DEBUG 4GL bad syntax=7=4GL|x|0|0|PARA|BOX|1. To propose a project to migrate data from an on-site Azure library to OneDrive for Business and/or SharePoint Online.
DEBUG 4GL bad syntax=7=4GL|x|0|0|PARA|BOX|2. To use the proven nine-step data migration methodology that mitigates risk and eliminates the threat of loosing business data.
DEBUG 4GL bad syntax=7=4GL|x|0|0|PARA|BOX|3. To begin with an evaluation step to plan the plan, to identify exactly what needs to be migrated and to determine the most applicable migration method.
DEBUG 4GL bad syntax=7=4GL|x|0|0|PARA|BOX|1. To understand that the SharePoint Migration Tool (SPMT) has a maximum capacity of 250 MB of data in any one package - that is at least 3400 packages to be migrated.
DEBUG 4GL bad syntax=7=4GL|x|0|0|PARA|BOX|2. To understand that many hundreds of expensive software products are available to undertake such a data migration - no market leader exists because SharePoint online is very new - ShareGate is recommended by Microsoft at 3995 USD.
DEBUG 4GL bad syntax=7=4GL|x|0|0|PARA|BOX|3. To understand that network speed will become a limiting factor and just the network delay to move all this data will exceed 24 hours.
DEBUG 4GL bad syntax=7=4GL|x|0|0|PARA|BOX|1. To identify what data cannot be converted and migrated such as:
DEBUG 4GL bad syntax=7=4GL|x|0|0|PARA|BOX|   (1) Invalid files such as EXE, MSI and COM.
DEBUG 4GL bad syntax=7=4GL|x|0|0|PARA|BOX|   (2) Corrupt files.
DEBUG 4GL bad syntax=7=4GL|x|0|0|PARA|BOX|   (3) Hidden Folders.
DEBUG 4GL bad syntax=7=4GL|x|0|0|PARA|BOX|   (4) Temporary files.
DEBUG 4GL bad syntax=7=4GL|x|0|0|PARA|BOX|   (5) Compressed files as ZIP, RAR and CMP.
DEBUG 4GL bad syntax=7=4GL|x|0|0|PARA|BOX|   (6) Locked for update files.
DEBUG 4GL bad syntax=7=4GL|x|0|0|PARA|BOX|   (7) Old user permissions.
DEBUG 4GL bad syntax=7=4GL|x|0|0|PARA|BOX|   (8) Invalid characters and symbols.
DEBUG 4GL bad syntax=7=4GL|x|0|0|PARA|BOX|   (9) Files where the folder and file name length exceeds 250 characters.
DEBUG 4GL bad syntax=7=4GL|x|0|0|PARA|BOX|2. To check expensive third party tools such as shareGate, backupify, adpoint, sideload - this is a one-off task that will make it hard to cost justify the purchase of such tools.
DEBUG 4GL bad syntax=7=4GL|x|0|0|PARA|BOX|3. To check who owns the business data - access rights and limitations.
DEBUG 4GL bad syntax=7=4GL|x|0|0|PARA|BOX|4. To design-in a full fallback capability - see nine-step methodology.
DEBUG 4GL bad syntax=7=4GL|x|0|0|PARA|BOX|5. To check what business data has been password protected by people who are no longer available to access the data.
DEBUG 4GL bad syntax=7=4GL|x|0|0|PARA|BOX|6. To create a CSV file holding a list of all user email addresses that have permissions to access the folders and files - only data w
DEBUG 4GL bad syntax=7=4GL|x|0|0|PARA|BOX|7. To understand that Office 365 supports Word, Excel and PowerPoint so any other file type is not a supported file type and may have no benefit in being migrated to the cloud because it could not be accessed.
DEBUG 4GL bad syntax=7=4GL|x|0|0|PARA|BOX|1. To understand that the migration methodology step 2 requires governance issues to be evaluated and resolved.
DEBUG 4GL bad syntax=7=4GL|x|0|0|PARA|BOX|2. To evaluate how permissions and other document meta-data is to be migrated as:
DEBUG 4GL bad syntax=7=4GL|x|0|0|PARA|BOX|   (1) author.
DEBUG 4GL bad syntax=7=4GL|x|0|0|PARA|BOX|   (2) created date.
DEBUG 4GL bad syntax=7=4GL|x|0|0|PARA|BOX|   (3) last changed date.
DEBUG 4GL bad syntax=7=4GL|x|0|0|PARA|BOX|   (4) version.
DEBUG 4GL bad syntax=7=4GL|x|0|0|PARA|BOX|   (5) + and many associated factors that are hidden within documents.
DEBUG 4GL bad syntax=7=4GL|x|0|0|PARA|BOX|1. To offer a task to evaluate and plan the most cost effective way to handle the large number of obsolete email addresses and the vast number of messages assigned to each email address.
DEBUG 4GL bad syntax=7=4GL|x|0|0|PARA|BOX|2. To redirect old email addresses to the organization and ensure that passwords are reset so people cannot continue to access their old email addresses.
DEBUG 4GL bad syntax=7=4GL|x|0|0|PARA|BOX|3. To expect all messages to be physically deleted after 6 months of the email address being marked as closed so consolidation of existing emails must be completed before those messages are deleted. Data Migration Methodology
Print this Page
ITIL : 41 Support
03 Data Migration Methodology
Close this Page

