Summary

Table 24.6 illustrates a sample change and configuration management strategy for a large organization with multiple types of users.

Table 24.6 Sample Change and Configuration Management Strategy

User Classification

User Data Management

User Settings Management

Software Installation and Maintenance

Remote OS Installation

Technical

Basic

Basic (without lockdown)

Basic

Advanced

Stationary Professional

Basic

Basic

Advanced

Basic

Roaming Professional

Advanced

Basic

Advanced

Basic

Mobile Professional

Advanced

Basic

Advanced

Advanced

Task-Based User

Advanced

Advanced

Advanced

Basic

For user data management, use the following guidelines:

  • Basic user data management can be useful in companies that manage client computers only moderately.

  • Advanced user data management depends on the types of users, particularly in highly managed environments, and when a high degree of service is warranted (for senior executives, for example).

For user settings management, the following guidelines have been applied:

  • Basic settings management will be used primarily in organizations with moderately managed client computers, and most often applied to highly managed client computers. It will be used most heavily when a dedicated administrative staff is present.

  • Advanced settings management will be used primarily in highly managed environments where support costs are an issue, such as schools, hospitals, and factory floors.

For software installation and maintenance, the following guidelines have been applied:

  • Basic software installation and maintenance will become standard practice, particularly the publishing of organization software.

  • Advanced software installation and maintenance will be used primarily in highly managed environments where support costs are an issue, such as kiosks, schools, hospitals, and factory floors.

For remote operating system installation, the following guidelines have been applied:

  • Basic remote operating system installation will be used when user options are restricted or highly automated. If users are allowed to perform remote installations, they should only have to initiate a remote installation during system startup and enter their user name and password.

  • Advanced remote operating system installation will be used when the user can choose which operating system image will be installed and how, or when special circumstances warrant additional flexibility by users performing the installation.