System Requirements
Environment
- 64 bit Operating system: Windows Server 2016+ (Clean build recommended)
- Microsoft .NET Framework 4.7.2
- Recommended system specification - Primary Server:
- 3GHz 8 Core Processor or better
- 200+GB Disk space
- 16+GB Memory
- Recommended system specification - Secondary Server(s):
- Server names longer than 15 characters will cause communication issues between servers in a multi-server environment.
- 3GHz 4 Core Processor or better
- 100GB Disk space
- 8+GB Memory
- Server name shorter than 16 characters.
If you are looking to complete a 'large migration' (a migration of more than 25,000 users or 10 million objects), refer to the following articles for additional considerations:
- "Large Migration Infrastructure"
- Running SQL Server or Redis on an Independent Server
- Existing SQL Server Database Configuration
If you are storing Drive document mappings and running a large migration, contact the support team.
Required ports
Both primary and secondary CloudM Migrate servers communicate with source and destination platforms, and the CloudM Migrate licensing platform using HTTPS.
Typically, it is ports 80 and 443, but that can depend on the source platform and local network configuration.
There is also the following to consider:
- You may need to whitelist our license server: portal.thecloudmigrator.com
- SQL server runs on TCP 1433 and UDP 1434
- Redis runs on port 6379
- Microsoft Message Queue on port 1801
- All of Google's API endpoints are listed here: https://support.google.com/a/answer/60764
Basic installation for single-server migrations
If you are completing a multi-server migration, skip to the Multi-Server Installation section of this guide.
Installation
Basic installation installs all components to a single machine and is suitable for performing migrations from a single server or as the main server in a multi-server migration.
If you have specialised requirements, have a pre-existing SQL Server instance you would like to use, or will be performing multi-server migrations using a server farm, you should also review the advanced installation documentation.
The following components makeup and are used by CloudM Migrate:
- Web Application and Primary Service
- Secondary Service
- SQL Server Express 2017
- Redis
To start the installation:
- Open a web browser, download the latest x64 CloudM Migrate executable and launch the installer as an administrator: CloudM Migrate Changelog and Download Link
- Review and accept the license terms by checking the checkbox.
- Click 'Next'.
- All relevant fields will be selected / populated by default (with the exception of your web access credentials). To select an alternative installation directory:
- Click the ellipsis button (...) to the right of the 'Installation Path' field and browse to the required install destination.
- Set up your web access credentials with an email username and a password of your choice (which you will need to use to log in to the web application).
- Click Install to proceed. This installation process can take some time.
- Start CloudM Migrate by loading the web interface. Alternatively, the interfaces are available in the Start menu, under CloudM.
- If you have any issues regarding the installation, refer to the next section of this article.
- If the installation was successful, skip to Launching CloudM Migrate
Installation problems
If you have any issues when installing CloudM Migrate:
- Ensure that you have no pending Windows updates waiting to install. If you have Windows updates waiting to install, please install them and reboot.
- Check the following in the System Requirements:
- You must be running a 64bit version of Windows.
- You must be running Windows 8, 10, Windows Server 2016 or Windows Server 2016 R2.
- Try clearing your computer's temporary directory. This can be done using the disk cleanup application installed with Windows or by navigating in a Windows explorer window to %TEMP% and deleting the files from this directory.
- Check if any security or antivirus software may be preventing installation. CloudM Migrate needs to install custom firewall rules and make other system changes that some security packages may prevent. It is recommended to uninstall any non-Windows security software.
- Verify the checksum on your CloudM Migrate installation package to be sure the download is not corrupt. The latest checksums can be found on the CloudM Migrate Changelog page and files can be verified using CertUtil. MD5 and SHA1 checksums are provided.
- If the installer fails on the 'Prerequisites' package, and for any reason you have uninstalled SQL Server Express before an upgrade or reinstallation, make sure to delete the database files. These are in the following location by default:
- C:\Program Files\Microsoft SQL Server\MSSQL12.POWEREDBY\MSSQL\DATA\PoweredBy.mdf
- C:\Program Files\Microsoft SQL Server\MSSQL12.POWEREDBY\MSSQL\DATA\PoweredBy_log.ldf
Log Files
If you encounter any problems during the installation of CloudM Migrate, you will be presented with a message box outlining the error encountered, or you will be shown the failed installation dialog.
Clicking on the Log link in the above screen will open a zip file. The number of files in this zip file can vary depending on the installation mode (e.g Install, Update or Uninstall) components being installed and the error encountered.
If you have a problem installing CloudM Migrate and the tips above do not help, start by reviewing the logs. If you are still unable to diagnose or solve the issue, please report it to our support team with a copy of the installer logs.
