Automate the documentation of your server and network configuration

Free Trial Buy Now

Why use XIA Configuration?

XIA Configuration automatically creates a detailed inventory of all the systems on a network, including Microsoft Windows, Unix and Linux based Servers and Workstations, SQL, AD, Exchange, VMWare hosts, IIS, Clusters, DNS, and more. Inventory information is viewed through an intuitive web interface and can be exported into professional reports to share with others.

How can XIA Configuration help you?

XIA Configuration saves you time and money by automatically auditing and documenting your network, a task that would take a lot longer to perform manually. It scans your entire network, brings back information about all connected systems, and can, for example, expose incorrectly configured servers or security vulnerabilities.

If you're building a disaster recovery plan, XIA Configuration can create the detailed documentation you need to help you fully restore your environment.

Pie chart and bar chart

Compare Items and Track Changes

XIA Configuration allows you to compare the configuration of items against previous versions allowing you to determine when a change was made to a system.

Baselines allow you to compare how a system is configured compared to a "golden build" allowing you to determine when a server, SQL instance, database or any other item within the inventory doesn't adhere to your configuration policy.


Unrestricted Multitenant Support

XIA Configuration was designed from the ground up to support multiple departments, directorates or companies within a single management interface.

Whether you support in house IT infrastructure or are an IT support provider with multiple customers, XIA Configuration can meet your organisational requirements.


Professional Documentation Output

Regardless of the technology you wish to document, XIA Configuration allows you to quickly and easily create professional documentation with a consistent look and feel.

The output can be customised to match your organisation's branding by using custom colour schemes and logos.

Cloud icon

Hosted Cloud Services

With XIA Configuration Hosted Cloud Services, we take care of installing, updating and managing XIA Configuration Server.

Simply install the client and scan and upload your data to our servers and just pay for what you use.


Windows Server Windows Servers and Workstations
Inventory your physical and virtualised Windows based servers and workstations. Detect changes to a server, expose incorrectly configured servers or security vulnerabilities.
SQL Instance SQL Server Instances and Databases
Automatically document SQL Server, including detailed information about instances, databases, tables and stored procedures. Detect code changes within a stored procedure between database versions or environments.
Exchange Microsoft Exchange
Audit your Exchange Organisation infrastructure including Exchange Servers, address lists, storage groups and mailbox stores. Detect changes to an Exchange server's networking settings or SMTP configuration.
AD Domain Active Directory Domains and Group Policies
Document multiple Active Directory domains and Group Policy settings. Quickly view trusts, functional levels and schema configuration within a single unified user interface.
VMWare VMware Hosts and Virtual Machines
Automatically document vCenter 2.5 and 4.0 configuration including ESX host and virtual machines configuration. Monitor changes within your virtual environment. Detect changes to an ESX host. Expose incorrectly configured virtual machines.
DHCP Server DHCP Server
Gather information about your DHCP server configuration as well as classes, scopes, reservations and exclusions.
Hyper-V Hyper-V
Document your Hyper-V server infrastructure including both servers running the Hyper-V server role and bare-metal hypervisors.
IIS Server IIS
Inspect your IIS Server configuration, including Web Sites, Application Pools and Applications.
DNS Service DNS
Document your DNS Server configuration including forward and reverse lookup zone settings.
Linux  Unix and Linux
Automatically detect and document a range of Unix and Linux based systems. Locate incorrectly configured network settings. Track changes to Unix configuration files.
Microsoft Cluster  Microsoft Cluster
Report on your Microsoft Cluster configuration, including quorum settings, resource groups, and the individual cluster resources within those groups, cluster nodes, and networks.
Password List User Accounts and Passwords
Record user accounts and passwords. Access control can be used to determine which users can view the passwords.
Location Data Centres, Office Locations and Sites
Manually create rooms, racks and locations. Physical items such as servers can then be assigned to rooms and racks, which in turn can then be assigned to locations.
WINS Service WINS Service
Detect servers running the Windows Internet Name (WINS) Service and document the WINS configuration.
Support Provision Hardware Maintenance Contracts
Manually create support and maintenance contracts (e.g. hardware warranties or third party support) and assign them to your assets.