Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Migrated to Confluence 5.3

Documentation for all servers

Contact person:

Server Description:

Hardware: Physical (use command line below to discover server type) or VMware or XEN

Service tag: Following WMIC command will give (wmic is superseded by Powershell)

Use Powershell to get make and model number along with service tag.

Code Block
C:\>wmic csproduct get vendor,name,identifyingnumber

Contact person:

OS : Windows 2003 32/64, Windows 2003-R2 32/64, Windows 2008 32/64, Windows 2008-R2 (64)

Network Info:

  • DNS:
  • IP:
  • # of interfaces:
  • MAC address:

Installed applications/roles:

Sidewinder firewall exceptions:

Vendor contact information:

Special priviledges assigned:

Misc. Installation notes:Get-WmiObject has an alias gwmi, either can be used.

PSH C:\> Get-WmiObject Win32_ComputerSystemProduct |fl Name,Vendor,IdentifyingNumber,uuid

Name : PowerVault NX3000
Vendor : Dell Inc.
IdentifyingNumber : FD1WTL1
uuid : 4C4C4544-0044-3110-8057-C6C04F544C31

OS :
PSH C:\> gwmi -Class win32_OperatingSystem | fl name,version

name : Microsoftr Windowsr Storage Server 2008 Standard |C:\Windows|\Device\Harddisk0\Partition2
version : 6.0.6002

Network Info (the following powershell script will do it):

No Format

$strComputer = "."

$colItems = Get-wmiobject -class "Win32_NetworkAdapterConfiguration" `

-computername $strComputer | Where{$_.IpEnabled -Match "True"}

foreach ($objItem in $colItems) {

   write-host "MAC Address : " $objItem.MACAddress

   write-host "IPAddress : " $objItem.IPAddress

   write-host "IPAddress : " $objItem.IPEnabled

   write-host "DNS Servers : " $objItem.DNSServerSearchOrder

   Write-host ""

}

Installed applications/roles:

On 2008 R2 and newer, you can use powershell to give you the installed roles:

No Format
PS C:\Windows\system32> ipmo ServerManager
PS C:\Windows\system32> Get-WindowsFeature | where {$_.Installed -eq "True"} | ft DisplayName

Will output something like this:

No Format

Active Directory Certificate Services
Certification Authority
Active Directory Domain Services
Active Directory Domain Controller
DNS Server
File Services
File Server
Distributed File System
DFS Namespaces
DFS Replication
.NET Framework 3.5.1 Features
.NET Framework 3.5.1
Group Policy Management
Remote Server Administration Tools
Role Administration Tools
Active Directory Certificate Services Tools
Certification Authority Tools
AD DS and AD LDS Tools
AD DS Tools
AD DS Snap-Ins and Command-Line Tools
Active Directory Administrative Center
Active Directory module for Windows PowerShell
DNS Server Tools
File Services Tools
Distributed File System Tools
Windows PowerShell Integrated Scripting Environment (ISE)
Windows Server Backup Features
Windows Server Backup
Command-line Tools

Sidewinder firewall exceptions:

  • RDP (3389)
  • HTTP/S (80/443)

Local firewall:

  • Use Powershell to place information in wiki (See below)

Vendor contact information:

Backup/restore notes:

Special privledges assigned:

Misc. Installation notes:

____________________________________________________________________________________

Using PowerShell, you can use the firewall COM object to obtain details of the Windows Firewall.

Here's how to get the object and the Firewall profile:

PSH C:\> # create com object
PSH C:\> $profile = (new-object -com HNetCfg.FwMgr).LocalPolicy.CurrentProfile

Once you get this object created, you can examine it and determine your firewall setup as follows:

PSH C:\> # determine global open ports
PSH C:\> $profile.GloballyOpenPorts | fl name, port

Name : Networker-7938
Port : 7938

Name : Networker 7937
Port : 7937

PSH C:\> # determine authorised applications

PSH C:\> $profile.AuthorizedApplications | ? {$_.Enabled} | fl name,ProcessImageFileName

Name : McAfee Framework Service
ProcessImageFileName : C:\Program Files (x86)\McAfee\Common Framework\FrameworkService.exe

Name : EMC NetWorker Execution Process
ProcessImageFileName : C:\Program Files\Legato\nsr\bin\nsrexec.exe

Name : EMC NetWorker Remote Execution Server
ProcessImageFileName : C:\Program Files\Legato\nsr\bin\nsrexecd.exe

Name : ExtremeZ-IP
ProcessImageFileName : C:\Program Files (x86)\Group Logic\ExtremeZ-IP\ExtremeZ-IP.exe

PSH C:\> # determine enabled services
PSH C:\> $profile.Services | ? {$_.Enabled} | fl name,RemoteAddresses

Name : File and Printer Sharing
RemoteAddresses : *

Name : Remote Desktop
RemoteAddresses : 137.22.0.1-137.22.255.254

You could of course, do some better formatting of this information.