In the daily security service work, you often encounter the need to collect information about the target server system, such as: system logs, middleware logs, system information, and so on. Collecting this information can help analyze the security status of the server and facilitate the forensic analysis after the invasion. However, the customer network environment is often very complicated, the server is more, the system version is not the same, which brings a lot of trouble to the manual collection, so the research and development of the server information collection tool.
- Collect system logs
- Collect system information
- IP_MAC address
- User information
- Operating system version
- Process information
- Port information
- Collect middleware logs
- Full search log file
Run the program and start collecting system information.
During the running of the program, you can enter the target disk drive letter, scan the disk to obtain the .log file; if you do not enter the direct carriage return, the default is full scan.
After the operation is completed, the collected logs and system information folder will be generated in the current directory.
Note: If the program runs incorrectly (MSVCR100.dll), go to [Download] (https://github.com/tengzhangchao/Windows_Packages/raw/master/VC%2B%2B%20Redist/2010_vcredist_x64.exe) VC Runtime Install it and run the program again after the installation is complete.
Windows server information collection tool [download address] (https://github.com/tengzhangchao/InForMation)