Top Ten Tips for Windows 10 Migration

According to a recent global study by Dimensional Research, 37% of IT organizations plan to fully migrate to Windows 10 within the next year, 35% within the next two years, and 14% have not established a migration timeline. If your organization fits into one of these categories, this document consolidates our experience gained from working with customers on their OS migrations.

Tip #1 Pick the Right Branch

With Windows 10, Microsoft has introduced a far more frequent update cadence to ensure Windows 10 endpoints remain up to date. However, this rolling upgrade practice offers alternative options for different lengths of servicing windows, namely “branches”, which dictate when feature updates are made available to endpoints.

The two key branching options are Current Branch for Business (CBB) and the Long-Term Servicing Branch (LTSB).

Endpoints that employ CBB will receive two major updates per year, while endpoints that use LTSB will receive major feature updates infrequently, perhaps every two years. In addition, Microsoft has removed many of the non-essential, built-in CBB features from LTSB branch—such as Windows Store Apps, Cortana, and Microsoft Edge—and is aimed at supporting systems for critical functions like healthcare or air traffic control.

Consider your service window and system uptime requirements when determining which branch you plan to use. However, 95% of businesses should select CBB in order to benefit from increased security and feature updates.

Tip #2 Pick an OS Deployment Strategy

There are several device-related caveats to consider when undertaking a desktop migration project. First, some devices just won’t support Windows 10. Since late 2016, PCs no longer ship with Windows 7 pre- installed, and most modern processors will only be supported on Windows 10. So, do you replace, re- image, or upgrade your existing endpoints?

Second, independent research confirms that the biggest driver for early Windows 10 adoption is the “stealth IT migration” issue, where IT departments allow users to employ new devices that come pre- installed with Windows 10, even though they’re not officially supported by the business.

The recent Dimensional Research survey referenced above showed that there is no single best approach to Windows 10 migration being adopted. Of those surveyed, 52% planned on re-imaging existing endpoints using systems management tools, while 49% were looking at hardware migration, i.e. upgrading to Windows 10 as new devices are deployed. However, by timing computer replacement strategically to coincide with an OS migration, organizations may save time and costs associated with in-place upgrades.

Tip #3 Let Applications be a Barrier to Migration

One of the largest obstacles facing organizations when migrating to Windows 10 are worries about application compatibility. Happily, there are now many alternative application- delivery platforms that allow apps to be integrated smoothly into your desktop environment via virtualization, layering, or streaming technologies. By separating applications from the underlying OS, these technologies can alleviate application compatibility problems when using new operating systems like Windows 10.

So, when choosing your application delivery method, ask yourself these questions to help determine the approach that best fits the needs of you and your users:

You also need to consider Web applications. If your in-house web apps currently run without issue on IE9 in compatibility mode, or only with a specific version of

Java, what will happen when you migrate to IE11 or Microsoft Edge? Do you redevelop your internal web applications, or do you virtualize them to continue support, which could be costly and time consuming? Alternatively, in order to solve compatibility issues, do you install multiple browsers (e.g. Chrome, Firefox, etc.), which are difficult to manage and can lead to security concerns?

Ivanti recommends re-testing your most critical line of business applications on Windows 10 before migration, with a specific emphasis on applications that require administrative rights to run.

Tip #4 Create the Ultimate User Experience

End user acceptance of a new workspace starts at logon. If the first logon is slow, user acceptance of the new workspace will be less-than-stellar from day one. And, with every slow logon and every slow-running, frozen, or unavailable application, etc., user acceptance—and productivity—will diminish.

To optimize usability and user acceptance of a new workspace, Ivanti recommends running analytics to evaluate user experience on the new workspace. You should baseline existing environments and record metrics such as logon times, memory and CPU utilization, application usage, and privileges needed to run resources. It’s also prudent to ascertain how and where users are storing their data—which is crucial to ensure a good user experience, both during and after migration.

This exercise will allow you to pre-empt potential bottlenecks or resource hogs that could affect quality of service in your new environment. It will also help you understand license requirements and identify users with unnecessary and insecure privileges.

Tip #5 Personalize Your Users Workspace

In a recent Dimensional Research survey, over 90% of users surveyed expressed emotions ranging from annoyance to despair when asked for their reactions to changes on their desktop. The survey also revealed that 32% of users are already confused by the Windows 10 interface. If, after migration to Windows 10, users’ personal settings are missing, it’s inevitable that user acceptance of a newly-delivered Windows 10 workspace will be negatively affected.

To avoid this scenario, you could continue to support users on older operating systems and hardware. However, if those users also need new hardware running Windows 10, you’ll have issues. Why? Windows 10 introduces an additional roaming profile architecture that makes it even more difficult to persist user settings when users switch between different devices and platforms.

