Beruflich Dokumente
Kultur Dokumente
Published: May 2011 For the latest information, please see Microsoft.com/TechNet/SolutionAccelerators
Copyright 2011 Microsoft Corporation. All rights reserved. Complying with the applicable copyright laws is your responsibility. By using or providing feedback on this documentation, you agree to the license agreement below. If you are using this documentation solely for non-commercial purposes internally within YOUR company or organization, then this documentation is licensed to you under the Creative Commons AttributionNonCommercial License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc/2.5/ or send a letter to Creative Commons, 543 Howard Street, 5th Floor, San Francisco, California, 94105, USA. This documentation is provided to you for informational purposes only, and is provided to you entirely "AS IS". Your use of the documentation cannot be understood as substituting for customized service and information that might be developed by Microsoft Corporation for a particular user based upon that users particular environment. To the extent permitted by law, MICROSOFT MAKES NO WARRANTY OF ANY KIND, DISCLAIMS ALL EXPRESS, IMPLIED AND STATUTORY WARRANTIES, AND ASSUMES NO LIABILITY TO YOU FOR ANY DAMAGES OF ANY TYPE IN CONNECTION WITH THESE MATERIALS OR ANY INTELLECTUAL PROPERTY IN THEM. Microsoft may have patents, patent applications, trademarks, or other intellectual property rights covering subject matter within this documentation. Except as provided in a separate agreement from Microsoft, your use of this document does not give you any license to these patents, trademarks or other intellectual property. Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, email addresses, logos, people, places and events depicted herein are fictitious. Microsoft, Active Directory, Hyper-V, Internet Explorer, Windows, Windows Azure, Windows NT, Windows Server, and Windows Vista are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. You have no obligation to give Microsoft any suggestions, comments or other feedback ("Feedback") relating to the documentation. However, if you do provide any Feedback to Microsoft then you provide to Microsoft, without charge, the right to use, share and commercialize your Feedback in any way and for any purpose. You also give to third parties, without charge, any patent rights needed for their products, technologies and services to use or interface with any specific parts of a Microsoft software or service that includes the Feedback. You will not give Feedback that is subject to a license that requires Microsoft to license its software or documentation to third parties because we include your Feedback in them.
microsoft.com/solutionaccelerators
Contents
Introduction..........................................................................................1 Quick-Start Guidance............................................................................4 How To Use the MAP Toolkit................................................................11 For More Information..........................................................................18 Appendix A: Prepare Your Environment to Run the MAP Toolkit.........19 Appendix B: Computer Discovery Methods..........................................23
microsoft.com/solutionaccelerators
Introduction
The Microsoft Assessment and Planning (MAP) Toolkit helps you understand your current information technology (IT) infrastructure and determine the Microsoft technologies that best fit your IT needs. The MAP Toolkit is a powerful inventory, assessment, and reporting tool that helps to securely inventory small or large IT environments without requiring the installation of agent software in your environment. The data and analysis that this toolkit provides can significantly simplify the planning process for a wide range of migration projects.
Use this document as a reference as you get started with the toolkit. A good place to begin is the Quick-Start Guidance section, which offers the essential information you need to put the toolkit to work immediately.
Key Features
The MAP Toolkit: Simplifies the planning process to migrate your portable computers, desktop computers, and servers to the Windows 7, Windows Server 2008 R2, and Windows Server 2008 operating systems and Microsoft Office 2010 and Microsoft Office 365. Inventories your infrastructure to assess and verify what is present in your existing environment to best determine hardware and software readiness for migrationfor example, locating and reporting on instances of legacy operating systems such as the Microsoft Windows 2000 operating system. Tracks software usage for software asset management purposes. Assesses readiness and determines what needs to be done to successfully update all the hardware and software inventoried in your environment to the latest standards.
microsoft.com/solutionaccelerators
Helps identify underutilized resources and the hardware specifications needed to successfully consolidate servers using Microsoft Hyper-V technology. Runs securely in small or large IT environments without requiring you to install agent software on any computers or devices.
