Audit IT security Determine if your IT complies to security standards and best practices with compliance benchmark tests. Automatically execute tasks Use the integrated task scheduler to automatically execute tasks within XIA Configuration. Branded PDF Output Automatically generate professional documentation in PDF format with your own bespoke company branding. Compare Configuration Compare the configuration of systems against previous versions to see changes, or compare two different servers to see differences. Customise functionality to meet your requirements Extend and customise the functionality of XIA Configuration to meet your specific requirements. Document the relationships between your devices Automatically document the relationships between servers, devices and roles. Create your own custom relationships. Extend the data stored in XIA Configuration Extend the configuration of any item with your own custom sections and attributes. Knowledge Base Articles Store technical information and troubleshooting guides alongside other items within XIA Configuration. Managed Service Providers Increase the value of your MSP offering by providing a unique, fully automated technical documentation service. Multi-tenant XIA Configuration has been built from the ground up with a multi-tenant architecture so you can manage all your clients in one place. Password Management Record passwords and user accounts. Access control can be used to determine which users can view stored passwords. PCI DSS Specific reports have been created to assist you in providing information aligned to PCI DSS requirements. Programmatically view, change and export data Connect to the XIA Configuration database with PowerShell to programmatically search, view, change and export data. Run reports to analyse your IT infrastructure Use the preconfigured reports to analyse your IT infrastructure. Customise reports directly using SQL. Search Use XIA Configuration's integrated search to quickly and easily find items in your inventory. Track Changes Track unauthorized or accidental changes that might introduce security vulnerabilities.