1. Data Migration Methodology
1. To undertake each data migration project using professional methods that have been proven to be complete and correct - subject to Non-Disclosure Agreement.
2. To continually improve the data migration methodology with the benefit of hindsight from each project so the level of automation increases and the cost decreases.
3. To always adopt the following nine step methodology, even where some steps may be trivial as:
  (1) Portfolio Analysis: to plan the plan by evaluating exactly what has to be migrated.
  (2) Governance: to plan retentions, permissions, user access and rights.
  (3) Communications: to establish a two-way communication channel with all stakeholders - email may be good enough.
  (4) Architecture: to define the hardware and software needed to complete the project.
  (5) Customization: to filter out what cannot be migrated and to extract what can be migrated.
  (6) Migration Run: to eliminate decision points and just run the scripts.
  (7) Known Error Database: to accpt that migrations are never complete and that errors are expected.
  (8) Disruption: to mitigate disruption while data is being migrated.
  (9) Adoption: to advise approved people how and where to find their data.
4. To assume that planning the plan as step one is a self contained project in its own right to document the scope of the migration as a second project.

2. Source
1. To define the source of the data as one and only one logical source place. To plan for each different type of data source to be a different project.
2. To define governance as what data is to be migrated and to define what access rights are applicable.
3. To filter out that data that is obsolete and system data that should never have been stored.
4. To classify existing data as:
  (1) Active: documents that have a known purpose and may be used in the future.
  (2) Archive: files that have no known purpose and may never be used in the future.

2.2. Active Documents
1. To identify that "active" documents are those files that can be processed by Office 365 tools with a file type as:
  (1) Word: as DOC, DOCX, RFT and TXT files.
  (2) Excel: as XLS, XLSX, XLT and CSV files.
  (3) PowerPoint: as PPT, PPTX and ODP files.
  (4) Edge: as PDF, HTM, HTML, PNG, JPG, JPEG and GIF files.
  (5) Outlook: as MSG files.
  (6) Access: as MDB files.
2. To understand that the only documents that have any value to the organization in the future are those that can be processed using Office 365 tools and that all other files types have become obsolete and unusable.

3. Target
1. To define the target destination of the data to be one and only one logical storage place. To plan for each different type of data target to be a different project.
2. To define governance as what data is to be stored and what access rights are to be applied.
3. To filter out that data that cannot be processed in the target environment.

3.2. Archive Documents
1. To identify that "archive" files include all kinds of system files and obsolete program files that no longer can be used.
2. To skip cookies, links, recent file database, favourites, recycle bin contents, private pictures, private music, browser history, media player, application data, downloaded programs, temporary files, updates, my scans, daddress book, contacts, printer drivers and personal messages.
3. To skip empty files, empty folders and files without any file type.
4. To skip files that cannot be accessed because of unknown permissions, unknown passwords or where ownership of the data cannot be verified.
5. To skip installation files, executable files and start menu program links.
6. To skip backup dumps of smart phone contents and emails that cannot be processed in the future.
7. To exclude data with a file type as:
  (1) Executable: as EXE, COM, DLL.
  (2) Endora Phone: as MBX, CLX, TLX, ISU, HLP, PCE, GID, INI, CNT.
  (3) Phone Backup: as WBK, LOG, DAT, LIN, NAV, MOD.
  (4) Email: as PST, TOC, ESD.
  (5) Old Apps: as WP4, WB3, CDR, SDR, MPP, QPW, ENL, JNB, JBF.
  (6) Remote: as RDP, UPL, BU!, DOW, POW.
  (7) all cookies and browser history as files without a file type.
4. To exclude folders that do not contain actice documents as:
  App Data, Application Data, Contacts, Desktop, Desktops, Downloads, Email Attach, Favourites, Identities, Links.
  My Music, My Pictures, My Videos, My Scans, Plugins, Recycle Bin, Scripts, Stationery, Saved Games, Searches, Start menu.