System Requirements
The MAP Toolkit works with the Windows 7, Windows Vista, Windows XP Service Pack 3, Windows Server 2008 R2, Windows Server 2008, Windows Server 2003 Service Pack 2. For a list of system requirements for the MAP Toolkit, see the System Requirements section of the Microsoft Assessment and Planning Toolkit webpage on the Microsoft Download Center.
Documentation Roadmap
This Getting Started Guide provides information about installing the tool, describes supported assessment scenarios, and shows how to use the results. The MAP Toolkit also includes the following documents and resources: ReadMe. Provides release notes and information you should read before installing the MAP Toolkit, including installation prerequisites and known issues. Software Usage Tracker User Guide. Provides information about using the new Software Usage Tracker feature of the MAP Toolkit. To access this guide, click Start, and then point to All Programs. Point to Microsoft Assessment and Planning Toolkit, and then click Software Usage Tracker Guide.
microsoft.com/solutionaccelerators
Toolkit Help. Provides detailed information about the tool, including wizard options. To access Help, click Help, or click Start, point to All Programs, point to Microsoft Assessment and Planning Toolkit, and then click Toolkit Help.
Solution Accelerators
microsoft.com/technet/SolutionAccelerators
Quick-Start Guidance
The goal of the quick-start section of this guide is to provide you with the essential information you need to quickly get the MAP Toolkit up and running in your environment and immediately put it to use.
microsoft.com/solutionaccelerators
b. Determine the required credentials. To determine which credentials are required for your scenario, consult Table 1. This table outlines the assessment scenario and type of credentials that the MAP Toolkit requires to inventory the computers. When the account for the credentials is a domain account, include the domain name (for example, Domain\AccountName or AccountName@Domain). Table 1. Required Credentials Inventory Scenario -Windows-based computers -Exchange Server -Windows Azure Platform Migration Linux-based Computers VMware computers Credentials Required Windows credentials with administrative privileges SSH credentials for Linux servers VMware credentials for VMware servers including vCenter, ESX, ESXi, VMware Server. -For installations using Windows Authentication, use Windows credentials with administrative privileges -For SQL Server Authentication installations, provide native administrator credentials Windows credentials with administrative privileges Administrator credentials
SQL Server
2. Open the Inventory and Assessment Wizard. 3. On the Inventory Scenarios page shown in Figure 1, select the appropriate inventory scenario and then click Next.
Solution Accelerators
microsoft.com/technet/SolutionAccelerators
Figure 1. Select your scenario 4. On the Discovery Methods page shown in Figure 2, select one or more discovery methods and then click Next.
microsoft.com/solutionaccelerators
Figure 2. Select your discovery method The MAP Toolkit can discover computers in your environment, or you can specify which computers to inventory using one of the following methods: AD DS. Use this method if all computers and devices you plan to inventory are in AD DS. Windows networking protocols. Use this method if the computers in the network are not joined to an AD DS domain. Microsoft System Center Configuration Manager. Use this method if you have System Center Configuration Manager in your environment and you need to discover computers that System Center Configuration Manager servers manage. Scan an IP address range. Use this method to target a specific set of computers in a branch office or specific subnets when you only want to inventory those computers. You can also use it to find devices and computers that cannot be found using the Computer Browser service or AD DS. Manually enter computer names. Use this method if you want to inventory a small number of specific computers. Import computer names from a file. Use this method if you have a list of up to 120,000 computer names that you want to inventory. For more information about these computer discovery methods and how to choose which method to use, see Appendix B: Computer Discovery Methods. On the Active Directory Credentials page, provide your domain, domain account, and the password that the MAP Toolkit can use to connect to AD DS, and then click Next. If you choose to use the All Computers Credentials option, define a set of credentials that the MAP Toolkit will use to access the computers you plan to inventory. Complete the following sub-steps: a. On the All Computers Credentials page, click Create to create the accounts that the Inventory and Assessment Wizard uses to complete the inventory process for the collector technologies (WMI, SQL Server, and so on) that you need to use. b. In the Account Entry dialog box, in the Credential section, fill in the appropriate boxes to create a new account. In the Collector Technology section, select the check boxes that correspond to the technologies to which this account applies, and then click Save to save this account or Save and New if you need to create additional accounts. For each technology, the Inventory and Assessment Wizard tries the credentials in the order they appear in the list. To sequence credentials, in the left column, click Credentials Order. On the Summary Review page, verify that all selected scenarios have credentials listed for the appropriate collector technologies. This page also provides information to verify that at least one discovery method was chosen for identifying computers. Review the summary to ensure that you have typed all of your settings correctly. Click Finish to start the inventory process.
