Migration Overview

Written By Marissa Fegan (Super Administrator)

Updated at June 15th, 2020

A recommended list of steps for end-to-end VIPRE implementation in your business.

When planning a VIPRE implementation, there are many paths to success: the methodology you use for one project may be very different than you use for another. Generally speaking, most VIPRE implementation issues are easily resolved with a little troubleshooting, but planning and testing in advance can prevent that troubleshooting from interrupting normal business operations. VIPRE advises a risk-based approach to determining how much planning and testing should go into each project; make sure that you carefully test any mission-critical systems and apps before you fully deploy VIPRE, but in many cases you can probably defer testing for helpful-but-not-critical utilities until after general deployment.

To help ensure the success of a given VIPRE project:

  1. Evaluate the current environment:
    1. Which devices—server, desktops, servers, etc—you wish to be protected by VIPRE. Generally speaking, we recommend that pretty much anything that's on the network should have some form of anti-malware protection
    2. Determine whether existing endpoints currently have any form of existing anti-virus, anti-malware, or anti-spam software installed on them and active
    3. Perform a software inventory of important business applications that are in use on endpoints
  2. Develop a plan to deploy agents to the endpoints
    1. How will you deliver the agent to the endpoint? Who will do the installation?
    2. Will any manual uninstall of existing AV solutions be required?
    3. How will you verify that the agent is installed and working correctly for all targeted endpoints?
  3. Perform additional testing to ensure that VIPRE is not conflicting with existing apps
    1. Determine up front if you'll test in a pre-production environment, or whether you'll roll VIPRE out broadly and then perform testing
    2. Check that business critical apps work, that printing works, that any important USB devices still work
  4. Document the full deployment process and any customized settings

The following sections of this Migration Guide will provide additional detail on how to complete each of these steps.