Was this page helpful?
Your feedback about this content is important. Let us know what you think.
Additional feedback?
1500 characters remaining
Export (0) Print
Expand All

Determining User Requirements

Updated: March 28, 2003

Applies To: Windows Server 2003, Windows Server 2003 R2, Windows Server 2003 with SP1, Windows Server 2003 with SP2

Typically, larger organizations have a wide range of user needs. In addition to knowing your organization’s needs, you must understand the work needs of users before you design and deploy services that define the users’ computing environment.

When you plan a deployment, determine the following:

  • The number of users to be accommodated. Allocating resources, such as disk space and network bandwidth, varies depending on the numbers of users.

  • The primary applications and computing services in use, such as databases and e-mail. Databases are stored in shared folders on the network and do not move with users. However, users typically have user settings that must be available to them wherever the users log on to. E-mail applications might store users’ e-mail folders in network shares or on the local workstation. In either case, these folders must remain available.

  • Whether mobile users switch from one workstation to another or use a single portable computer. Users who switch between workstations benefit from roaming user profiles more than those who work exclusively on a single computer.

  • The security requirements of different users, applications, and data files. Security involves access controls and backup requirements.

To develop a plan for managing user data and settings, categorize users according to their job types and computer experience. Then, determine whether users need to be able to work from any computer on the network and retain access to network-based files when they are not connected to the network.

For more information about user categories, see "Planning a Managed Environment" in this book.

For job aids to assist you with the deployment processes discussed in this chapter, see Additional Resources for Implementing User State Management later in this chapter.

Was this page helpful?
(1500 characters remaining)
Thank you for your feedback

Community Additions

© 2015 Microsoft