5. 6.
7. 8.
9.
While the inventory collection is in progress, MAP provides a status of the progress as seen in Figure 3.
Solution Accelerators
microsoft.com/technet/SolutionAccelerators
1. Total Discovered: These are summary counts for each of the Discovery Collector
types. A total is provided at the bottom that should match the sum of each type. This number may exceed the number of machines on the network because of duplications created by the different methods of discovery. Inventory Data (Guest/Host): This category is used to represent the discovery of a host or other guest machines discovered because they are on the same physical machine. Success: The number of devices where at least one class was collected successfully. Failure: The number of devices where 100% of the collector classes failed. Not Applicable: The number of devices where the collection of 100% of the collector classes was skipped due to a CollectIf test. Object Count: For each collector class type, this is a count of the total number of collector class objects collected across all devices. This column is only provided as a means of validating that the inventory is doing something. We do not expect you to validate the numbers displayed here as there is no way for you to effectively test it. Just make sure that some number, not 0, is being displayed. Duplicates/Inactive Removed: After inventory completes we run a stored proc that removes the duplicate devices by building a list of unique devices. This box just reports the number of duplicates or inactive IP addresses removed so you can
microsoft.com/solutionaccelerators
2. 3. 4. 5. 6.
7.
understand why there is a discrepancy between the sum of the numbers in boxes 5 and 6, and the number of devices you see in the UI and/or reports. When the inventory process is complete, you now have data about computers in your environment that can be used to create reports for analysis. The Inventory and Assessment Wizard must complete its process in order for data to be displayed. If the Wizard is canceled before it can complete the assessment, no data collected during that run will be displayed, even if some machines were shown to be successfully inventoried before the process was canceled.
Note For computers running Windows XP and Windows Server 2003, the number of physical hyperthreading-enabled processors or physical multicore processors is incorrectly reported. For more information, see the Microsoft Help and Support article The number of physical hyperthreading-enabled processors or the number of physical multicore processors is incorrectly reported in Windows XP.
Solution Accelerators
microsoft.com/technet/SolutionAccelerators
10
Figure 4. Configure inventory and assessment for your chosen scenario The MAP Toolkit generates a series of reports and proposals that you can use to simplify the planning process for operating system migration and server virtualization. Each report provided allows you to quickly filter results to find detailed information about each computer discovered during the inventory process. The summary proposal document provides presentation-ready information for your use. You can use the Inventory Summary Results Report to help validate inventory results.
microsoft.com/solutionaccelerators
11
The MAP Toolkit has four sections to which you can navigate using wunderbars in the lower left corner of the tool: Inventory and Assessment Software Usage Tracker Surveys Reference Material
Solution Accelerators
12
Figure 5. Discovery and Readiness node of the Inventory and Assessment section These assessments include: Windows 7 Readiness. Indicates which computers in your environment can support the Windows 7 operating system and makes suggestions about the types of hardware upgrades that would be necessary to make all computers ready for Windows 7. This assessment generates a written proposal (Windows7Proposal-date-time.docx) and a detailed report (Windows7HardwareAssessment-date-time.xlsx). Microsoft Office 2010 Assessment. Reports on the versions of Microsoft Office discovered during inventory and provides a summary of the client computers that can be upgraded to Microsoft Office 2010. Windows Server 2008 R2 Readiness. Provides detailed information about which servers in your environment can support the Windows Server 2008 R2 operating system and makes suggestions about the types of hardware upgrades that would be necessary to make all servers ready for Windows Server 2008 R2. This assessment generates a written proposal (WS2008R2Proposal-date-time.docx) and a detailed readiness report (WS2008R2HardwareAssessment-date-time.xlsx). Microsoft SQL Server Discovery. Identifies computers that have SQL Server or SQL Server components installed. It indicates their ability to migrate to SQL Server 2008 R2. The MAP Toolkit also generates a SQL Server Database Details report, which provides detailed information about various SQL Server instances running in your network. This report also shows which databases are installed on each