Clicking Close will close the installer.
Installation zip files can be also found in the following directory and prefixed with 'CloudM Migrate' or "CloudMigrator" followed by the date and time:
- %USERPROFILE%\AppData\Local\Temp
Multi-Server Installation
Virtual Machines are not mandatory and installations can be performed locally.
If you are not setting up Virtual Machines, and:
- Using Windows Server, skip to Step 1 in the Installing CloudM Migrate section.
- Not using Windows Server, skip to Step 2 in the Installing CloudM Migrate section.
Installing and configuring Virtual Machines
The following instructions explain how to set up servers using Virtual Machines set up in Google Cloud Platform (GCP). For more information, see here.
There are several other methods that you can use to set up your servers, including using Microsoft Azure (Windows Azure).
CloudM recommends setting up Virtual Machines using Google Cloud Platform when migrating to Google (and Microsoft Azure when migrating to Microsoft) to limit network traffic costs.
All CloudM Migrate secondary servers must be on the same VM network as the primary server. The default network configuration for new VM instances in GCP does not need to be modified to meet this requirement.
You will also need a GCP billing account and associated GCP project for creating VM instances and to be mindful of the associated costs.
The instructions differ at various points throughout this guide depending on the type of server being created and configured (primary or secondary), and these steps are highlighted in bold.
Creating a VM instance
- Access the Google Cloud Platform console
- Open the Google Cloud Platform project to be used for the CloudM Migrate server/s, using the dropdown icon at the top of the screen.
- Navigate to Compute Engine > VM instances
- Select CREATE INSTANCE
- Enter a name for the VM instance.
- Keep the name to less than 15 characters to avoid connection issues in multi-server environments. See Resource naming conventions.
- Standardize the naming convention for all instances, using numbering (1,2,3) or lettering (a,b,c) to help you differentiate between instances.
- Select the ‘Machine Type’ dropdown menu and then, select ‘Custom’
- In larger migrations, where numerous secondary servers will be utilized, you should change the Virtual Memory of the Primary VM from the default Custom, which has a low threshold, to 'System Managed'. This is to improve performance of the Primary Server as it communicates with the REDIS database.
- Alternatively, select e2-standard-4 (4 vCPUs, 16 GB memory) as the Machine Type for a Primary Server and e2-standard-2 (2 vCPUs, 8 GB memory) for any Secondary Servers. These settings should be able to accommodate most migrations without spiralling cost.
- Change the number of cores and memory to meet the CloudM Migrate system requirements (note the different requirements for primary and secondary servers.
- Select ‘Change’ in the ‘Boot disk’ section:
- On the Public Images tab, change the:
- ‘Operating system’ to ‘Windows Server’.
- ‘Version’ to ‘Windows Server 2019 Datacenter’ (or another supported version of your choice).
- ‘Size (GB)’ to ‘300’ (the combined minimum requirements for both CloudM Migrate and Windows Server).
- Click Select at the bottom of the page
- If you are planning on configuring a public facing URL, in the ‘Firewall’ section, check the box to ‘Allow HTTPS traffic’. This allows easy access to download the installation files required, but is optional.
- Select Create to create the VM instance.
Connecting to a VM instance
- Go to the VM instances screen. Under the Connect column, select the small down arrow and then Set Windows password:
- Leave the Username field as the default, and then select SET:
- Copy the password and make a note of it for later:
- Under the Connect column, select the small down arrow and then Download the RDP file:
- Using the RDP (Remote Desktop Protocol) file, establish a connection and login to the VM instance using the password noted down earlier:
- If it fails to connect, disable your local environment Windows firewall and any other network firewalls.
Installing CloudM Migrate
- If using Windows Server, open Server Manager and:
- Select Local Server (1).
- Select On next to IE Enhanced Security Configuration (2).
- Set the radio button to Off for Administrators (3).
- Select OK (4).
- Open a web browser, download the latest x64 CloudM Migrate executable and launch the installer as an administrator: CloudM Migrate Changelog and Download Link
- Agree to the terms and conditions, select Next:
- For primary server installations: Leave the default installation options and enter the email address and password that will be used to log in to the CloudM Migrate web interface, and then select Install:
- Normally, you should use the default SQL Server Express Instance that is included with CloudM Migrate when installing a primary service. Using an existing SQL Server Instance should only be considered in large migrations, where you may expect to exceed the default SQL Server Express database size limit of 10GB.
