• Environmental and Machine Requirements

  • Understanding Audit

  • Comparing Firewall Rules

  • Comparing Group Policies between Source and Destination

  • COM+ and DCOM Requirements