Solved

How best to identify applications and users that might be accessing an older application server?

Posted on 2016-11-16
2
51 Views
1 Endorsement
Last Modified: 2016-12-01
I have an older Server 2008 R2 application server (IIS 6 and 7 are installed, I know it was a mail relay and a licensing server for our engineering program, but not sure what else) in my domain that I'm attempting to sunset and remove.  My issue is that I've been here a year and I'm still stumbling onto undocumented applications and processes in my environment, and I fear removing the server and finding out later on that there was an old app, piece of manufacturing equipment, MFP, etc. that depended on something that was running on the server.

What's my best option for determining who or what might be connecting to this box, and for what purpose?

My first thought is wireshark, but I'm not too experienced with the app, so I don't know if this is my 'best' option or not.  I could also just shut the thing down and wait for an outcry, but I really hate the impression that type of move will give to my users (if it turns out that this is hosting some critical process).

Any advice would be greatly appreciated!

Scott
1
Comment
Question by:Scott Milner
2 Comments
 
LVL 7

Accepted Solution

by:
Senior IT System Engineer earned 500 total points
ID: 41890588
Scott,

Does the application access the licensing web apps through IIS ?
if it is yes, then you can enable IIS logging and get the IP address from the IIS logs.
0
 

Author Closing Comment

by:Scott Milner
ID: 41909301
Brilliant!

thanks for the response, and sorry for my delayed response back.  Looking through the IIS logs I was able to identify two remaining devices in my domain that were still configured to access the box.

I appreciate the help!

Scott
1

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Redirected folders in a windows domain can be quite useful for a number of reasons, one of them being that with redirected application data, you can give users more seamless experience when logging into different workstations.  For example, if a use…
I was supporting a handful of Windows 2008 (non-R2) 2 node clusters with shared quorum disks. Some had SQL 2008 installed and some were just a vendor application that we supported. For the purposes of this article it doesn’t really matter which so w…
This tutorial will show how to push an installation of Backup Exec to an additional server in both 2012 and 2014 versions of the software. Click on the Backup Exec button in the upper left corner. From here, select Installation and Licensing, then I…
This tutorial will walk an individual through locating and launching the BEUtility application and how to execute it on the appropriate database. Log onto the server running the Backup Exec database. In a larger environment, this would generally be …

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question