- Once the installation completes, select Export Details to take note of the database details of the primary server (which will be needed when creating a secondary CloudM Migrate server), and then select Close:
- For secondary server installations: Install only the ‘Secondary Migration Service’ and enter any email address and password that will be used to log into the CloudM Migrate instance. Select “Use Existing SQL Server” and enter the Data Configuration details from the Primary Server, then select ‘Install’:
Launching CloudM Migrate
- CloudM Migrate can be configured using the local web interface on the primary server. This can be found in the Windows start menu > CloudM > CloudM Migrate Web, or by navigating to http://cloudmigrator.local/ in your web browser.
- Sign-in using the web interface credentials entered during installation:
Platform prerequisites
Source Platform prerequisites
It is required to perform the below using a Box ADMIN
In order to access all data within Box, data is retrieved using the Box Content API.
Please ensure that the file content you are migrating from Box is owned by the users you wish to migrate.
HTTPS Setup
Refer to the HTTPS Setup article.
Creating a Box application
- Navigate to the Developers Console and login with a Box administration account.
- If this is the first Box application to be created under the administration account, click ‘Get Started’. If you have any existing applications click Create New App.
- On the following page, select Custom App, then Standard OAuth 2.0 (User Authentication).
-
Enter a unique name for your application and select Create Box. You should see a prompt "Woot! Your app has been created."
If an application already exists within Box with the same name you will be presented with the following message ‘Application with this name already exists’. Adjust the name accordingly to make the name unique e.g. append with a random number. - On the successful creation of the application, you will be brought to your Box Application Configuration. If not, you can easily go to My Apps/[Select your App]/Configuration from the right-hand menu.
- Scroll down to the OAuth2 parameters, depending on the application enter the following:
- Redirect URI: https://<domain_you're_using>/api/boxexport/callback.<domain_you're_using> will be the domain you are accessing CloudM Migrate.
- Scopes: ‘Read and Write all files and folders stored in Box’, ‘Manage Users', 'Manage Groups' and 'Manage enterprise properties'.
- Set Perform Actions as Users to Enabled.
- Click Save Changes. On success you will see a confirmation message ‘Successfully updated the app’ appear at the top of the page.
- Make note of the client_id and client_secret.
Enabling Enterprise Features
After creating a Box application, you will be required to email Box support to enable the following features:
- Box Notifications
- Go to the Box support area of the website and create a new ticket.
- You will be prompted to login if not already logged in and you should sign in using a BOX Admin account.
- A dialog window may appear. Click continue.
- In the support form that you now see, enter the following details:
- What can we help you with? - 'Developer/API Issue'
- Briefly summarize your issue / question? - Suppress Notifications scope.
- API Key - In this field, enter the client_id you made a note of when creating a Box.com application.
- Give us more details - Please enable the Suppress Notifications scope for our app.
- Priority - Normal
- BOX Developer Console
- Ensure that the "Make API calls using the as user header" checkbox is checked.
Destination prerequisites for Google Workspace
You will need:
- Access to the Developers console in the Google tenant
- The email address of a primary Google Workspace domain administrator account for your destination domain.
- To set up a Service Account and P12 keys, and enable the correct Google APIs, for the Google Destination domain (as described in the Setting up the Service Account and enable the APIs within Google Workspace for CloudM Migrate section below).
- The email address of a test account in the destination that can be used for testing.
- The names of the primary or secondary domain that you are migrating to / from.
Setting up the Service Account and enable the APIs within Google Workspace for CloudM Migrate
The following Google Service Account setup methods are for both a source Google Workspace account and a Destination Google Workspace account.
Use either the:
Automated Process (Recommended method)
This method uses a Powershell script to automate the majority of the process, making sure that the correct Scopes and APIs are applied, with only a few simple manual steps required.
It is easier and quicker than the full manual process, and less prone to error.
Before you start, you will need:
- An account in GCP with permissions to create a project (resourcemanager.projects.create role) or owner on existing project,
- The ability to run Powershell Script as Administrator,
- A browser window open and authenticated into the GCP tenant. This must be the last browser tab you have used.
To create a service account and obtain the private key for the account:
- Install Google Cloud SDK using the instructions provided by Google here,
- Once Google Cloud SDK has finished installing, download the GCP_Configuration.ps1 file to your desktop,
- Click on your Desktop Search icon (next to the Start Icon) and search for Windows Powershell
- Select Run as Administrator
- On the GCP_Configuration.ps1 file, select Shift and right click. Select Copy as Path.
- In the Windows Powershell window, enter CD and a space, then press the up arrow key on your keyboard until you see the first half of the file path and select enter. It will look similar to:
-
- CD C:\Users\(your name)\Desktop
- On the next line, press the up arrow key on your keyboard until you see & ‘.\GCP_Configuration.ps1 and press enter.
- If you see a security error that the Powershell Script is unsigned, run “Set-ExecutionPolicy Restricted”.
- On the Project ID line, enter a unique Project ID name.
