remove the SQL Server 2008 R2 Express instance and delete files that the application created. The SQL Server 2008 R2 common installation files will not be removed during uninstallation. To uninstall them manually, use the Add/Remove Programs or Programs and Features Control Panel item.

microsoft.com/solutionaccelerators

Getting Started Guide

11

How To Use the MAP Toolkit


When you start the MAP Toolkit, a dialog box asks you to create or select a database to use. The MAP tool gathers detailed data about the networked devices discovered during inventory and stores the data in a SQL Server 2008 R2 Express database. Use a single inventory database for each organization. When you run the wizards to update a database (for example, to include separate network subnets), data is added to the database as appropriate, but data is not deleted from the database. The MAP Toolkit uses wizards to help you configure MAP, perform different assessments, and create reports and proposals. These wizards include: Inventory and Assessment Wizard. Gathers information about the client computers and servers in your environment. Allows you to choose various discovery methods, provide specific credentials, and prioritize the order in which credentials are used. Performance Metrics Wizard. Gathers CPU, memory, storage, and network utilization information about servers in your environment. Hardware Library Configuration Wizard. Preconfigures potential virtual server host machines for use in the Server Consolidation Wizard. Server Consolidation Wizard. Selects a virtualization technology platform and a potential hosts hardware configuration, sets guest and host thresholds, and identifies candidate computers for virtualization. Hyper-V Cloud Fast Track. In this wizard you can select a pre-configured Hyper-V Cloud Fast Track Infrastructure to use for evaluating server consolidation on different OEM Infrastructures. The Microsoft Hyper-V Cloud Fast Track Program is a joint effort between Microsoft and its OEM partners to help organizations quickly develop and implement private clouds, while reducing both the cost and the risk. Each OEM partner will provide Fast Track infrastructures (aka private cloud, rack) per the Fast Track reference architecture and the infrastructures will be running Windows Server, Hyper-V and System Center. Prepare New Reports and Proposals Wizard. Only available after an initial inventory has been completed. Use this wizard to prepare new reports and proposals using the data about your environment gathered when you ran the Inventory and Assessment Wizard, Performance Metrics Wizard, or Server Virtualization Planning Wizard.

The MAP Toolkit has four sections to which you can navigate using wunderbars in the lower left corner of the tool: Inventory and Assessment Software Usage Tracker Surveys Reference Material

Inventory and Assessment


The Inventory and Assessment section displays three nodes in the upper left corner: Discovery and Readiness Inventory Summary Results
microsoft.com/technet/SolutionAccelerators

Solution Accelerators

12

Microsoft Assessment and Planning Toolkit

Performance and Consolidation

Discovery and Readiness


When you select the Discovery and Readiness node, the results pane displays the Client, Server, Virtualization, Database, and Cloud assessments you can complete using the Inventory and Assessment Wizard, as shown in Figure 5.

Figure 5. Discovery and Readiness node of the Inventory and Assessment section These assessments include: Windows 7 Readiness. Indicates which computers in your environment can support the Windows 7 operating system and makes suggestions about the types of hardware upgrades that would be necessary to make all computers ready for Windows 7. This assessment generates a written proposal (Windows7Proposal-date-time.docx) and a detailed report (Windows7HardwareAssessment-date-time.xlsx). Microsoft Office 2010 Assessment. Reports on the versions of Microsoft Office discovered during inventory and provides a summary of the client computers that can be upgraded to Microsoft Office 2010. Windows Server 2008 R2 Readiness. Provides detailed information about which servers in your environment can support the Windows Server 2008 R2 operating system and makes suggestions about the types of hardware upgrades that would be necessary to make all servers ready for Windows Server 2008 R2. This assessment generates a written proposal (WS2008R2Proposal-date-time.docx) and a detailed readiness report (WS2008R2HardwareAssessment-date-time.xlsx). Microsoft SQL Server Discovery. Identifies computers that have SQL Server or SQL Server components installed. It indicates their ability to migrate to SQL Server 2008 R2. The MAP Toolkit also generates a SQL Server Database Details report, which provides detailed information about various SQL Server instances running in your network. This report also shows which databases are installed on each
microsoft.com/solutionaccelerators