microsoft.com/solutionaccelerators
13
instance. You can use this information to consolidate SQL Server instances or databases in your environment. Windows Server Roles Discovery. Provides detailed information about all discovered physical computers and VMs running a Windows Server operating system in your environment. These systems are inventoried and analyzed to determine which server roles are installed on the server and to recommend an upgrade path for that server. Windows Server 2008 Readiness. Provides detailed information about which servers in your environment can support Windows Server 2008 and makes suggestions about the types of hardware upgrades that would be necessary to make all servers ready for Windows Server 2008. This assessment generates a written proposal (WS2008Proposal-date-time.docx) and a detailed readiness report (WS2008HardwareAssessment-date-time.xlsx). Virtual Machine Discovery. Reports on all discovered computers running Microsoft and VMware virtualization technologies in your environment. Security Assessment. Identifies computers on which antispyware, antivirus, and firewall products are not found or are out of date as reported through Windows Security Center. Inventory Results Report. Provides details about all discovered computers running Microsoft and Linux operating systems in your environment. Hardware and Software Summary Report. Provides details about hardware and software discovered in your environment. This report lists computers running Windows and Linux operating systems. It also provides details about all applications installed in computers running Windows and a selected list of applications installed on computers running Linux. Windows 2000 Migration Assessment. Provides details about computers running the Windows 2000 operating system in your environment. This report also provides information about the applications installed on each Windows 2000-based computer and lists their current roles. Internet Explorer Migration Assessment. Provides details about Windows Internet Explorer and non-Microsoft browsers deployed in your environment. This report also provides information about the Internet Explorer Add-ons deployed in your environment. Web Application and Database Discovery. Inventories web applications and SQL Server database instances in your environment and reports the information you need to plan the migration of on-premises workloads to Windows Azure Platform. Microsoft SQL Migration Assessment. Discovers and inventories MySQL, Oracle, and Sybase servers in your environment and reports the databases running on those servers.
Solution Accelerators
microsoft.com/technet/SolutionAccelerators
14
Figure 6. Preparing for server consolidation The MAP Toolkit helps you to gather information about your environment and analyze the results of your assessments to determine how to proceed with your server-consolidation efforts. These steps include wizards and a calculator to help you: Inventory the server environment. Use the Inventory and Assessment Wizard to gather information about your server environment, including hardware configurations, roles, applications, and services running on those computers. Gather performance metrics. Use the Performance Metrics Wizard to gather information about the CPU, memory, disk, and network utilization of computers for a duration you specify. The MAP Toolkit can provide better consolidation recommendations if peak utilization data is gathered. If you know when peak utilization will occur, start capturing data with a leading hour before the peak and set the duration to include an hour after the peak utilization is expected to end. If peak utilization periods are unknown, collect performance data for longer periods of time. If you are attempting to capture utilization information for computers with different peak utilization periods, Microsoft recommends gathering this information over a longer period of time to capture all peak periods or to gather utilization information for each set of computers in different performance metric gathering runs. Performance counters are collected from each computer in five-minute intervals. The number of computers from which the MAP Toolkit can collect performance counter data successfully depends upon factors such as network latency and the responsiveness of servers. If you want to collect performance data for a large number of computers, Microsoft recommends splitting the targets into batches of up to 150 computers.
Note If you have previously gathered performance data, you will be prompted on subsequent performance counter gathering runs to either delete existing data or to append the newly microsoft.com/solutionaccelerators
Getting Started Guide gathered data to what was collected previously. If you split up your target computers to improve performance, select No in the Performance Data Exists dialog box.