- On the Service Account ID, enter a Service Account name. It can be the same as the Project ID name.
- On the Scope line, enter one of the following to specify the scopes to be assigned:
- All (for Full scopes) - Recommended for Google to Google
- Standard
- SourceLimited
- DestinationLimited
- Vault
- Storage
- The Powershell script will run, setting up the service account and enabling the scopes. This may take a few minutes to complete.
- Once the Powershell has finished, you will need to manually complete a few easy steps (Steps 1 to 4 as detailed below) to complete the OAuth and Domain Wide Delegation configuration, with instructions and URLs displayed.
- For Step 1 - Configure OAuth Consent, copy the displayed URL and paste into a browser. Sign in to GCP with a full admin account.
- On the OAuth consent screen, set the User Type to Internal and select Create.
- On the next screen, set the App name to CloudM Migrate, and add a User Support email and a Developer Contact email address.
- Select Save and Continue.
- For Step 2 - Configure Google Workspace Domain Wide Delegation using the following ClientId and Scopes, copy the displayed URL in the Powershell window and paste into a browser.
- On the Security > API Controls > Domain-wide Delegation screen, select Add new to display the Add a new client ID pop-up box.
- Copy and paste the Client ID and OAuth Scopes from the Powershell window into the specified fields and select AUTHORIZE.
- Now, from the Step 3 - Service Account details for use in CloudM Migrate section of the Powershell script, copy the Service account email address that you need later when configuring the platform in CloudM Migrate.
- The P12 file that you will also need when configuring the platform in CloudM Migrate can be found in C:\CloudM\GCPConfig, along with a gcp_config log for the process.
Manual Process
To create a service account and obtain the private key for the account
- Open a web browser and sign in as an administrator for the required platform.
- Go to cloud.google.com/console
- Click the project selection menu in the blue navigation bar (1).
- Next to ‘Select from’ ensure the correct Organization you are creating the service account for is selected (2).
- Click ‘NEW PROJECT’ (3).
- Enter a project name.
- Ensure the correct organization is selected.
- The location can be left as the default or changed at your discretion.
- Click CREATE.
- Click on the “Menu” icon next to "Google Cloud Platform" in the top left of the page.
- Click 'APIs & Services', then 'Credentials'.
- Click CREATE CREDENTIALS, then select 'Service account'.
- Enter a service account name.
- Click ‘CREATE’.
- In the ‘Select a role’ menu, click ‘Project’, then select ‘Owner’. This step is optional.
- Click CONTINUE.
- The Grant users access to this service account section that is displayed next is optional, and can be left blank. Click DONE to continue.
- Click on OAuth consent screen.
- Under User Type, select ‘Make Internal’.
- Select EDIT APP. Enter an application name and enter a Support email and a Developer Contact Email.
- Click SAVE AND CONTINUE.
- Select the KEYS tab at the top of the screen, and click the ‘ADD KEY’ dropdown.
- Click ‘Create new key’.
- Select ‘P12’, then click ‘CREATE’ - This will download the private P12 key file to be imported into CloudM Migrate.
- Close the ‘Private key password’ screen (1) as this is not needed.
- Navigate back to the APIs & Services > Credentials screen.
- Notice the Oauth 2.0 Client ID has now appeared. Click the copy icon to take a note of the client ID. This will need to be added to Google Workspace later.
- Take a note of the Service Account Email. This will need to be added to CloudM Migrate later.
- Navigate to the APIs & Services > Dashboard page.
- Click ‘ENABLE APIS AND SERVICES’.
- In the ‘Search for APIs & Services’ search box, enter ‘Admin SDK’.
- Click on Admin SDK API
- Click ENABLE.
- The Admin SDK overview page is now shown. Click ‘APIs & Services’ to navigate back to the main APIs & Services page.
- Repeat steps 30-34 to enable each of the required APIs:
- Admin SDK
- Google Drive API
- Gmail API
- Google Calendar API
- People API
- Tasks API
- Groups Migration API
- G Suite Vault API (if you are migrating from Google Vault).
- Cloud Storage (if you are Migrating from Google Storage).
- If migrating Google Drive, open the Google Workspace Admin console and navigate to Apps > Google Workspace > Drive and Docs > Features and Applications and enable 'Allow users to access Google Drive with the Drive SDK API': Drive SDK needs to be enabled for all migrating users.
- Open the Google Workspace admin console and navigate to ‘Security > API Controls > Domain-wide Delegation’ and click on Manage Domain-wide Delegation. Here is a direct link: https://admin.google.com/ac/owl/domainwidedelegation?hl=en
- Click ‘Add new’ then enter the Client ID, the relevant OAuth scopes listed next, and then click ‘AUTHORIZE’.
