Preparing for Microsoft Office 2000 Distribution One key to reducing total cost of ownership (TCO) is efficient, cost-effective software distribution. To plan an effective distribution of Office 2000, you must first inventory essential software and hardware. This chapter explains how to accomplish this task with Microsoft Systems Management Server. Requirements and Considerations for a Successful Inventory To distribute software in complex networked environments, you must have a clear picture of the current network setup. This setup includes network infrastructure, server and workstation operating systems, application environment, and user needs. You also need to consider physical factors such as geographical constraints or remote-user needs. The more information you can compile, the easier it will be for you to create an effective distribution plan with an efficient workflow. The first diagram below shows how recommended deployment decisions are influenced by software and the second diagram illustrates the same information for hardware. Exchange Consider deploying Off ice 2000 w ithout Outlook 2000 initially, then launching as accelerated an Outlook 2000 deployment schedule as possible Determine E-Mail Client Sof tw are and Version Inventory Workstation Softw are E-Mail Determine Microsoft Off ice Version Off ice Off ice 95 Educate users as to the diff erences betw een Off ice 2000 binary f ormat and Off ice 95 Off ice 97 Outlook (97 or 98) No additional planning is necessary Standard Remove all Of fice 97 applications in CIW. Standard or Professional? Converter Professional Decide on f ile Dual-Save format strategy OS No Leave Access 97 in place; this option can be set in CIW. You can choose to deploy Access 2000 later. Win95 Type of Operating System Win95 Service Pack or Higher?***w hat is required?*** NT Win98 Assess cost of converting the important Access 97 Databases. Can it be budgeted and planned bef ore deployment? Off ice 95 solution: deploy Of fice 97converters Off ice 2000 solution: training and dual-save formats Deploy converters to all Off ice 95 users via EMail or scripts Edit MST to def ault to dual-save, implement policies to maintain setting Yes Add conversion to timeline, plan for completion bef ore deployment. Remove Access 97 in CIW. Win98 Service Pack 1 or Higher? *** w hat is required?*** No No Plan for deployment of NT Service Packs previous to the Of fice deployment schedule NT Service Pack 3 or Higher? Yes If SP3, consider upgrading to SP4; if this is not possible, consider deploying addtl hotf ixes Leave Access 95 in place; this option can be set in CIW. You can choose to deploy Access 2000 later if you w ish to save disk space. Assess cost of converting the important Access 95 Databases. Can it be budgeted and planned bef ore deployment? Yes Add conversion to timeline, plan for completion bef ore deployment. Remove Access 95 in CIW. Figure 6.1 Assessing workstation software. The software inventory should determine: Operating system (including service pack level). For example, if you are using Windows NT, Service Pack 4 is considered a basic requirement for Office features such as the Office Server Extensions. You can also use Windows NT infrastructure for security and configuration. E-mail client type. For example, you should migrate Exchange clients early, and you often have to perform a few more steps to take care of Personal Address Books and Schedule+ data. Current installed version of Office. For example: this can drive coexistence requirements, which can in turn drive viewer and converter deployment, selection of default File Save settings, and so on. Here is how recommended deployment decisions are influenced by hardware: Enough Hard Disk Space avail for Installation? Yes Enough Hard Disk Space to allow Rollback? No No Consider asking users to clear space on the hard disk, otherwise upgrade Put in place recovery plans and warn users rollbacks will not be available; check whether mission critical applications exist Yes Memory meets or exceeds req'd configuration? Yes No Upgrade Memory Is the Processor Pentium or Higher? No Replace the system, or consider a Terminal Server solution for numerous lower end clients Figure 6.2 Assessing whether workstation hardware can sustain the upgrade. The hardware inventory should determine: Amount of memory. The available memory can determine which Office components you will install, your rollback options, and so on. Remaining hard disk space on the system disk. For example, Processor type. This can determine performance to varying degrees. In client-server applications, processors on servers and in workstations affect performance. How effectively you deal with these factors depends heavily on how accurately you inventory and understand the target system. Planning the Assessment Inventory, analysis of the results, report creation, and testing in the laboratory form the bulk of the work performed before schedules are created and planning is finalized. Typically, this pre-deployment work should take anywhere from 60 percent to 80 percent of the entire deployment schedule. If this work is done properly, then a successful deployment can be completed relatively quickly. The following sections describe the kinds of information that need to be gathered. Keep in mind that your inventory will have to determine