11.12. Verify and communicate with end users

Follow

Ensure that the data has been migrated as expected using the mapping and security settings that have been configured. This is best done by logging into the Source and Target and ensuring the Folders and Files have been migrated and can be accessed.

Review the Source Data and the Target Data

  • Using the structure mapping to confirm data has been moved to the intended location
  • For each content type, review item and meta data is correct and that the items operate as expected in the target.
  • Where different permissions mappings have been carried out, verify they achieve desired outcome.
Was this article helpful?
0 out of 0 found this helpful

Comments