SharePoint Feature GUID Identification

When working on a Sharepoint 2007 to 2013 migration, I had a need to identify SharePoint feature GUIDs in the 2007 farm to identify whether or not these items would be able to migrate to the new farm without issue. I had an application that provided documentation on each of the farms and identified all Site Collection features that were activated, but would output the resulting data with a list of these GUIDs rather than feature names.

Many features that come with SharePoint have GUIDs that you can reference by doing a quick google search for SharePoint Feature GUIDs. But for those custom features, I needed a way to pair these GUIDs with the feature names.


What to do?

When on the Site Collection you’re examining, go to Site Settings under the gear icon at the top right or Site Actions depending on what version of SharePoint you’re using:SiteSettingsSharePoint 2013 Site Settings

Navigate to Site Collection Features on the Site Settings page.SiteCollectionFeatures

You will then be given a page with a list of features activated, or available to activate, on that Site Collection. To find a specific feature’s GUID, click deactivate. Note: This will NOT deactivate the feature yet, you will be prompted with a confirmation screen before the feature is actually deactivated.


The next page will be the feature deactivation confirmation screen. We are not going to deactivate any features. The trick is that when you look at the URL on the resulting screen, it will contain the feature GUID with a FeatureID=<FeatureGUID> section in the URL:FeatureGUID

Remote Access – Port Forwarding UVerse 3800HGV-B

Recently, I have found a need to be able to set up a Remote Desktop Connection to my home desktop from work. At times, I’ve needed to access files that I accidentally left at home once I got to work, or maybe continue a long running task that I’d like to have finished by the time I got home. I’ve explored options for software such as LogMeIn, but found it to be tacky and overkill. Additionally, I use a program called RDTabs extensively at work to RDP into different client’s environments, so why not mine? Thus, the decision to set up external RDP access to my desktop seemed simple.


Part 1: Port Forwarding the Gateway for RDP Access

This seemingly simple task has proved to be quite daunting. Previous routers I have used have had much simpler UIs than what this router offers. Want to swap out this router with one you already have? Too bad. UVerse doesn’t want to let you do this. Setting up the 3800GHV into a bridge mode also, through some quick internet searches, isn’t a feature that can be utilized. How nice.

Remote Desktop Connections connect on port 3389. We need to set up the router to forward connections to this port to my desktop computer.

  1. Connect to the router’s administrator console using the default access URL
  2. RouterURL

  3. The default username and password to connect will be printed right on the router (assuming you haven’t changed this yet)
  4. Navigate to the firewall settings, and then Applications, Pinholes, and DMZ (Settings -> Firewall->Applications, Pinholes, and DMZ)
  5. Settings-firewall

  6. On the Firewall page, choose a profile for the device that you would like to apply the port forwarding settings to. In my case, I selected my ethernet connected desktop named “Neptune”. Notice the icons next to the devices which can help identify your device in case you are unsure of a name.
  7. DeviceSelection

  8. Next, ensure that “Allow individual application(s)” is selected. Select “XP Remote Desktop” in the Applications List in the center column, and then click add.
  9. XP Remote Desktop

  10. Click save at the bottom right
  11. Save

Now, we have the correct port forwarding to the device for remote desktop access. One would think that they are finished, but the finicky gateway provided by AT&T will prove that the setup you have just finished isn’t quite enough. Proceed to Part 2.


Part 2: Port Forward PPTP to the Same Device

This step doesn’t really make a lot of sense to anyone who knows what PPTP. PPTP is a protocol used for VPN access, which is something out of the realm of what we are doing today. Luckily, I stumbled across a blog post through my troubleshooting that stated turning on PPTP port forwarding to the same device will allow the RDP connections.

  1. Ensure you are on the “Applications, Pinholes, and DMZ” page that we were on from step 3 above.
  2. On the Firewall page, choose a profile for the device that you would like to apply the port forwarding settings to (step 4 above).
  3. Select the PPTP option in the middle Applications List (similar to step 5 above)
  4. Click Add
  5. Click Save


Part 3: Enabling Remote Access on the Device

Beyond the settings that have to be made in order to allow your router to forward these ports, you must make sure that your computer itself will allow Remote Access. Below are steps to make sure that your device will allow you to connect remotely. Note: The steps outlined below are for Windows 8.1

  1. Open file explorer, click My PC in the left navigation, and then System Properties in the ribbon:
  2. SystemProperties

  3. Click Remote Settings in the left navigation in the resulting screen:
  4. Remote Settings

  5. Allow remote connections to your computer:
  6. EnableRA


Part 4: Connecting to the Device

With the above steps completed, we should be able to now connect to your device using its public IP address. To find your public IP address, google “what is my IP” or navigate to

  1. Find your public IP address for the device by Googling “What is my IP” or utilizing a site such as
  2. Open your RDP application or open your Windows default Remote Desktop Connection application
  3. Connect using your public IP that was gathered above
  4. Enter credentials to log in


You’re done! You should now be able to connect to your computer. If you continue to have problems, make sure that your firewall isn’t blocking remote access connections. If you’re using the built-in Windows Firewall, allow remote access connections in your computer’s policy.