Getting Started Guide

13

instance. You can use this information to consolidate SQL Server instances or databases in your environment. Windows Server Roles Discovery. Provides detailed information about all discovered physical computers and VMs running a Windows Server operating system in your environment. These systems are inventoried and analyzed to determine which server roles are installed on the server and to recommend an upgrade path for that server. Windows Server 2008 Readiness. Provides detailed information about which servers in your environment can support Windows Server 2008 and makes suggestions about the types of hardware upgrades that would be necessary to make all servers ready for Windows Server 2008. This assessment generates a written proposal (WS2008Proposal-date-time.docx) and a detailed readiness report (WS2008HardwareAssessment-date-time.xlsx). Virtual Machine Discovery. Reports on all discovered computers running Microsoft and VMware virtualization technologies in your environment. Security Assessment. Identifies computers on which antispyware, antivirus, and firewall products are not found or are out of date as reported through Windows Security Center. Inventory Results Report. Provides details about all discovered computers running Microsoft and Linux operating systems in your environment. Hardware and Software Summary Report. Provides details about hardware and software discovered in your environment. This report lists computers running Windows and Linux operating systems. It also provides details about all applications installed in computers running Windows and a selected list of applications installed on computers running Linux. Windows 2000 Migration Assessment. Provides details about computers running the Windows 2000 operating system in your environment. This report also provides information about the applications installed on each Windows 2000-based computer and lists their current roles. Internet Explorer Migration Assessment. Provides details about Windows Internet Explorer and non-Microsoft browsers deployed in your environment. This report also provides information about the Internet Explorer Add-ons deployed in your environment. Web Application and Database Discovery. Inventories web applications and SQL Server database instances in your environment and reports the information you need to plan the migration of on-premises workloads to Windows Azure Platform. Microsoft SQL Migration Assessment. Discovers and inventories MySQL, Oracle, and Sybase servers in your environment and reports the databases running on those servers.

Inventory Summary Results


When you expand the Inventory Summary Results node, you can choose to view results for All Computers or All Products.

Performance and Consolidation


When you click the Performance and Consolidation node, the results pane describes how the MAP Toolkit can help you prepare for server consolidation by providing recommendations and Windows Azure Platform capacity estimates, as shown in Figure 6.

Solution Accelerators

microsoft.com/technet/SolutionAccelerators

14

Microsoft Assessment and Planning Toolkit

Figure 6. Preparing for server consolidation The MAP Toolkit helps you to gather information about your environment and analyze the results of your assessments to determine how to proceed with your server-consolidation efforts. These steps include wizards and a calculator to help you: Inventory the server environment. Use the Inventory and Assessment Wizard to gather information about your server environment, including hardware configurations, roles, applications, and services running on those computers. Gather performance metrics. Use the Performance Metrics Wizard to gather information about the CPU, memory, disk, and network utilization of computers for a duration you specify. The MAP Toolkit can provide better consolidation recommendations if peak utilization data is gathered. If you know when peak utilization will occur, start capturing data with a leading hour before the peak and set the duration to include an hour after the peak utilization is expected to end. If peak utilization periods are unknown, collect performance data for longer periods of time. If you are attempting to capture utilization information for computers with different peak utilization periods, Microsoft recommends gathering this information over a longer period of time to capture all peak periods or to gather utilization information for each set of computers in different performance metric gathering runs. Performance counters are collected from each computer in five-minute intervals. The number of computers from which the MAP Toolkit can collect performance counter data successfully depends upon factors such as network latency and the responsiveness of servers. If you want to collect performance data for a large number of computers, Microsoft recommends splitting the targets into batches of up to 150 computers.
Note If you have previously gathered performance data, you will be prompted on subsequent performance counter gathering runs to either delete existing data or to append the newly microsoft.com/solutionaccelerators

Getting Started Guide gathered data to what was collected previously. If you split up your target computers to improve performance, select No in the Performance Data Exists dialog box.