4. Known Error Database
1. To accept that empty folders should not be migrated.
2. To accept that empty files should not be migrated.
3. To accept that temporary files should not be migrated.
4. To accept that system files should not be migrated.
5. To accept that files that are locked and unreadable cannot be migrated.

5. Disruption
1. To minimise the duration that data is not available by utilizing night time and week end working.
2. To run the first migration run while existing data is still available to be changed and then run a seond migration just to catch up with the data that has been changed since the first migration.
3. To plan that where the amount of data to be migrated is very large, then several migration jobs may be applicable with each job getting faster and faster as the amount of data that has changed since the last migration gets reduced.

6. Education
1. To understand that the primary role of the support team is education - to provide enough education until support is not needed.
2. To treat the gathering of issues and publication of proven solutions as educational - to use YouTube videos when applicable.
3. To understand that migration is only complete and correct when all approved people are comfortable using the new target data storage place - the project does not end when the data is migrated at step 6.
4. To promote the information privacy policy based on:
  (1) Personally Identifiable Information (PII) that is defined by GDPR laws where people own their own data that is loaned to the organization with consent until that consent is withdrawn or after the information has not been processed for seven years.   All human resource and payroll information is PII that must be encrypted and replicated to eliminate the threat of a reportable data breach.   All personal emails are PII that must never be disclosed to any other person than the person named as the recipiant.
  (2) Legal Information is any information that is or may be the subject of legal procedings including complaints that are goverened by legal council who will distate what may be disclosed before the information is physically destroyed after ten years.
  (3) Private Business Information is any internal information that cannot be disclosed because it is the subject of a NDA or if disclosed would provide an unfare advantage to a competitor such as financial transactions, HR activies and operational activities that do not need to be made public until is is destroyed after seven years.   Opinion is that much of the business informtation that was classified as private could and should be classified as public - public is the default where private was the default.
  (4) Public Information is everything else that may be disclosed in an open honest and transparent way, but not all public information will be worthy to be published.

7. Risk Assessment
1. To begin planning the plan with a risk assessment so all eventuallities are documented.
2. To accept that the duration of a migration project is not easy to preduct because some external factors such as network utilization is not measurable.
3. To accept that every migration project has errors where some data is unreadable, has a names that is too long, has hidden symbols in the name and a large number of issues that are expected, but the scope cannot be predicted.
4. To mitigate risk by increasing the time line to handle all eventualities that are planned and unplanned.
5. To mitigate risk by designing a plan where migration can be repeated over and over again until a satisfactory result is obtained.
6. To mitigate risk by designing a fallback plan in the event that the migration architecture is not able to achieve what was expected of it.
7. To understand that every migration project fails to deliver a 100% complete and correct result - so manage expectations and manage the errors that will be identified.

8 Ownership
1. To manage continual ownership of all data to be with the customer and never with the party undertaking the migration - that can become critical.
2. To understand that when the new storage system is established in the cloud, the ownership of that cloud must be with the customer and the customer must have rights to prevent the migration party from accessing the data.
3. To accept that migration is done for the customer and when it is completed, ownership of the resulting storage system is with the customer.
4. Too many times when a public web site is created for a customer, the customer does not own that web site and is locked in to pay for maintenance - the same lockin can happen with storeage systems.

Reference
  41 Support Manager...  

Document Control:
1. Document Title: Data Migration Methodology.
2. Reference: 164103.
3. Description: Data Migration Methodology.
4. Keywords: Data Migration Methodology.
5. Privacy: Public education service as a benefit to humanity.
6. Issued: 13 Feb 2019.
7. Edition: 213.

Project

SharePoint Migration Tool

Issues

Governance

Email Consolidation