If 'Use Limited Scopes' is going to be set as 'False' (default) in the Migration Settings section for the platform in CloudM Migrate, use the full scopes listed here:
- https://www.googleapis.com/auth/admin.directory.resource.calendar,
- https://www.googleapis.com/auth/gmail.settings.sharing,
- https://mail.google.com/,
- https://sites.google.com/feeds/,
- https://www.googleapis.com/auth/admin.directory.group,
- https://www.googleapis.com/auth/admin.directory.user,
- https://www.googleapis.com/auth/apps.groups.migration,
- https://www.googleapis.com/auth/calendar,
- https://www.googleapis.com/auth/drive,
- https://www.googleapis.com/auth/drive.appdata,
- https://www.googleapis.com/auth/email.migration,
- https://www.googleapis.com/auth/tasks,
- https://www.googleapis.com/auth/gmail.settings.basic,
- https://www.googleapis.com/auth/contacts,
- https://www.googleapis.com/auth/contacts.other.readonly,
- https://www.googleapis.com/auth/contacts.readonly,
- https://www.googleapis.com/auth/directory.readonly,
- https://www.googleapis.com/auth/user.addresses.read,
- https://www.googleapis.com/auth/user.birthday.read,
- https://www.googleapis.com/auth/user.emails.read,
- https://www.googleapis.com/auth/user.gender.read,
- https://www.googleapis.com/auth/user.organization.read,
- https://www.googleapis.com/auth/user.phonenumbers.read,
- https://www.googleapis.com/auth/userinfo.email,
- https://www.googleapis.com/auth/userinfo.profile
If 'Source Platform Migration Settings > Google Workspace > Email Options > Use Limited Scopes' is set to 'True', use the following scopes:
- https://www.googleapis.com/auth/gmail.labels,
- https://www.googleapis.com/auth/gmail.readonly,
- https://www.googleapis.com/auth/admin.directory.resource.calendar,
- https://www.googleapis.com/auth/gmail.settings.sharing,
- https://sites.google.com/feeds/,
- https://www.googleapis.com/auth/admin.directory.group,
- https://www.googleapis.com/auth/admin.directory.user,
- https://www.googleapis.com/auth/apps.groups.migration,
- https://www.googleapis.com/auth/calendar,
- https://www.googleapis.com/auth/drive,
- https://www.googleapis.com/auth/drive.appdata,
- https://www.googleapis.com/auth/email.migration,
- https://www.googleapis.com/auth/tasks,
- https://www.googleapis.com/auth/gmail.settings.basic,
- https://www.googleapis.com/auth/contacts,
- https://www.googleapis.com/auth/contacts.other.readonly,
- https://www.googleapis.com/auth/contacts.readonly,
- https://www.googleapis.com/auth/directory.readonly,
- https://www.googleapis.com/auth/user.addresses.read,
- https://www.googleapis.com/auth/user.birthday.read,
- https://www.googleapis.com/auth/user.emails.read,
- https://www.googleapis.com/auth/user.gender.read,
- https://www.googleapis.com/auth/user.organization.read,
- https://www.googleapis.com/auth/user.phonenumbers.read,
- https://www.googleapis.com/auth/userinfo.email,
- https://www.googleapis.com/auth/userinfo.profile
If 'Destination Platform Migration Settings > Google Workspace > Email Options > Use Limited Scopes' is set to 'True', use the following scopes:
- https://www.googleapis.com/auth/gmail.labels,
- https://www.googleapis.com/auth/gmail.insert,
- https://www.googleapis.com/auth/admin.directory.resource.calendar,
- https://www.googleapis.com/auth/gmail.settings.sharing,
- https://sites.google.com/feeds/,
- https://www.googleapis.com/auth/admin.directory.group,
- https://www.googleapis.com/auth/admin.directory.user,
- https://www.googleapis.com/auth/apps.groups.migration,
- https://www.googleapis.com/auth/calendar,
- https://www.googleapis.com/auth/drive,
- https://www.googleapis.com/auth/drive.appdata,
- https://www.googleapis.com/auth/email.migration,
- https://www.googleapis.com/auth/tasks,
- https://www.googleapis.com/auth/gmail.settings.basic,
- https://www.googleapis.com/auth/contacts,
- https://www.googleapis.com/auth/contacts.other.readonly,
- https://www.googleapis.com/auth/contacts.readonly,
- https://www.googleapis.com/auth/directory.readonly,
- https://www.googleapis.com/auth/user.addresses.read,
- https://www.googleapis.com/auth/user.birthday.read,
- https://www.googleapis.com/auth/user.emails.read,
- https://www.googleapis.com/auth/user.gender.read,
- https://www.googleapis.com/auth/user.organization.read,
- https://www.googleapis.com/auth/user.phonenumbers.read,
- https://www.googleapis.com/auth/userinfo.email,
- https://www.googleapis.com/auth/userinfo.profile
Migrating from Google Vault?