15

Configure host and run analysis engine. Use the Server Consolidation Wizard to help in planning your server virtualization effort. In this wizard, you can select a virtualization technology platform, set a virtual host machines hardware configuration, manage assessment properties, and identify which computers you would like to virtualize. Use the Hardware Library Configuration Wizard to create and manage oftenused hardware configurations for quick what-if analysis. Hyper-V Cloud Fast Track. In this wizard you can select a pre-configured Hyper-V Cloud Fast Track Infrastructure to use for evaluating server consolidation on different OEM Infrastructures. The Microsoft Hyper-V Cloud Fast Track Program is a joint effort between Microsoft and its OEM partners to help organizations quickly develop and implement private clouds, while reducing both the cost and the risk. Each OEM partner will provide Fast Track infrastructures (aka private cloud, rack) per the Fast Track reference architecture and the infrastructures will be running Windows Server, Hyper-V and System Center. View Windows Azure Migration Portfolio. The MAP Toolkit will gather performance details for web applications and databases deployed in your environment. You then create an Application scenario by choosing the Web Applications, SQL databases, and Servers that compose an Application deployed in your environment. Using this information, MAP will provide an estimate of the capacity required to support your application after migrating it to the Windows Azure Platform as well as insight into critical issues that must be taken into consideration when migrating the application. Calculate potential return on investment (ROI). You can evaluate potential ROI associated with the consolidation recommendations the MAP Toolkit makes using Alineans Integrated Virtualization ROI calculator. The MAP Toolkit generates an XML file at the end of every server consolidation assessment. Import the XML file into the Alinean Integrated Virtualization ROI Calculator to analyze potential ROI. For more information, see Return on Investment Analysis for Server Consolidation Assessment.
Note The MAP Toolkit internally uses a capacity-modeling engine to model resource utilization of servers. In some cases, the modeling engine will not be able to make an exact match for servers in your environment. The MAP Toolkit will attempt to match your selection to the model resource utilization, which may result in resource utilization estimates that vary from the actual utilization. You should use the consolidation recommendations made by the MAP Toolkit for initial planning purposes. Use Microsoft System Center products to actively monitor and fine-tune production environments.

Software Usage Tracker


The Usage Tracker capability in the MAP Toolkit helps you gather information about users and devices that access Microsoft core server products in your environment. This data can significantly simplify the inventory process for client access license reporting. For more information, see the Software Usage Tracker User Guide.

Surveys
The Surveys section provides links to surveys, as shown in Figure 7.

Solution Accelerators

microsoft.com/technet/SolutionAccelerators

16

Microsoft Assessment and Planning Toolkit

Figure 7. The Surveys section of the MAP Toolkit The Surveys section provides links to questionnaires that you can complete: Optimized Desktop. This links to the landing page for the Windows Optimized Desktop Scenarios Assessment Guide and the Windows Optimized Desktop Scenario Selection Tool on Microsoft TechNet. The Windows Optimized Desktop Scenarios relate business requirements for a flexible, efficient, and managed desktop environment to sets of complementary Microsoft technologies by defining and using five standard user scenarios that map business requirements to technology solutions. These core scenarios are Office Worker, Mobile Worker, Task Worker, Contract Worker, and workers who need to Access from Home.

Reference Material
The Reference Material section provides links to a wide variety of resources, as shown in Figure 8.

microsoft.com/solutionaccelerators

Getting Started Guide

17

Figure 8. The Reference Material section of the MAP Toolkit The Reference Material section includes links to additional information about: Deployment. Includes application compatibility, automated installation kits, user state migration, and so on. Operations. Includes infrastructure planning, configuration management, change review, management, and so on. Products. Includes operating systems, management tools, developer tools, and so on. Security. Includes security guidance, trustworthy computing sites, Microsoft and TechNet security centers, and so on. Virtualization. Includes a wide variety of resources on the topic of virtualization.

