As part of preparation for migration, you should take a software inventory with the goal of identifying potential conflicts and creating a list of critical applications to test.
Recommended steps
- Review and identify any existing anti-malware/anti-virus, anti-spam, or other endpoint protection products that are installed on targeted endpoints. Capture the product version for later comparison.
- Identify any business critical applications so that you can test them during the migration to ensure that they still work.
- Items that are not business critical should also be listed, but may in some cases be tested later.