If you are migrating from Google Vault, use these API Scopes:
- https://www.googleapis.com/auth/admin.directory.resource.calendar,
- https://www.googleapis.com/auth/gmail.settings.sharing,
- https://mail.google.com/,
- https://sites.google.com/feeds/,
- https://www.googleapis.com/auth/admin.directory.group,
- https://www.googleapis.com/auth/admin.directory.user,
- https://www.googleapis.com/auth/apps.groups.migration,
- https://www.googleapis.com/auth/calendar,
- https://www.googleapis.com/auth/drive,
- https://www.googleapis.com/auth/drive.appdata,
- https://www.googleapis.com/auth/email.migration,
- https://www.googleapis.com/auth/tasks,
- https://www.googleapis.com/auth/gmail.settings.basic,
- https://www.googleapis.com/auth/ediscovery,
- https://www.googleapis.com/auth/ediscovery.readonly,
- https://www.googleapis.com/auth/devstorage.read_write,
- https://www.googleapis.com/auth/contacts,
- https://www.googleapis.com/auth/contacts.other.readonly,
- https://www.googleapis.com/auth/contacts.readonly,
- https://www.googleapis.com/auth/directory.readonly,
- https://www.googleapis.com/auth/user.addresses.read,
- https://www.googleapis.com/auth/user.birthday.read,
- https://www.googleapis.com/auth/user.emails.read,
- https://www.googleapis.com/auth/user.gender.read,
- https://www.googleapis.com/auth/user.organization.read,
- https://www.googleapis.com/auth/user.phonenumbers.read,
- https://www.googleapis.com/auth/userinfo.email,
- https://www.googleapis.com/auth/userinfo.profile
Service Account and Scopes Propagation Time
Similarly with the Service account and APIs, adding the Client and Scopes in the Google Workspace console may be subject to a propagation time of up to two hours.
Selecting Check Connections for your Google Workspace platform in CloudM Migrate may not be successful immediately.
Destination prerequisites for Microsoft 365
The following prerequisites are for migrations that use Modern Authentication as the Authentication Method. Modern Authentication is the recommended method as Basic Authentication is being deprecated.
- Ensure that you have an Admin User in your Azure AD account. The Global Admin Role is recommended, but not mandatory.
- Ensure that a Test User has a license with a mailbox.
Start a new configuration project
- Login to CloudM Migrate,
- Select Projects in the Functions column on the left side of the screen,
- Select the Add button (+ icon) to prompt the section to expand,
- Select the Create a new project option,
- In the pop-up box, select Google as the Destination platform (the platform that you want to migrate all of your users and data to) and enter the Domain Name (the destination domain you are migrating to), a Configuration Name of your choice and License Key.
- Select Check License to ensure that the license entered is valid for the destination platform that you want to migrate to.
- Select Continue.
- The project will now be displayed in the domain drop down menu at the top of the screen. Make sure that the project is selected.
Create a new configuration
To create a new configuration:
- Select the Create a new configuration to get started option.
- In the pop-up box, select Google as the Destination platform (the platform that you want to migrate all of your users and data to) and enter a Configuration Name.
- Select Continue.
- The configuration will now be displayed in the Configuration Overview.
Once the configuration is created, it will be displayed in the Configuration Overview table. Select Configure, enter a CloudM license key and select Apply to start the configuration process.
Configure Source Platform Settings - BOX
Choose BOX as the migration source and enter your BOX settings into CloudM Migrate and then click Next.
Account Details
- Client ID - the client id that is generated by Box when creating a Box application.
- Client Secret - the client secret generated by Box.
- Redirect Uri - https://<domain_you're_using>/api/boxexport/callback
- Admin Email - the Box Enterprise administration email address used to login into Box.
- Test User Name - login email address of a non-admin user within the system to test. This user must have the active status in Box
- Authorization Code - the authorization code is generated when following the OAuth2 process.
Transfer Settings
- Retry Count - the number of times an operation will be tried before failing when making requests to Box.
- Timeout - the timeout for operations with the server.
Configure Destination Platform Settings - Google Workspace
Select Google Workspace as your destination platform.
Select where you would like your data to be migrated. If you have purchased Google Vault, you may want to migrate data directly into Google Vault.
To enable Google Vault for your domain, please see this article
Select Add Settings.
Enter information for your Google Workspace admin account.
- Domain Name - The domain name you will be migrating from. This should be the Internet domain name, not the local domain name.
