Documentation for all servers
Contact person:
Server Description:
Hardware: Physical (use command line below to discover server type) or VMware or XEN
Service tag: Following WMIC command will give (wmic is superseded by Powershell)
Use Powershell to get make and model number along with service tag.
Code Block |
---|
C:\>wmic csproduct get vendor,name,identifyingnumber |
Contact person:
OS : Windows 2003 32/64, Windows 2003-R2 32/64, Windows 2008 32/64, Windows 2008-R2 (64)
Network Info:
- DNS:
- IP:
- # of interfaces:
- MAC address:
Installed applications/roles:
...
Get-WmiObject has an alias gwmi, either can be used.
PSH C:\> Get-WmiObject Win32_ComputerSystemProduct |fl Name,Vendor,IdentifyingNumber,uuid
Name : PowerVault NX3000
Vendor : Dell Inc.
IdentifyingNumber : FD1WTL1
uuid : 4C4C4544-0044-3110-8057-C6C04F544C31
OS :
PSH C:\> gwmi -Class win32_OperatingSystem | fl name,version
name : Microsoftr Windowsr Storage Server 2008 Standard |C:\Windows|\Device\Harddisk0\Partition2
version : 6.0.6002
Network Info (the following powershell script will do it):
No Format |
---|
$strComputer = "."
$colItems = Get-wmiobject -class "Win32_NetworkAdapterConfiguration" `
-computername $strComputer | Where{$_.IpEnabled -Match "True"}
foreach ($objItem in $colItems) {
write-host "MAC Address : " $objItem.MACAddress
write-host "IPAddress : " $objItem.IPAddress
write-host "IPAddress : " $objItem.IPEnabled
write-host "DNS Servers : " $objItem.DNSServerSearchOrder
Write-host ""
}
|
Installed applications/roles:
On 2008 R2 and newer, you can use powershell to give you the installed roles:
No Format |
---|
PS C:\Windows\system32> ipmo ServerManager
PS C:\Windows\system32> Get-WindowsFeature | where {$_.Installed -eq "True"} | ft DisplayName |
Will output something like this:
No Format |
---|
Active Directory Certificate Services
Certification Authority
Active Directory Domain Services
Active Directory Domain Controller
DNS Server
File Services
File Server
Distributed File System
DFS Namespaces
DFS Replication
.NET Framework 3.5.1 Features
.NET Framework 3.5.1
Group Policy Management
Remote Server Administration Tools
Role Administration Tools
Active Directory Certificate Services Tools
Certification Authority Tools
AD DS and AD LDS Tools
AD DS Tools
AD DS Snap-Ins and Command-Line Tools
Active Directory Administrative Center
Active Directory module for Windows PowerShell
DNS Server Tools
File Services Tools
Distributed File System Tools
Windows PowerShell Integrated Scripting Environment (ISE)
Windows Server Backup Features
Windows Server Backup
Command-line Tools |
Sidewinder firewall exceptions:
- RDP (3389)
- HTTP/S (80/443)
Local firewall:
- Use Powershell to place information in wiki (See below)
Vendor contact information:
Backup/restore notes:
Special privledges assigned:
Misc. Installation notes:
____________________________________________________________________________________
Using PowerShell, you can use the firewall COM object to obtain details of the Windows Firewall.
Here's how to get the object and the Firewall profile:
PSH C:\> # create com object
PSH C:\> $profile = (new-object -com HNetCfg.FwMgr).LocalPolicy.CurrentProfile
Once you get this object created, you can examine it and determine your firewall setup as follows:
PSH C:\> # determine global open ports
PSH C:\> $profile.GloballyOpenPorts | fl name, port
Name : Networker-7938
Port : 7938
Name : Networker 7937
Port : 7937
PSH C:\> # determine authorised applications
PSH C:\> $profile.AuthorizedApplications | ? {$_.Enabled} | fl name,ProcessImageFileName
Name : McAfee Framework Service
ProcessImageFileName : C:\Program Files (x86)\McAfee\Common Framework\FrameworkService.exe
Name : EMC NetWorker Execution Process
ProcessImageFileName : C:\Program Files\Legato\nsr\bin\nsrexec.exe
Name : EMC NetWorker Remote Execution Server
ProcessImageFileName : C:\Program Files\Legato\nsr\bin\nsrexecd.exe
Name : ExtremeZ-IP
ProcessImageFileName : C:\Program Files (x86)\Group Logic\ExtremeZ-IP\ExtremeZ-IP.exe
PSH C:\> # determine enabled services
PSH C:\> $profile.Services | ? {$_.Enabled} | fl name,RemoteAddresses
Name : File and Printer Sharing
RemoteAddresses : *
Name : Remote Desktop
RemoteAddresses : 137.22.0.1-137.22.255.254
You could of course, do some better formatting of this information.