15
Configure host and run analysis engine. Use the Server Consolidation Wizard to help in planning your server virtualization effort. In this wizard, you can select a virtualization technology platform, set a virtual host machines hardware configuration, manage assessment properties, and identify which computers you would like to virtualize. Use the Hardware Library Configuration Wizard to create and manage oftenused hardware configurations for quick what-if analysis. Hyper-V Cloud Fast Track. In this wizard you can select a pre-configured Hyper-V Cloud Fast Track Infrastructure to use for evaluating server consolidation on different OEM Infrastructures. The Microsoft Hyper-V Cloud Fast Track Program is a joint effort between Microsoft and its OEM partners to help organizations quickly develop and implement private clouds, while reducing both the cost and the risk. Each OEM partner will provide Fast Track infrastructures (aka private cloud, rack) per the Fast Track reference architecture and the infrastructures will be running Windows Server, Hyper-V and System Center. View Windows Azure Migration Portfolio. The MAP Toolkit will gather performance details for web applications and databases deployed in your environment. You then create an Application scenario by choosing the Web Applications, SQL databases, and Servers that compose an Application deployed in your environment. Using this information, MAP will provide an estimate of the capacity required to support your application after migrating it to the Windows Azure Platform as well as insight into critical issues that must be taken into consideration when migrating the application. Calculate potential return on investment (ROI). You can evaluate potential ROI associated with the consolidation recommendations the MAP Toolkit makes using Alineans Integrated Virtualization ROI calculator. The MAP Toolkit generates an XML file at the end of every server consolidation assessment. Import the XML file into the Alinean Integrated Virtualization ROI Calculator to analyze potential ROI. For more information, see Return on Investment Analysis for Server Consolidation Assessment.
Note The MAP Toolkit internally uses a capacity-modeling engine to model resource utilization of servers. In some cases, the modeling engine will not be able to make an exact match for servers in your environment. The MAP Toolkit will attempt to match your selection to the model resource utilization, which may result in resource utilization estimates that vary from the actual utilization. You should use the consolidation recommendations made by the MAP Toolkit for initial planning purposes. Use Microsoft System Center products to actively monitor and fine-tune production environments.
Surveys
The Surveys section provides links to surveys, as shown in Figure 7.
Solution Accelerators
microsoft.com/technet/SolutionAccelerators
16
Figure 7. The Surveys section of the MAP Toolkit The Surveys section provides links to questionnaires that you can complete: Optimized Desktop. This links to the landing page for the Windows Optimized Desktop Scenarios Assessment Guide and the Windows Optimized Desktop Scenario Selection Tool on Microsoft TechNet. The Windows Optimized Desktop Scenarios relate business requirements for a flexible, efficient, and managed desktop environment to sets of complementary Microsoft technologies by defining and using five standard user scenarios that map business requirements to technology solutions. These core scenarios are Office Worker, Mobile Worker, Task Worker, Contract Worker, and workers who need to Access from Home.
Reference Material
The Reference Material section provides links to a wide variety of resources, as shown in Figure 8.
microsoft.com/solutionaccelerators
17
Figure 8. The Reference Material section of the MAP Toolkit The Reference Material section includes links to additional information about: Deployment. Includes application compatibility, automated installation kits, user state migration, and so on. Operations. Includes infrastructure planning, configuration management, change review, management, and so on. Products. Includes operating systems, management tools, developer tools, and so on. Security. Includes security guidance, trustworthy computing sites, Microsoft and TechNet security centers, and so on. Virtualization. Includes a wide variety of resources on the topic of virtualization.
Solution Accelerators
microsoft.com/technet/SolutionAccelerators
18
For answers to frequently asked questions about the MAP Toolkit, see the MAP Toolkit Frequently Asked Questions. Support for the MAP Toolkit is provided through Microsoft Product Support Services (PSS). Premier customers should contact Premier Support for assistance. Support offerings and regional contact information can be found on the Solution Accelerators Support page.