which previous versions of Office will be upgraded, as the upgrade prerequisites vary. In particular, keep a clear distinction between Office 95 installations and Office 97 installations. Initial Preparations During the inventory process, you should be prepared to expect the unexpected. For example, MCS reviewed early reports (before the site visit) and conducted in-depth interviews with users to determine the operating systems that were in place. These sources indicated that MCS would find only Office 95 and Windows 95 in the field. A thorough inventory process revealed that a wide range of operating systems and software were actually in use. Testing performed in the laboratory had to be adjusted as MCS discovered the true situation. For instance, while the group deploying Office 2000 had a limited number of Macintosh machines, a significant percentage of the rest of the company used Macintoshes, Microsoft Office 98 for the Macintosh, and Eudora Pro. Consequently, testing had to take into account how compatible the new Office 2000 configurations might be with the customer’s Macintosh population. In short, allowances for preparation time should be flexible. You must be prepared to reorganize based on new information—and that new information may arrive daily. Do not hesitate to refocus testing plans to accommodate new discoveries made during this period. Accurate Inventory of Hardware and Software The success of any deployment greatly depends on the administrator’s ability to anticipate potential problems. Gathering accurate data on user’s software and hardware is critical when determining priorities for time-intensive tasks such as upgrading RAM, hard disks, or replacing a CPU in anticipation of the new environment. Unfortunately, it is quite common to have little or no inventory data available. When it is available, users’ systems often change too rapidly to get a reliable snapshot. Administrators frequently have to scramble to get an accurate and timely picture. This customer used Microsoft’s very powerful Systems Management Server (SMS) to gather inventory data. However, one issue was that SMS relies on users logging in before inventories are conducted. Some users wait for days before cycling power or exiting their sessions. Once hardware data was gathered, it appeared that roughly 40 machines were not being captured in the inventory—probably due to problems with the KixStart script interfering with the new SMS client. What was captured though was accurate and useful raw data on the hardware side. This usefulness of this data proved that is was worthwhile to configure SMS. Obtaining accurate information on the wide range of installed software (and the various versions of that software) on users’ systems proved very challenging. Classic SMS software inventory required building a file, AUDIT.RUL, that compared CRC checks of particular files to a list that mapped the results back to particular software names and version numbers. This meant MCS had to know precisely what was being searched for—taking into account all the possible patches and upgrades to both operating systems and applications software. Given the fact that even Windows NT users had local administrator privileges, there was little hope for truly consistent configurations across the board. A matrix of all the possibilities confirmed that at least twenty-five possible variations could exist—and the actual number was probably higher. In the end, since even a relatively targeted scan of over 50 applications was known to occasionally slow down logons, the customer’s administrators were reluctant to use it. Because most companies update and patch software on a regular basis, conducting centralized software inventories is a major challenge. Administrators need to be careful that their software inventory requests are not so complicated that they impact workstation performance. Yet, if they target the query too narrowly, they risk missing slight variations to the original software they intended to document. This was the problem that MCS encountered. To make matters worse, conducting an unobtrusive software inventory was difficult because of the customer’s low-grade hardware (there were still several 486 systems) and many different types of software installed. Accordingly, MCS began experimenting during this period with other ways to capture critical-software information. Some methods were used at previous sites and some were developed for this particular deployment. The key to this process was prioritizing what was most important, and narrowing down the requirements. The sections below explain what information was regarded as important to gather, and why. When applicable, the methods MCS used in this case are described. Briefly summaries of early attempts follow: First, MCS built a custom package to obtain software inventory via relatively lightweight queries to the users’ registries—a method that also could be counted on to capture more information than the usual IDX file. The package could be sent as part of the logon script if SMS was not available for some reason—a good side benefit for future customers who lack the SMS infrastructure. Second, MCS focused on extracting the versions of the logged on e-mail clients from the Exchange server logon window. This is described more detail later in this chapter.