Solution Accelerators

microsoft.com/technet/SolutionAccelerators

18

Microsoft Assessment and Planning Toolkit

For More Information


The following is a list of resources for learning more about the MAP Toolkit and how to use it: For how-to videos and case studies, visit the Microsoft TechNet Microsoft Assessment and Planning Toolkit webpage. To interact with other members of the MAP community, learn more about the tool, and get help with questions, visit the MAP Community Forum on TechNet. To send feedback or suggestions for improving the MAP Toolkit, send email to mapfdbk@microsoft.com. For questions about how to install the MAP Toolkit, including details about prerequisites, download and refer to the Release Notes.

For answers to frequently asked questions about the MAP Toolkit, see the MAP Toolkit Frequently Asked Questions. Support for the MAP Toolkit is provided through Microsoft Product Support Services (PSS). Premier customers should contact Premier Support for assistance. Support offerings and regional contact information can be found on the Solution Accelerators Support page.

Feedback
To send feedback or suggestions for improving the MAP Toolkit, see the Microsoft Assessment and Planning site on Microsoft TechNet.

microsoft.com/solutionaccelerators

Getting Started Guide

19

Appendix A: Prepare Your Environment to Run the MAP Toolkit


To prepare to use the MAP Toolkit in your environment, you first need to make specific configurations to remote computers. To run the MAP Toolkit wizards, the only required configuration is to allow the Windows Firewall (where appropriate) to enable remote access to WMI. This section describes this and other configurations that might need to be completed before using the MAP Toolkit.

Windows Management Instrumentation


WMI is used to collect hardware, device, and software information from the remote computers. This inventory method is required for all assessment scenarios and must be enabled on all remote computers. The Inventory and Assessment Wizard will not provide an option to enable WMI: You must enable it through Group Policy settings, logon scripts, or manually on each computer. To connect remotely and perform the WMI inventory, you must provide accounts that are members of the local Administrators group on the computer being inventoried. For most networks, the network administrator will have a domain or local account that is a member of the local Administrators group on all the computers in the environment. These are the accounts you should enter on the Active Directory Credentials page in the Inventory and Assessment Wizard to perform the WMI inventory. By default, in Windows domain environments, the Domain Admins security group is added to the local Administrators group on a computer when it is joined to a domain. Table A-1 describes all of the common WMI considerations for the Inventory and Assessment Wizard. Table A-1. WMI Considerations Configuration Set password for local accounts Description If a computer is in a workgroup and the local account used for inventory does not have a password configured, by default, logon is limited to the console. For a WMI inventory of the computer to be successful, the local account needs to be a member of the local Administrators group and must have a password defined. If the computer is in a workgroup, you must manually change the Network access: Sharing and security model for local accounts policy setting from Guest only to Classic on the local computer. For more information, see Network access: Sharing and security model for local accounts.

Configure network access policy

Solution Accelerators

microsoft.com/technet/SolutionAccelerators

20

Microsoft Assessment and Planning Toolkit

Configuration Enable Remote Administration exception

Description Enable the Remote Administration exception for computers that have Windows Firewall enabled. This exception opens TCP port 135. If you have another host firewall installed, you will need to allow network traffic through this port. To allow for remote administration

1. Click Start, and then click Run. In the Open box, type
gpedit.msc, and then click OK. 2. Under Console Root, expand Computer Configuration\Administrative Templates\Network\Network Connections\Windows Firewall, and then click Domain Profile. 3. Right-click Windows Firewall: Allow remote administration exception, and then click Properties. 4. Click Enabled, and then click OK. Enable File and Printer Sharing exception Enable the File and Printer Sharing exception for computers that have Windows Firewall enabled. This exception opens TCP ports 139 and 445 as well as User Datagram Protocol (UDP) ports 137 and 138. If you have another host firewall installed, you will need to allow network traffic through these ports. Many host-based and software-based firewall products will block DCOM traffic across the network adapters on the computer. For example, remote WMI connections will likely fail when attempting to connect to a computer running the Microsoft Internet Security and Acceleration (ISA) Server firewall service. To enable remote WMI access, make sure that the TCP/UDP ports mentioned previously for the Remote Administration and File and Printer Sharing exceptions are open on the computer running the software firewall. To successfully inventory computers in a workgroup that are running operating systems that support User Account Control (UAC), use an account that is part of local Administrators group and has UAC disabled for that account. Computers running Windows Firewall introduce some challenges to the inventory process. By default, Windows Firewall is configured to block remote requests to authenticate and connect to the computer via WMI. The following sections describe how to enable the required exceptions using Group Policy and scriptable commands.