Feedback
To send feedback or suggestions for improving the MAP Toolkit, see the Microsoft Assessment and Planning site on Microsoft TechNet.
microsoft.com/solutionaccelerators
19
Solution Accelerators
microsoft.com/technet/SolutionAccelerators
20
Description Enable the Remote Administration exception for computers that have Windows Firewall enabled. This exception opens TCP port 135. If you have another host firewall installed, you will need to allow network traffic through this port. To allow for remote administration
1. Click Start, and then click Run. In the Open box, type
gpedit.msc, and then click OK. 2. Under Console Root, expand Computer Configuration\Administrative Templates\Network\Network Connections\Windows Firewall, and then click Domain Profile. 3. Right-click Windows Firewall: Allow remote administration exception, and then click Properties. 4. Click Enabled, and then click OK. Enable File and Printer Sharing exception Enable the File and Printer Sharing exception for computers that have Windows Firewall enabled. This exception opens TCP ports 139 and 445 as well as User Datagram Protocol (UDP) ports 137 and 138. If you have another host firewall installed, you will need to allow network traffic through these ports. Many host-based and software-based firewall products will block DCOM traffic across the network adapters on the computer. For example, remote WMI connections will likely fail when attempting to connect to a computer running the Microsoft Internet Security and Acceleration (ISA) Server firewall service. To enable remote WMI access, make sure that the TCP/UDP ports mentioned previously for the Remote Administration and File and Printer Sharing exceptions are open on the computer running the software firewall. To successfully inventory computers in a workgroup that are running operating systems that support User Account Control (UAC), use an account that is part of local Administrators group and has UAC disabled for that account. Computers running Windows Firewall introduce some challenges to the inventory process. By default, Windows Firewall is configured to block remote requests to authenticate and connect to the computer via WMI. The following sections describe how to enable the required exceptions using Group Policy and scriptable commands.
microsoft.com/solutionaccelerators
21
For Windows 7, see the Microsoft Help and Support article What's New in Group Policy.
To enable Windows Firewall exceptions using Group Policy 1. Using the Local Group Policy Editor, expand Computer Configuration\Windows Settings\Security Settings\Local Policies, and then click Security Options. 2. In the Network access: Sharing and security model for local accounts section, click Classic local users authenticate as themselves. 3. Expand Computer Configuration\Administrative Templates\Network\Network Connections\Windows Firewall, and then click Domain Profile. 4. In the Windows Firewall: Allow remote administration exception section, click Enabled. 5. In the Allow unsolicited incoming messages from box, type the IP address or subnet of the computer that will be performing the inventory. 6. In the Windows Firewall: Allow file and print sharing exception section, click Enabled. 7. In the Allow unsolicited incoming messages from box, type the IP address or subnet of the computer performing the inventory. After saving the policy changes, you need to wait for up to two hours for the Group Policy settings to be applied to the client computers.
Solution Accelerators
22
If the Remote Registry service is disabled on a server, enable it before performing the inventory. You can either manually enable the service or configure it to start via Group Policy and wait until the servers are restarted (and the service starts) before starting the Windows Server 2008 Hardware Assessment or Performance Metrics Wizard. To manually enable the Remote Registry service 1. On the computer on which you want to access Reliability Monitor data, click Start, right-click Computer, and then click Manage. Microsoft Management Console starts. 2. In the navigation pane, expand Services and Applications, and then click Services. 3. In the console pane, right-click Remote Registry, and then click Start.
microsoft.com/solutionaccelerators
23
Solution Accelerators
microsoft.com/technet/SolutionAccelerators
24
If the Windows Networking Protocols page of the wizard does not provide a list of workgroups, Windows NT 4.0 domains, or AD DS domain NetBIOS names, ensure that the Computer Browser and Server services are running on the computer performing inventory. For help, see Troubleshooting the Microsoft Computer Browser Service. This inventory method has the following characteristics: Scope. This inventory method identifies the computers on a network that are running Microsoft operating systems. If your organization has multiple LAN segments, you must run the wizard on each LAN segment to find all workgroups. Process. The computer browser broadcasts a message on the network to which most Windows-based computers will respond, which identifies the computers running on the network. For each computer on the network that supports WMI, the WMI collector gathers detailed hardware and software inventory from each identified computer. Limitations. There are no limits to the number of WMI clients that can be scanned. However, WMI inventory collects a lot of information on each client and inventory of a large number of WMI clients takes additional time.
microsoft.com/solutionaccelerators
25
Solution Accelerators
microsoft.com/technet/SolutionAccelerators