Solved

Moving SBS2003 to new hardware

Posted on 2009-05-06
4
309 Views
Last Modified: 2012-05-06
I'm upgrading a customers server from an old HP proliant ML 110 (3yrs old) to a new HP proliant ML 350.  For ease, I'm hoping that I can just use ghost to create an image from the old server, then place the new image onto the new server.  Obviously the hardware is different and I'm concerned about the disk controller and receiving "inaccessible_boot_device" at boot up on the new server.  I'm thinking if I install all the new drivers into the existing windows, will the image then boot?  Has anyone tried this, or can recommened a different way?

Thanks
0
Comment
Question by:dcleaver
  • 2
4 Comments
 
LVL 21

Expert Comment

by:JBlond
ID: 24312491
0
 
LVL 21

Expert Comment

by:JBlond
ID: 24312540
Another option that avoids the driver and hardware issues you mentioned:

Virtualization!

Install VMware ESXi (http://www.vmware.com/products/esxi/) on the new server. Then install the VMware Converter Service (http://www.vmware.com/products/converter/) on the source server and install the converter application on a client computer.

On the source server, stop all unnecessary services especially the database services like Exchange, SQL and everything the you don't need during the conversion. Then on the client computer start the converter application, point it to the old server as the source and you the ESXi on the new server as target.

Wait for the conversion to complete, shutdown the old server, start the virtual machine on the new server. Finished.
0
 
LVL 2

Accepted Solution

by:
Dan560 earned 500 total points
ID: 24314331
Hi
I am not familar with ghost .I use Acronis instead.
They have product designed for small business servers. It allows you take an image of your current server and restore it onto your new hardware. It also has a feature called Universal restore so you can use restore it to different hardware.
 http://www.acronis.com/smb/products/ATISBS/
0
 

Author Closing Comment

by:dcleaver
ID: 31578365
Used Acronis and it worked great.  Thank you!
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

I work for a company that primarily works with small businesses as their outsourced IT vendor. As such the majority of these customers utilize some version of Small Business Server. Due to the economics of running a small business, many of these cus…
You may have discovered the 'Compatibility View Settings' workaround for making your SBS 2008 Remote Web Workplace 'connect to a computer' section stops 'working around' after a Windows 10 client upgrade.  That can be fixed so it 'works around' agai…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now