Other WMI connectivity information

Active Directory Environments


Use the Group Policy Editor or the Group Policy Management Console to edit Group Policy for the organizational units (OUs) that contain the computers on which you will perform the assessment. For instructions, see the following resources: For Windows XP, see the Microsoft Help and Support article How To Use the Group Policy Editor to Manage Local Computer Policy in Windows XP. For Windows Vista, see the Microsoft Help and Support article Deploying Group Policy Using Windows Vista.

microsoft.com/solutionaccelerators

Getting Started Guide

21

For Windows 7, see the Microsoft Help and Support article What's New in Group Policy.

To enable Windows Firewall exceptions using Group Policy 1. Using the Local Group Policy Editor, expand Computer Configuration\Windows Settings\Security Settings\Local Policies, and then click Security Options. 2. In the Network access: Sharing and security model for local accounts section, click Classic local users authenticate as themselves. 3. Expand Computer Configuration\Administrative Templates\Network\Network Connections\Windows Firewall, and then click Domain Profile. 4. In the Windows Firewall: Allow remote administration exception section, click Enabled. 5. In the Allow unsolicited incoming messages from box, type the IP address or subnet of the computer that will be performing the inventory. 6. In the Windows Firewall: Allow file and print sharing exception section, click Enabled. 7. In the Allow unsolicited incoming messages from box, type the IP address or subnet of the computer performing the inventory. After saving the policy changes, you need to wait for up to two hours for the Group Policy settings to be applied to the client computers.

Workgroups and Windows NT 4.0-based Domains


For computers in a workgroup, you need to manually configure each computer. For computers in a Windows NT 4.0based domain, use logon scripts to configure the Windows Firewall exceptions. To configure Windows Firewall exceptions for workgroups and Windows NT 4.0 based domains 1. Using the Local Security Policy tool available from the Administrative Tools menu of the computer to be inventoried, click Security Settings, click Local Policies, and then click Security Options. 2. In the Network access: Sharing and security model for local accounts section, click Classic local users authenticate as themselves. 3. Manually run the following command, or run it from a logon script on each computer to enable the remote administration exception: netsh firewall add portopening protocol=tcp port=135 name=DCOM_TCP135 4. Manually run the following command, or run it from a logon script on each computer to enable the file and printer sharing exception: netsh firewall set service type=fileandprint mode=enable profile=all

Remote Registry Service


The Remote Registry service is used to find the roles installed on a server. It is also required for running the Performance Metrics Wizard. This service is installed on Windowsbased clients and servers, but the following conditions must exist for this inventory method to be successful: The Remote Registry service must be started. On Windows operating systems prior to Windows Vista and Windows 7, it is configured to start automatically by default. The Windows Firewall Remote Administration exception must be enabled.
microsoft.com/technet/SolutionAccelerators

Solution Accelerators

22

Microsoft Assessment and Planning Toolkit

You must authenticate using local Administrator equivalent privileges.

If the Remote Registry service is disabled on a server, enable it before performing the inventory. You can either manually enable the service or configure it to start via Group Policy and wait until the servers are restarted (and the service starts) before starting the Windows Server 2008 Hardware Assessment or Performance Metrics Wizard. To manually enable the Remote Registry service 1. On the computer on which you want to access Reliability Monitor data, click Start, right-click Computer, and then click Manage. Microsoft Management Console starts. 2. In the navigation pane, expand Services and Applications, and then click Services. 3. In the console pane, right-click Remote Registry, and then click Start.

microsoft.com/solutionaccelerators

Getting Started Guide

23

Appendix B: Computer Discovery Methods


MAP can discover computers in your environment or you can specify which computers to inventory using one of the following methods: AD DS Windows networking protocols Import computer names from a file Scan an IP address range Manually enter computer names System Center Configuration Manager

