XIA Configuration Server automatically creates a detailed inventory of all the systems on a network, including Microsoft Windows, Unix and Linux based Servers and Workstations, SQL, AD, Exchange, VMWare environments, Hyper-V, IIS, Citrix XenApp Farms, XenDesktop Sites, Backup Exec, Clusters, DNS, DHCP and more. Inventory information is viewed through an intuitive web interface and can be exported into professional reports to share with others.
The following video shows the documentation of a fictitious Active Directory domain
How can XIA Configuration Server help you?
XIA Configuration Server saves you time and money by automatically auditing and documenting your network, a task that would take a lot longer to perform manually. It scans your entire network, brings back information about all connected systems, and can, for example, expose incorrectly configured servers or security vulnerabilities.
If you're building a disaster recovery plan, XIA Configuration Server can create the detailed documentation you need to help fully restore your environment.
For Redblade, as a managed services provider, access to information and the configuration history of our clients is essential. Our business is founded on our ability to react quickly to changing needs and with knowledge of all our managed networks.
Working with CENTREL Solutions and the use of their XIA Configuration product has been a game changer for our technical, technical presales and sales teams. It provides us with instant reporting of all our assets and reporting/analysis that allows us to respond to our clients’ needs flexibly and quickly.
We have also found CENTREL Solutions to be fast to develop and implement recommendations, making them a great partner to work with.
Head of Technical Presales
We have achieved a real efficiency improvement after implementing and using XIA within our multi client managed services company.
By using change management within XIA we are faster and more effective in determining causes of certain incidents that occur within the managed infrastructure.
We were so convinced of the value added by XIA Configuration that in addition to using it ourselves we decided to become a reseller for the product for the Dutch market.
IT Services Netherlands (ITSN)
Audit your Backup Exec server installations including storage devices, backup definitions, agent servers and selections.
Citrix XenApp Farms
Document your Citrix XenApp farms, servers, hotfixes, published applications and load balancing policies.
Citrix XenDesktop Sites
Audit your Citrix XenDesktop sites, machine catalogs, delivery groups, machines, published applications and policies.
Windows Servers and Workstations
Inventory your physical and virtualised Windows based servers and workstations. Detect changes, expose incorrect configuration and security vulnerabilities.
SQL Server Instances and Databases
Automatically document SQL Server instances, databases, tables and stored procedures. Detect stored procedure changes between database versions or environments.
Audit your Exchange Organisation infrastructure including Exchange Servers, address lists, storage groups and mailbox stores. Detect changes to an Exchange server's networking settings or SMTP configuration.
VMware Hosts and Virtual Machines
Automatically document vCenter 2.5 and 4.0 including ESX host and virtual machines configuration. Monitor changes within your virtual environment and ESX host. Expose incorrectly configured virtual machines.
Gather information about your DHCP server configuration as well as classes, scopes, reservations and exclusions.
Document your Hyper-V servers including those running the Hyper-V server role and bare-metal hypervisors.
Inspect your IIS Server configuration, including Web Sites, Application Pools and Applications.
Document your DNS Server configuration including forward and reverse lookup zone settings.
Unix and Linux
Automatically detect and document a range of Unix and Linux based systems. Locate incorrectly configured network settings. Track changes to Unix configuration files.
Report on your Microsoft Cluster configuration, including quorum settings, resource groups, and the individual cluster resources within those groups, cluster nodes, and networks.
User Accounts and Passwords
Record user accounts and passwords. Access control can be used to determine which users can view the passwords.
Detect servers running the Windows Internet Name (WINS) Service and document the WINS configuration.
Hardware Maintenance Contracts
Manually create support and maintenance contracts (e.g. hardware warranties or third party support) and assign them to your assets.
If you're currently using SYDI, please visit our SYDI page.
Download the free trial or buy online.