Microsoft Exchange 2010 PowerShell Cookbook. This brilliant Cookbook is packed with step-by-step instructions on writing scripts for Exchange 2010. You’ll be able to use the recipes straightaway and take your Microsoft Exchange management capabilit - Helion
ebook
Autor: Mike Pfeiffer, MIKE PFEIFFERTytuÅ‚ oryginaÅ‚u: Microsoft Exchange 2010 PowerShell Cookbook. This brilliant Cookbook is packed with step-by-step instructions on writing scripts for Exchange 2010. You’ll be able to use the recipes straightaway and take your Microsoft Exchange management capabilit
ISBN: 9781849682473
stron: 480, Format: ebook
Data wydania: 2011-07-25
Księgarnia: Helion
Cena książki: 170,10 zł (poprzednio: 189,00 zł)
Oszczędzasz: 10% (-18,90 zł)
Osoby które kupowaÅ‚y "Microsoft Exchange 2010 PowerShell Cookbook. This brilliant Cookbook is packed with step-by-step instructions on writing scripts for Exchange 2010. You’ll be able to use the recipes straightaway and take your Microsoft Exchange management capabilit", wybieraÅ‚y także:
- Windows Media Center. Domowe centrum rozrywki 66,67 zł, (8,00 zł -88%)
- Ruby on Rails. Ćwiczenia 18,75 zł, (3,00 zł -84%)
- Przywództwo w świecie VUCA. Jak być skutecznym liderem w niepewnym środowisku 58,64 zł, (12,90 zł -78%)
- Scrum. O zwinnym zarządzaniu projektami. Wydanie II rozszerzone 58,64 zł, (12,90 zł -78%)
- Od hierarchii do turkusu, czyli jak zarządzać w XXI wieku 58,64 zł, (12,90 zł -78%)
Spis treści
Microsoft Exchange 2010 PowerShell Cookbook. This brilliant Cookbook is packed with step-by-step instructions on writing scripts for Exchange 2010. You’ll be able to use the recipes straightaway and take your Microsoft Exchange management capabilities to another level eBook -- spis treÅ›ci
- Microsoft Exchange 2010 PowerShell Cookbook
- Table of Contents
- Microsoft Exchange 2010 PowerShell Cookbook
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- Support files, eBooks, discount offers and more
- Why subscribe?
- Free access for Packt account holders
- Instant updates on new Packt books
- Support files, eBooks, discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Downloading the example code
- Errata
- Piracy
- Questions
- 1. PowerShell Key Concepts
- Introduction
- Performing some basic steps
- Understanding command syntax and parameters
- How to do it...
- How it works...
- Theres more...
- See also
- Using the help system
- How to do it...
- How it works...
- There's more...
- Getting help with cmdlets and functions
- See also
- Understanding the pipeline
- How to do it...
- How it works...
- There's more...
- See also
- Working with variables and objects
- How to do it...
- How it works...
- There's more...
- Variable expansion in strings
- Strongly typed variables
- Formatting output
- How to do it...
- How it works...
- There's more
- See also
- Working with arrays and hash tables
- How to do it...
- How it works...
- There's more
- See also
- Looping through items
- How to do it...
- How it works...
- There's more
- See also
- Using flow control statements
- How to do it...
- How it works...
- There's more...
- See also
- Creating custom objects
- How to do it...
- How it works...
- There's more...
- Watch out for concurrent pipeline errors
- See also
- Creating PowerShell functions
- How to do it...
- How it works...
- There's more
- Taking it a step further
- See also
- Creating and running scripts
- How to do it...
- How it works...
- There's more
- Execution policy
- See also
- Setting up a profile
- How to do it...
- How it works...
- There's more
- See also
- Introduction
- 2. Exchange Management Shell Common Tasks
- Introduction
- Performing some basic steps
- Using command discovery through the Exchange Management Console
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Manually configuring remote PowerShell connections
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Transferring files through remote shell connections
- How to do it...
- How it works...
- There's more...
- See also
- Dealing with concurrent pipelines in remote PowerShell
- How to do it...
- How it works...
- There's more...
- See also
- Managing domains or an entire forest using recipient scope
- How to do it...
- How it works...
- There's more...
- Using explicit credentials with PowerShell cmdlets
- How to do it...
- How it works...
- There's more...
- Exporting reports to text and CSV files
- How to do it...
- How it works...
- T here's more...
- See also
- Sending SMTP e-mails through PowerShell
- How to do it...
- How it works...
- There's more...
- Sending messages with attachments
- Sending command output in the body of a message
- See also
- Scheduling scripts to run at a later time
- How to do it...
- How it works...
- There's more...
- See also
- Logging shell sessions to a transcript
- How to do it...
- How it works...
- There's more...
- See also
- Automating tasks with the scripting agent
- Getting ready
- How to do it...
