Solved

Server 2008 R2 List of ports and services

Posted on 2014-03-10
5
217 Views
Last Modified: 2014-03-11
Hello

I need to build a list of servers and the ports in use for DMZ purposes.  They are all server 2008 R2.  Is there a better way of doing this or is there a script to make it easier and if so how?

Thanks!
0
Comment
Question by:smyers051972
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 8

Accepted Solution

by:
jpgobert earned 500 total points
ID: 39918433
I'm guessing you're talking about the different ports that may be used for whatever services are being hosted on your servers, correct?

The easiest way I can think of would be to use nmap to scan each server and let it report back with what's open and what the ports are used for.  Obviously if it finds a port that's not standard then it may not me able to tell you exactly what it is for... at minimum this will give you a good working list and you can go from there.
0
 
LVL 1

Author Comment

by:smyers051972
ID: 39918459
Im trying that and lansweeper, its hard when you walk into an undocumented network and you are told "hey build a new DMZ by 3/31".
0
 
LVL 8

Expert Comment

by:jpgobert
ID: 39918473
I completely understand... if these don't work out then post back with what's not working right and I'll help you fine tune a method.
0
 
LVL 1

Author Comment

by:smyers051972
ID: 39921752
I think I got it mostly figured out, they really need a documented network though but thats really hard to do with something this large and this late in the game.
0
 
LVL 1

Author Closing Comment

by:smyers051972
ID: 39921753
Thank you!
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
A project that enables an administrator to perform actions within a user session context not just at the time of login but any time later on day(s) or week(s) later.
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

710 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question