In contrast, if a user logs onto their new (and dreaded) Windows 10 workspace and finds their familiar settings already in place, you’ll minimize their fear of the unknown, increase user acceptance, and eliminate the need to continue supporting older versions of Windows.

To persist user settings post-migration, you’ll need to capture and manage user personalization independently from the underlying operating system and applications, which ensures that personal settings are always available, irrespective of which device or platform your users log on to.

Tip #6 Provide Users With Access to Their Data

One of the greatest challenges associated with providing new Windows 10 endpoints is how to migrate files and folders stored locally on the user’s old device. In this situation, how does IT ensure both corporate and personal files are securely backed up and can be effortlessly migrated to new devices? It’s also difficult for IT to establish how many local files exist in order to determine the best way to migrate them.

Storing user files and folders on file shares or home drives in the data center is another challenge for IT and end users. If users are working remotely or offline, they may not be able to access their files stored in the data center. If they have remote access to on- premises file shares, use of a VPN is typically required. This can frustrate users and adds another layer of security and complexity that causes headaches for IT in terms of break/fix, migrations, and upgrades.Ivanti® File Director, powered by AppSense, enables effortless migration of user data, no matter where it resides. With File Director, user-file and folder migration becomes a simple, stress-free task that, once initiated, means IT is prepared instantly for any future migration projects. In addition, the data migration process is 100% unobtrusive to users.

Tip #7 Ensure Windows and Applications are Fully Patched

With ransomware attacks and other types of malicious outbreaks on the rise, it’s becoming difficult for organizations to satisfy compliance mandates while protecting against new and more intelligent threats.

Social engineering tactics use deceptive techniques to manipulate users into performing non-secure actions or divulging private information. A lot of these targeted attacks look for vulnerabilities and weaknesses in OS and application content, typically due to unpatched operating systems and applications.

A comprehensive patch management solution can protect your entire Windows 10 estate without disrupting business continuity by detecting vulnerabilities in both your Windows 10 endpoints and installed applications.

Tip #8 Stop Malicious or Unlicensed Applications

Will your users be employing Windows 10 Store apps? If so, how will you control which apps they can access, install, or run? You could encounter productivity, compliance, and security issues without some form of application control.

However, it’s not just Windows Store apps you need to control, but traditional Windows apps as well. With more users employing multiple devices to do their work, controlling software license usage is an increasingly critical IT role.

Additionally, if users can introduce unlicensed software, ransomware, or other malicious executables, they can compromise the security and compliance of your existing desktop estate. Do you want this happening in their new, pristine Windows 10 workspace?

Traditional whitelisting and blacklisting technologies typically require ongoing maintenance when new service packs or upgrades are released, or when new, unknown malware is propagated. This can increase IT support costs. In addition, these types of solutions are often easily bypassed by renaming unknown or blacklisted applications as an application on the whitelist.

Ivanti Application Control, powered by AppSense, uses a Trusted OwnershipTM model, where any application installed by a non-trusted owner, i.e. a standard user, is blocked automatically from being installed or executed. This protects your environment from zero-day threats and eliminates the problem of out-of-date reactive solutions such as antivirus software, which must know about a threat before update definitions can be downloaded and applied

For controlling traditional Windows apps, Application Control is recognized by Microsoft for enforcing device-based software license control. By controlling which users or devices have permission to run named applications, limits can be placed on the number of application instances, which devices or users can run the application, when users can run a program, and for how long.

Tip #9 Remove Admin Privileges from Users

Providing users with full admin rights can leave endpoints vulnerable to attack. This can significantly increase security and manageability costs, decrease productivity, create legal and liability issues, and make compliance elusive. Out of the 20 items on its list of Critical Security Controls, the Center for Internet Security ranks “controlled use of administrative privileges” at number 5.

But how do you maintain user productivity without giving users the keys to the kingdom?

By applying privilege management techniques, IT can remove full admin rights from users quickly and easily and instead provide them with elevated privileges for only the apps or tasks that need them. This simplifies endpoint security, reduces support calls, and lowers TCO.

Tip #10 Plan for a Hybrid  Environment

While IT teams strive to simplify, the reality is that today’s enterprise computing environment is more complex than ever. Hybrid computing environments are the new normal. Enterprise IT success today has little to do with the technologies you’re using and everything to do with how well you can bring disparate technologies together in a way that’s efficient for both users and IT.

  • Will my users need access to applications offline?

  • What privileges will users need to run these apps?

  • How do I license these apps?

  • How will my IT department handle upgrades?

  • Given the above criteria, what approach will be most cost-effective for my organization?

The greatest challenge with this new IT paradigm is being able to predict and react to context. Windows 10 is accessible from many different types of devices, from PCs, laptops, and tablets to handheld and even wearable devices. Users are logging on to their workspaces from many locations using different types of endpoints. You must be able to understand the context in which users are logging on and adapt their workspace experience accordingly so they can be productive, wherever they are.