Active Directory Domain Services


This method allows you to query a domain controller via the Lightweight Directory Access Protocol (LDAP) and select computers in all or specific domains, containers, or OUs. Use this method if all computers and devices are in AD DS. Microsoft recommends that you not use the AD DS method together with the standard Windows networking protocols inventory method. Using only the AD DS method can significantly improve the time required to complete the inventory. Computers that have not been logged onto the AD DS domain for more than 90 days will not be inventoried. This inventory method has the following characteristics: Scope. This inventory method identifies all computers running Microsoft operating systems that AD DS manages. Process. AD DS queries return a list of computer objects defined in AD DS, which WMI then uses to perform a detailed inventory. Limitations. This method supports up to 120,000 computer objects per domain per run of the AD DS inventory method. If there are more than 120,000 computers, the additional objects will not be reported in the inventory results. Credentials required. The wizard requires a domain account that is to be used to query AD DS. At a minimum, this account should be a member of the Domain Users group in the domain. For each computer to be included in the WMI inventory process, the wizard also requires an account that is a member of the local Administrators group on that computer.

Windows Networking Protocols


This method uses the WIN32 LAN Manager application programming interfaces to query the Computer Browser service for computers in workgroups and Windows NT 4.0based domains. If the computers on the network are not joined to an Active Directory domain, use only the Windows networking protocols option to find computers. If you are inventorying computers in workgroups or Windows NT 4.0 domains and there are also computers joined to an AD DS domain, use this inventory method and also select the option to find computers using AD DS.

Solution Accelerators

microsoft.com/technet/SolutionAccelerators

24

Microsoft Assessment and Planning Toolkit

If the Windows Networking Protocols page of the wizard does not provide a list of workgroups, Windows NT 4.0 domains, or AD DS domain NetBIOS names, ensure that the Computer Browser and Server services are running on the computer performing inventory. For help, see Troubleshooting the Microsoft Computer Browser Service. This inventory method has the following characteristics: Scope. This inventory method identifies the computers on a network that are running Microsoft operating systems. If your organization has multiple LAN segments, you must run the wizard on each LAN segment to find all workgroups. Process. The computer browser broadcasts a message on the network to which most Windows-based computers will respond, which identifies the computers running on the network. For each computer on the network that supports WMI, the WMI collector gathers detailed hardware and software inventory from each identified computer. Limitations. There are no limits to the number of WMI clients that can be scanned. However, WMI inventory collects a lot of information on each client and inventory of a large number of WMI clients takes additional time.

Import Computer Names from a File


Using this method, you can create a text file with a list of computer names that will be inventoried. Each computer name should be on a new line and the file should not use delimiters, such as comma, period, or tab. Use this method if you have a list of up to 120,000 computer names that you want to inventory. The imported file can contain computer names, NetBIOS names, or fully qualified domain names (FQDN). Only one file can be imported each time you run the wizard.

Scan an IP Address Range


This method allows you to specify the starting address and ending address of an IP address range. The wizard will then scan all IP addresses in the range and inventory only those computers. The IP address range computer discovery method is limited to scanning only 100,000 IP addresses at one time. If you have more addresses than the limit, run the wizard multiple times, specifying different IP address ranges each time you run the wizard. The following recommendations are provided for the IP address range computer discovery method: Use this method to specifically target a set of computers in a branch office or specific subnets when you only want inventory performed on those computers. Use this method to find devices and computers that cannot be found using the Computer Browser service or AD DS. Limit the size of the IP address range provided. This will reduce the time required to perform inventory.

Manually Enter Computer Names


This method enables you to test and inventory a few computers at a time. Use this method if you want to inventory a small number of specific computers. You can manually enter computer names, NetBIOS names, or FQDNs. For each computer, you will need to provide credentials that have local Administrator access.

microsoft.com/solutionaccelerators

Getting Started Guide

25

System Center Configuration Manager


This method enables you to inventory computers managed by System Center Configuration Manager. You need to provide credentials to the System Center Configuration Manager server in order to inventory the managed computers.

Solution Accelerators

microsoft.com/technet/SolutionAccelerators

Das könnte Ihnen auch gefallen