WinDoctemplate
Documentation for all servers
Contact person:
Server Description:
Hardware: Physical (use command line below to discover server type) or VMware or XEN
Service tag: (wmic is superseded by Powershell)
Use Powershell to get make and model number along with service tag. Get-WmiObject has an alias gwmi, either can be used.
PSH C:\> Get-WmiObject Win32_ComputerSystemProduct |fl Name,Vendor,IdentifyingNumber,uuid
Name : PowerVault NX3000
Vendor : Dell Inc.
IdentifyingNumber : FD1WTL1
uuid : 4C4C4544-0044-3110-8057-C6C04F544C31
OS :
PSH C:\> gwmi -Class win32_OperatingSystem | fl name,version
name : Microsoftr Windowsr Storage Server 2008 Standard |C:\Windows|\Device\Harddisk0\Partition2
version : 6.0.6002
Network Info (the following powershell script will do it):
$strComputer = "." $colItems = Get-wmiobject -class "Win32_NetworkAdapterConfiguration" ` -computername $strComputer | Where{$_.IpEnabled -Match "True"} foreach ($objItem in $colItems) { write-host "MAC Address : " $objItem.MACAddress write-host "IPAddress : " $objItem.IPAddress write-host "IPAddress : " $objItem.IPEnabled write-host "DNS Servers : " $objItem.DNSServerSearchOrder Write-host "" }
Installed applications/roles:
On 2008 R2 and newer, you can use powershell to give you the installed roles:
PS C:\Windows\system32> ipmo ServerManager PS C:\Windows\system32> Get-WindowsFeature | where {$_.Installed -eq "True"} | ft DisplayName
Will output something like this:
Active Directory Certificate Services Certification Authority Active Directory Domain Services Active Directory Domain Controller DNS Server File Services File Server Distributed File System DFS Namespaces DFS Replication .NET Framework 3.5.1 Features .NET Framework 3.5.1 Group Policy Management Remote Server Administration Tools Role Administration Tools Active Directory Certificate Services Tools Certification Authority Tools AD DS and AD LDS Tools AD DS Tools AD DS Snap-Ins and Command-Line Tools Active Directory Administrative Center Active Directory module for Windows PowerShell DNS Server Tools File Services Tools Distributed File System Tools Windows PowerShell Integrated Scripting Environment (ISE) Windows Server Backup Features Windows Server Backup Command-line Tools
Sidewinder firewall exceptions:
- RDP (3389)
- HTTP/S (80/443)
Local firewall:
- Use Powershell to place information in wiki (See below)
Vendor contact information:
Backup/restore notes:
Special privledges assigned:
Misc. Installation notes:
____________________________________________________________________________________
Using PowerShell, you can use the firewall COM object to obtain details of the Windows Firewall.
Here's how to get the object and the Firewall profile:
PSH C:\> # create com object
PSH C:\> $profile = (new-object -com HNetCfg.FwMgr).LocalPolicy.CurrentProfile
Once you get this object created, you can examine it and determine your firewall setup as follows:
PSH C:\> # determine global open ports
PSH C:\> $profile.GloballyOpenPorts | fl name, port
Name : Networker-7938
Port : 7938
Name : Networker 7937
Port : 7937
PSH C:\> # determine authorised applications
PSH C:\> $profile.AuthorizedApplications | ? {$_.Enabled} | fl name,ProcessImageFileName
Name : McAfee Framework Service
ProcessImageFileName : C:\Program Files (x86)\McAfee\Common Framework\FrameworkService.exe
Name : EMC NetWorker Execution Process
ProcessImageFileName : C:\Program Files\Legato\nsr\bin\nsrexec.exe
Name : EMC NetWorker Remote Execution Server
ProcessImageFileName : C:\Program Files\Legato\nsr\bin\nsrexecd.exe
Name : ExtremeZ-IP
ProcessImageFileName : C:\Program Files (x86)\Group Logic\ExtremeZ-IP\ExtremeZ-IP.exe
PSH C:\> # determine enabled services
PSH C:\> $profile.Services | ? {$_.Enabled} | fl name,RemoteAddresses
Name : File and Printer Sharing
RemoteAddresses : *
Name : Remote Desktop
RemoteAddresses : 137.22.0.1-137.22.255.254
You could of course, do some better formatting of this information.