Migrating users to new versions of applications or operating systems can be a complex, time-consuming and tedious process for systems administrators. And, from a security perspective, it is crucial that the migration of end-users and application settings is done properly in order to prevent vulnerabilities from creeping in.