Solved

How best to identify applications and users that might be accessing an older application server?

Posted on 2016-11-16
2
10 Views
1 Endorsement
Last Modified: 2016-12-01
I have an older Server 2008 R2 application server (IIS 6 and 7 are installed, I know it was a mail relay and a licensing server for our engineering program, but not sure what else) in my domain that I'm attempting to sunset and remove.  My issue is that I've been here a year and I'm still stumbling onto undocumented applications and processes in my environment, and I fear removing the server and finding out later on that there was an old app, piece of manufacturing equipment, MFP, etc. that depended on something that was running on the server.

What's my best option for determining who or what might be connecting to this box, and for what purpose?

My first thought is wireshark, but I'm not too experienced with the app, so I don't know if this is my 'best' option or not.  I could also just shut the thing down and wait for an outcry, but I really hate the impression that type of move will give to my users (if it turns out that this is hosting some critical process).

Any advice would be greatly appreciated!

Scott
1
Comment
Question by:smilner71
2 Comments
 
LVL 7

Accepted Solution

by:
Senior IT System Engineer earned 500 total points
Comment Utility
Scott,

Does the application access the licensing web apps through IIS ?
if it is yes, then you can enable IIS logging and get the IP address from the IIS logs.
0
 

Author Closing Comment

by:smilner71
Comment Utility
Brilliant!

thanks for the response, and sorry for my delayed response back.  Looking through the IIS logs I was able to identify two remaining devices in my domain that were still configured to access the box.

I appreciate the help!

Scott
1

Featured Post

Too many email signature updates to deal with?

Do you feel like you are taking up all of your time constantly visiting users’ desks to make changes to email signatures? Wish you could manage all signatures from one central location, easily design them and deploy them quickly to users? Well, there is an easy way!

Join & Write a Comment

I was asked if I could set up a fax machine so that incoming faxes were delivered to people's Exchange inboxes and so that they could send faxes from their desktops without needing to print the document first.  I knew it was possible but I had no id…
To effectively work with Diskpart on a Server Core, it is necessary to write some small batch script's, because you can't execute diskpart in a remote powershell session. To get startet, place the Diskpart batch script's into a share on your loca…
This tutorial will give a short introduction and overview of Backup Exec 2012 and how to navigate and perform basic functions. Click on the Backup Exec button in the upper left corner. From here, are global settings for the application such as conne…
This tutorial will walk an individual through setting the global and backup job media overwrite and protection periods in Backup Exec 2012. Log onto the Backup Exec Central Administration Server. Examine the services. If all or most of them are stop…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now