The essential Office 365 migration guide
A comprehensive collection of articles, videos and more, hand-picked by our editors
My company is planning a move to Microsoft Office 365. I've read about cutover and staged migrations and am curious...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
where each is needed and what the key differences are. Can you please explain?
Cutover Office 365 migrations use either IMAP or RPC over HTTP to extract email messages from your on-premises Exchange servers and copy them to the cloud. Once the messages have been moved, the DNS records are changed to point to the hosted Exchange servers, in order for users to begin using Exchange in the cloud.
Staged Office 365 migrations are similar to cutover migrations, but the key difference is that users are migrated in batches. Therefore, the assumption is that there will be a coexistence period between the hosted Exchange Server deployment and the on-premises deployment.
There are various considerations to take into account when it comes to choosing a migration type, but one of the most important is mailbox data volume. It may prove impossible to migrate large numbers of mailboxes or vast quantities of mailbox data within an allotted period of time. In these types of situations, a staged migration is more effective than a cutover migration.
You also have the option to perform a hybrid coexistence migration. Such a migration is complex, but is ideally suited for large organizations that require an extended coexistence period. In this type of migration, you must establish Active Directory synchronization and single sign-on between the on-premises and hosted Exchange deployments. The advantage here is that a hybrid coexistence migration lets you migrate mailboxes at your leisure, using native Exchange Server tools.
About the author:
Brien Posey is a ten-time Microsoft MVP with two decades of IT experience. Before becoming a freelance technical writer, Brien worked as a chief information officer at a national chain of hospitals and health care facilities. He has also served as a network administrator for some of the nation's largest insurance companies and for the Department of Defense at Fort Knox.
Related Q&A from Brien Posey
Browser malware can make it impossible to access websites you might need for work. Luckily, there's a simple way IT and end users can get rid of ...continue reading
There are four common execution policies IT administrators can choose from to secure PowerShell against malicious attacks. Figure out which one is ...continue reading
If you're looking to get away from nightly tape backups, and want to replicate data to various types of storage media, a continuous data protection ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.