- Admin Username - An administrator account for the domain specified, this will usually be an email address for a Super Admin.
- Service Account Email Address - Before attempting to configure CloudM Migrate, you should have created a Google Cloud platform project and created a service account for it. Input the service account's email address in this field.
- Private Key - The file path to the P12 key that was generated and downloaded when creating the OAuth service account.
If you cannot find the private key, go back to Google Cloud Platform service accounts, select your project (if not already selected), use the option button on the right of the service account and click Create Key. Select P12 and download the key file.
- All Advanced Settings are set to a default value, designed to ensure that your migration will work without additional configuration. You should only edit the Advanced Settings if instructed to by CloudM Support or in a CloudM Knowledge Base article.
CloudM Migrate will perform a connection test against your Google Workspace domain to verify that everything has been entered correctly.
If your Google Workspace system is brand new or, for any reason, the users being migrated have not been created in Google Workspace, CloudM Migrate can create your users for you. Simply go to Advanced settings > User section and enable Create Users/Resources/Groups/Shared Drives.
Configure Destination Platform Settings - Microsoft 365
Basic Platform Settings
Choose Microsoft Office 365 as the migration source and enter your Microsoft Office 365 settings into CloudM Migrate and then click Next.
- All Advanced Settings are set to a default value, designed to ensure that your migration will work without additional configuration. You should only edit the Advanced Settings if instructed to by CloudM Support or in a CloudM Knowledge Base article.
Set the following settings:
- Office / Microsoft 365 Plan - Set to Office 365
- Authentication Method - Choose the authentication type that will be used with the server. For Microsoft 365, set to Modern.
- Domain Name - The domain name of the Exchange domain. This should be the internet domain of the Exchange system and not the local domain name.
- This might be the part after the @ in your administrator email address.
- If migrating from several different domains, several migrations will be needed.
- Admin Username - The email address of a global administrator within your Microsoft 365 environment.
- Admin Password - The password for the global administrator account specified earlier.
- Test Username - The email non-admin user who is already present in the system to test connections.
- Specify a primary SMTP email address (or just the part before the @ symbol and the domain name will be appended). The test user must have an active mailbox.
If you have Modern Factor Authentication (MFA) enabled:
Authenticate using the Powershell Script (as detailed in the Modern Authentication for Microsoft 365 article). You will not be able to use the web application to authenticate due to logging in issues caused by MFA.
Once the Powershell process has been completed, click Next to trigger a connection test.
If you do not have Modern Factor Authentication (MFA) enabled:
- Click the Create Azure AD Application button, and click the button again in the popup.
- The Client ID, Certificate Path and Certificate Password fields should now be set. Click the Next button to test the connection.
Migrate files to Microsoft 365
If you want to migrate files to Microsoft 365, you will also need the Sharepoint Admin URL. The URL will look similar to the URL below:
- https://tenant-admin.sharepoint.com.
To input the URL, click Advanced Settings and locate Sharepoint Admin URL under the OneDrive for Business/SharePoint settings.
Connection test
Once you have configured the Platform settings, click on Next. CloudM Migrate will now perform a small connection test to verify that the details you have entered are correct.
If this fails, you may have entered something incorrectly. If you still cannot resolve the issue, please contact CloudM Support.
Select which items to migrate
It's now time to add which items you'd like to migrate.
To add the items from that you want to migrate from your source platform to your destination platform, select Add items to migrate drop down menu and click on one of the following options:
- Get Items from source - Get a full list of all items in the source platform.
- Bulk add / import items - Upload a CSV file to bulk add users.
- Add User - Manually add an item of the selected item type.
Selecting a Star next to any specific user or users will prioritize their migration. When a migration starts, threads will be assigned to any starred user so that their migration can start immediately.
Enter your user's full email address within the Export Name field.
To migrate from a Google Workspace Shared Drive:
- Click on Add items to migrate and select ‘Add Shared Drive' from the dropdown menu.
- You must specify the ID of the Shared Drive you wish to migrate from in Export Name.
- You can also specify any folder within a Shared Drive. This is done by specifying the folder ID in the 'Documents Path' field.
- You must make sure your migrating account has Manager permissions for any Shared Drives that are being migrated.
To migrate files to a Google Workspace Shared Drive:
- Either select the item you wish to migrate and select 'Migrate as Shared Drive' from the actions menu, or specify the import type as 'Shared Drive' when adding an item.
- You can then specify the ID of the Shared Drive in the ‘Import Name’ field or the name of the Team Drive in the ‘Given Name’ field. If the Shared Drive specified doesn't exist, then it will be created.
- You can use a unique ID in the 'Import Name' field to identify the Shared Drive across multiple migrations.
