Ensure that risks and constraints are identified and documented and that the risk-mitigation plan has been agreed by all groups involved.

  • An example of a constraint: available network bandwidth between on-premises and SDDC (Is DirectAccess available?)
  • An example of a risk: different CPU generations between on-premises ESXi hosts and hosts in an SDDC
check-circle-line exclamation-circle-line close-line
Scroll to top icon