For example, a user in an Internet café will typically require a different level of corporate resource access than an employee within the secure confines of the corporate LAN. Make sure you utilize information about user context, such as location, device or connection type, even the time of day, to determine resource entitlement and secure your Windows 10 endpoints.

Share to:

VIRTUS PARTNER ACADEMY

Virtus newest benefit program for Business Partners. Virtus Partner Academy is an online IT training course with a comprehensive curriculum that can be accessed at any time and from any location.

SPEND MORE GET MORE

VIRTUS INCENTIVE PROGRAM

for Business Partner

Privacy Policy

  1. Privacy Policy – PT Virtus Technology Indonesia 

At PT Virtus Technology Indonesia, ensuring the privacy and security of your information is of utmost importance to us. As you navigate through our website, Virtus Technology Indonesia, collectively referred to as this “Website”, we strive to create a safe and trustworthy environment for all users. 

This Privacy Policy establishes the terms governing your use of our website between you (“you” or “your”) and PT Virtus Technology Indonesia. By accessing our website, you acknowledge that you have reviewed, understood, and consent to be bound by this Privacy Policy. 

  1. Information We Collect 

When utilizing or engaging with our Website, we may gather or receive various types of information, collectively referred to as “Information”, including but not limited to: 

  • “Personal Information,” such as your name, email, contact details, or any other personal content provided to us via forms on our website or other means of communication (e.g., email, phone, mail, etc.). 
  • “Technical Information,” such as browser type, operating system, device type, IP address, and similar technical data typically obtained automatically from browsers or devices when interacting with our Website. This may also encompass the referring URL that directed you to our website. 
  • “Usage Information,” such as the pages visited on our website, click activity, searches conducted, and other related data on how you have utilized our website. This category may also encompass details regarding your interaction with emails, including whether you opened, clicked on links, or received them. 

      We acknowledge that certain Technical Information or Usage Information may be considered personal data, either independently or when combined with other data, under various laws and jurisdictions. We are committed in handling such data in accordance with applicable laws and regulations. 

      1. The Methods We Use to Collect and Receive Information 

      Depending on the type of Information, we collect or receive it through various channels, including but not limited to the following conditions: 

      • When you voluntarily share Information with us. For instance, when you subscribe to our newsletter or fill out our online form to request contact.  
      • By using cookies and similar technologies. These technologies help us analyze how our Website is utilized and tailor content that is pertinent to you. They also assist in delivering more relevant advertisements on our own or third-party sites. 
      • Information obtained from third-party sources. This encompasses Information acquired through various business support tools and services we utilize, such as Website, analytics services, etc., as well as public sources like social media sites. We may merge the Information from these sources with other data we possess to maintain updated records and provide you with pertinent content. 
          1. The Purposes 

          We utilize Information for the following purposes: 

          • Processing your inquiries and responding to your requests, such as when you reach out to learn more about our products or services. 
          • Sending you information related to our services and products that we believe may be of interest to you, such as an invitation to our upcoming events, follow-up by WhatsApp blast and/or call, newsletters, or updates on products and services. These communications are sent to you either based on your explicit consent or when we have a legitimate interest in marketing our products and services. You always have the option to opt out of receiving invitation, newsletters, and/or updates on products and services. 
          • Understanding how you interact with our Website and tailoring it to align with your interests, past actions, and preferences. We do this to enhance our Website, diagnose any issues, and improve your experience while navigating through them. 
          • Preventing fraud or harm to us or any third party, and ensuring the security of our network and services, which is in our legitimate interest. 
          • Complying with our legal obligations and exercising and enforcing our legal rights as necessary for PT Virtus Technology Indonesia. 
          • Utilizing certain third-party marketing and advertising networks to assist in marketing our products on our website and third-party Website. 
            1. Who We Share Information With 

            To facilitate our business operations and the functioning of our Website, we may disclose Information to various third parties, including: 

            • Our global branches and subsidiary companies. 
            • Third-party service providers aiding in the operation of our Website, such as hosting companies, recruitment platforms and agencies, payment processors, business management, and email distribution service providers, and similar service providers. These entities are authorized to use your personal information solely to provide these services to us. 
            • When compelled by law, such as to comply with court orders, search warrants, regulatory orders, subpoenas, and other lawful requests from public authorities, including those for national security or law enforcement purposes. 
            • Legal authorities, consultants, advisors, or service providers required to investigate, respond to, or prevent fraud, or to ensure the security of our network and services and safeguard the well-being of PT Virtus Technology Indonesia
            • In the event of a merger and/or acquisition involving PT Virtus Technology Indonesia, Information may be transferred to the merging or acquiring entity, as well as to any advisors representing parties involved in discussions related to such merger or acquisition. 
            • Principal, resellers, partners, sponsors, or service providers acting on our behalf in conjunction with the offering of PT Virtus Technology Indonesia’s products or services. 
            • Third-party marketing and advertising networks assisting in the promotion of our products on our Website and on third-party websites, such as Google for remarketing ads across the Internet. 
            • PT Virtus Technology Indonesia may also disclose general aggregate and anonymized information (e.g., statistical data) pertaining to the use of its Website. 
                1. Cross Border Data Transfers 

