Why use XIA Configuration?
XIA Configuration automatically creates a detailed inventory of all the systems on a network, including Microsoft Windows, Unix and Linux based Servers and Workstations, SQL, AD, Exchange, VMWare hosts, IIS, Clusters, DNS, and more. Inventory information is viewed through an intuitive web interface and can be exported into professional reports to share with others.
How can XIA Configuration help you?
XIA Configuration saves you time and money by automatically auditing and documenting your network, a task that would take a lot longer to perform manually. It scans your entire network, brings back information about all connected systems, and can, for example, expose incorrectly configured servers or security vulnerabilities.
If you're building a disaster recovery plan, XIA Configuration can create the detailed documentation you need to help you fully restore your environment.
Windows Servers and Workstations
Inventory your physical and virtualised Windows based servers and workstations. Detect changes to a server, expose incorrectly configured servers or security vulnerabilities. SQL Server Instances and Databases
Automatically document SQL Server, including detailed information about instances, databases, tables and stored procedures. Detect code changes within a stored procedure between database versions or environments. Microsoft Exchange
Audit your Exchange Organisation infrastructure including Exchange Servers, address lists, storage groups and mailbox stores. Detect changes to an Exchange server's networking settings or SMTP configuration. Active Directory Domains and Group Policies
Document multiple Active Directory domains and Group Policy settings. Quickly view trusts, functional levels and schema configuration within a single unified user interface. VMware Hosts and Virtual Machines
Automatically document vCenter 2.5 and 4.0 configuration including ESX host and virtual machines configuration. Monitor changes within your virtual environment. Detect changes to an ESX host. Expose incorrectly configured virtual machines. DHCP Server
Gather information about your DHCP server configuration as well as classes, scopes, reservations and exclusions. Hyper-V
Document your Hyper-V server infrastructure including both servers running the Hyper-V server role and bare-metal hypervisors. IIS
Inspect your IIS Server configuration, including Web Sites, Application Pools and Applications. DNS
Document your DNS Server configuration including forward and reverse lookup zone settings. Unix and Linux
Automatically detect and document a range of Unix and Linux based systems. Locate incorrectly configured network settings. Track changes to Unix configuration files. Microsoft Cluster
Report on your Microsoft Cluster configuration, including quorum settings, resource groups, and the individual cluster resources within those groups, cluster nodes, and networks. User Accounts and Passwords
Record user accounts and passwords. Access control can be used to determine which users can view the passwords. Data Centres, Office Locations and Sites
Manually create rooms, racks and locations. Physical items such as servers can then be assigned to rooms and racks, which in turn can then be assigned to locations. WINS Service
Detect servers running the Windows Internet Name (WINS) Service and document the WINS configuration. Hardware Maintenance Contracts
Manually create support and maintenance contracts (e.g. hardware warranties or third party support) and assign them to your assets.
For current SYDI users please see our SYDI