- You can specify a specific folder to migrate from in the 'Documents Path' field, and this will migrate only the specified folder and all subfolders.
- You can specify a specific folder to migrate to in the 'Documents Destination Path' field. Documents will be migrated to the specific subfolder in the Shared Drive.
- Finally, you must make sure your migrating account has Manager permissions for any Shared Drives that are being migrated.
To improve performance to Shared Drives:
- Configure multiple Managers to perform the migration with the configuration setting:
- Destination Platform Migration Settings (Google Workspace) > Shared Drive > Shared Drive Default Managers
Select how much content to migrate
CloudM Migrate lets you decide how much content to migrate to your domain by specifying required date ranges.
If you are changing your email address as part of the migration you can verify that the domain names are correct here. You can also specify specific Address Replacements in the respective section of the advanced settings.
Target Audience permissions can also be migrated but they must be replaced using Address Replacements in order to migrate successfully. If they are present on the source but not migrated to the destination platform, any items shared with it will be shared back to the source Target Audience.
Environment Scan
Environment Scan allows you to plan and prepare your migration by performing analysis of your source file and mail environment and reporting important information such as item counts, data volume, permissions, and folder depth.
Reports are produced which can be exported and analysed. Using the information provided you can estimate your migration's duration more accurately, and address any potential issues before your migration even begins.
Selecting Scope of Scan
Items
Depending on your source platform, you can choose to scan files, emails, or both sets of items.
- Leaving the Report on File Permissions setting unchecked will speed up the Environment Scan process.
- In order to include Report on File Permissions in the process, you will need to check this setting AND enable Document Sharing (or a setting related to document sharing) in the Source Platform settings. If either is not enabled, the Environment Scan will not scan or report on File Permissions.
Users
Your CloudM Migrate userlist is used to define the scope of the scan. You can choose to scan all accounts from your list, or restrict the scan to users selected for migration.
How to run an Environment Scan
After entering your source and destination server settings, populating your userlist, and configuring your settings, you will be prompted to run an environment scan. It is optional, but recommended, for all file platforms.
Click Start and then confirm by selecting Start Environment Scan on the pop-up box to begin the scan. CloudM Migrate will connect to your source environment and capture file and / or mail information. This can take up to several hours, depending on the amount of data present.
Once the scan completes, the data is reported on the Environment Scans page and can be exported to file, using the Export Scan Results option.
Start your migration
We know that you may want to start your migration in the middle of the night, or over the weekend, but we don't expect you to stay up in order to do so. With CloudM Migrate, you can decide to schedule exactly when you'd like the migration to occur.
If you want to start the migration straight away, select Start.
Migration Readiness Test
The Migration Readiness Test provides a last check before starting a migration (regardless of the source or destination platform - with the exception of PST Archives, Google Cloud Storage and Microsoft Azure Storage). The Drive Readiness Test is now included as part of the Migration Readiness Test.
The test will be optional but is highly recommended, especially in cases where the user has made numerous changes to their configuration. You can only run one Migration Readiness Test at a time.
The test includes:
- Checking where changes have been made to general and advanced migration settings (differing from the default values) and suggest any potential issues that these settings could cause,
- Scanning the Source and Destination platform to ensure that the connections work properly,
- Flagging up any additional limitations, allowing users to resolve any issues before their migration begins.
To run the Migration Readiness Test:
- After conducting an Environment Scan, select Next,
- On the Summary screen, select Start (or click on the Migration Readiness Tests field),
- A Migration Readiness Test pop-up screen will be displayed, as shown below,
- You can choose to skip the Migration Readiness Test (by placing a tick in the checkbox), but we highly recommend running the test,
- Select Start Readiness Test,
- The results will start to propagate as settings are checked,
- If the setting is properly configured, the check results will be highlighted in Green,
- If the setting is different to the default value, it will be highlighted in Blue with a description of the setting. These results reflect changes that you have made, but should still be checked here to make sure that they are still correct for your migration,
- If the setting has failed (usually when attempting to connect to a source or destination platform), the check result will be highlighted in Red. These settings need to be rectified or your migration will fail.
- Select Close to close the pop-up screen.
- Once all errors are corrected, you can start your migration.
To export the report (for example, if prompted by our Support Team):
- Once the test has been completed, select the Export option,
- The report will be exported in CSV format and will save in your computer's Downloads folder.
- Attach the CSV file to your Support ticket.
Review your migration results
During the migration process, CloudM Migrate will report back in real time exactly who is being migrated and the items being processed. All you now need to do is sit back, relax and wait for your migration to complete.
Check the progress of your migration.
Once complete you can download a full report for your migration.
Comments
0 comments
Please sign in to leave a comment.