                • We may need to transfer Information to countries where we and/or our service providers operate. These countries may have different data protection laws compared to the country where the data originated, potentially offering different levels of protection. By using our Website, you consent to such transfers. In cases where applicable to the services provided, we will establish agreements with our service providers to ensure a level of privacy consistent with the terms of this policy. 
                • Regarding the collection, use, and retention of personal information transferred from Indonesia, please note that PT Virtus Technology Indonesia remains compliant with all relevant laws concerning such transfers.
                1. Protecting Your Information 

                We aim to uphold top-tier security standards throughout our business operations. We have adopted suitable technical and organizational safeguards aligned with industry best practices. These safeguards are devised to prevent unauthorized access or unlawful handling of Personal Information and to mitigate the risk of accidental loss, destruction, or damage of such information. As part of these efforts, we have instituted several policies and procedures to guide us, covering aspects such as asset management, access control, physical security, personnel security, product security, cloud and network infrastructure security, third-party security, vulnerability management, security monitoring, and incident response. 

                1. Information Storage and Retention 

                We may store Information on both our own servers and those managed by third-party data hosting providers. As explained in Section 5 above (Cross Border Transfers), these servers may be situated globally. We will retain your Personal Information only for as long as necessary to fulfil the collection’s intended purpose. Additionally, we may retain your Personal Information for the duration required to pursue our legitimate business interests, address any legal claims, and ensure compliance with legal obligations. In instances where we utilize your information for direct marketing, we will retain your data until you choose to opt-out of receiving marketing materials; however, certain information may need to be retained to maintain a record of your request.  

                1. Modifications to This Policy 

                PT Virtus Technology Indonesia reserves the right to amend this Privacy Policy at any time. In the event of a significant change, we will provide notice on this page and/or adjacent to the link leading to this page. These updates will become effective immediately for new Information collected or provided from the date of the update, and within thirty (30) days for any Information collected or provided to PT Virtus Technology Indonesia prior to the update. If you do not agree to the terms of the revised policy, please contact our Legal Department using the contact details provided in Section 11 below. We encourage you to periodically review this page for any updates.  

                1. Your Choices 

                We offer you various options regarding the use of Information in relation to: (i) our marketing activities; and (ii) our utilization of cookies and similar technologies for interest-based advertising and website usage analysis 

                1. a. You can choose to discontinue receiving our newsletter or marketing emails by following the unsubscribe instructions included in these emails, adjusting email preferences in your account settings page, or contacting us through PT Virtus Technology Indonesia.

                1. b. Moreover, the laws in some jurisdictions may grant you various rights concerning our processing of certain Information. These rights may include:

                  i. The right to withdraw previously provided consent; 

                  ii. The right to access specific information about you that we process; 

                  iii. The right to rectify or update any Personal Information; 

                  iv. The right to request the erasure of certain Information; 

                  v. The right to temporarily suspend our processing of certain Information; 

                  vi. The right to receive Information in a common machine-readable format; 

                  vii. The right to object to our processing of Information for direct marketing purposes or when we rely on legitimate interests as the lawful basis for processing your information; and 

                  viii. The right to file a complaint with the relevant data protection authority. 


                  We will address your requests promptly. Please note that these rights may be subject to limitations under applicable law. For further information on these rights or to exercise them, please contact PT Virtus Technology Indonesia at: legal@computradetech.com

                1. Social Media and Third-Party Services 

                Our Website may include a blog with a ‘comments’ section and several social media features, such as a ‘share’ button or links to third-party websites and services like Facebook, X, YouTube, LinkedIn, and Instagram. When utilizing these features, certain information may be gathered by these third parties, such as your IP address or the specific page you are visiting on our website. Additionally, these third parties may set cookies to ensure the proper functioning of the features. Any data collected by these third parties is subject to their respective privacy policies. We encourage you to thoroughly review the privacy policies of these third parties. 

                1. Contacting Us 

                If you have any questions or concerns regarding this Website Privacy Policy, the information we collect, PT Virtus Technology Indonesia‘s practices, or your interactions with the Website, please feel free to contact us. You can reach us via email at legal@computradetech.com or by physical mail addressed to: PT Virtus Technology Indonesia (Centennial Tower 12th Floor, Jl. Jend. Gatot Subroto Kav. 24-25, Jakarta – 12930, (021-80622288).