- How it works...
- There's more...
- Using multiple cmdlets with the OnComplete API
- See also
- Scripting an Exchange server Installation
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Introduction
- 3. Managing Recipients
- Introduction
- Performing some basic steps
- Adding, modifying, and removing mailboxes
- How to do it...
- How it works...
- There's more...
- Setting active directory attributes
- See also
- Working with contacts
- How to do it...
- How it works...
- There's more...
- See also
- Managing distribution groups
- How to do it...
- How it works...
- There's more...
- See also
- Managing resource mailboxes
- How to do it...
- How it works...
- There's more...
- Converting mailboxes
- See also
- Creating recipients in bulk using a CSV file
- Getting ready
- How to do it...
- How it works...
- There's more...
- Taking it a step further
- See also
- Working with recipient filters
- How to do it...
- How it works...
- There's more
- Understanding variables in filters
- See also
- Adding and removing recipient e-mail addresses
- How to do it...
- How it works...
- There's more...
- See also
- Hiding recipients from address lists
- How to do it...
- How it works...
- There's more...
- See also
- Configuring recipient moderation
- How to do it...
- How it works...
- There's more...
- See also
- Configuring message delivery restrictions
- How to do it...
- How it works...
- There's more...
- See also
- Managing automatic replies and out of office settings for a user
- How to do it...
- How it works...
- There's more...
- Adding, modifying, and removing server-side inbox rules
- How to do it...
- How it works...
- There's more...
- See also
- Managing mailbox folder permissions
- How to do it...
- How it works...
- There's more...
- See also
- Importing user photos into Active Directory
- Getting ready
- How to do it...
- How it works...
- There's more
- Taking it a step further
- See also
- Introduction
- 4. Managing Mailboxes
- Introduction
- Performing some basic steps
- Reporting on the mailbox size
- How to do it...
- How it works...
- There's more...
- See also
- Working with move requests and performing mailbox moves
- How to do it...
- How it works...
- There's more...
- Removing the move requests
- Moving the archive mailboxes
- Moving the mailboxes in batches
- Moving mailboxes with corrupt items
- See also
- Importing and exporting mailboxes
- How to do it...
- How it works...
- There's more
- Importing data into mailboxes
- Taking it a step further
- See also
- Deleting messages from mailboxes
- How to do it...
- How it works...
- There's more
- Running reports before deleting data
- Deleting messages in bulk
- See also
- Managing disconnected mailboxes
- How to do it...
- How it works...
- There's more
- See also
- Generating mailbox folder reports
- How to do it...
- How it works...
- There's more
- Taking it a step further
- See also
- Reporting on mailbox creation time
- How to do it...
- How it works...
- There's more...
- See also
- Checking mailbox logon statistics
- How to do it...
- How it works...
- There's more...
- See also
- Setting storage quotas for mailboxes
- How to do it...
- How it works...
- There's more...
- Finding inactive mailboxes
- How to do it...
- How it works...
- There's more...
- Detecting and fixing corrupt mailboxes
- How to do it...
- How it works...
- There's more...
- See also
- Restoring deleted items from mailboxes
- How to do it...
- How it works...
- There's more...
- See also
- 5. Distribution Groups and Address Lists
- Introduction
- Reporting on distribution group membership
- How to do it...
- How it works...
- There's more...
- See also
- Adding members to a distribution group from an external file
- How to do it...
- How it works...
- There's more...
- See also
- Previewing dynamic distribution group membership
- How to do it...
- How it works...
- There's more...
- See also
- Excluding hidden recipients from a dynamic distribution group
- How to do it...
- How it works...
- There's more...
- See also
- Converting and upgrading distribution groups
- How to do it...
- How it works...
- There's more...
- See also
- Allowing managers to modify group membership
- How to do it...
- How it works...
- There's more...
- See also
- Removing disabled user accounts from distribution groups
- How to do it...
- How it works...
- There's more
- See also
- Working with distribution group naming policies
- How to do it...
- How it works...
- There's more...
- See also
- Working with distribution group membership approval
- How to do it...
- How it works...
- There's more...
- See also
- Creating address lists
- How to do it...
- How it works...
- There's more...
- See also
- Exporting address list membership to a CSV file
- How to do it...
- How it works...
- There's more...
- See also
- Configuring hierarchical address books
- How to do it...
- How it works...
- There's more...
- See also
- 6. Mailbox and Public Folder Databases
- Introduction
- Performing some basic steps
- Managing the mailbox and the public folder databases
- How to do it...
- How it works...
- There's more
- Understanding automatic mailbox distribution
- See also
- Moving databases and logs to another location
- How to do it...
- How it works...
- There's more
- Manually moving databases
- Taking it a step further
- See also
- Configuring the mailbox and public folder database limits
- How to do it...
- How it works...
- There's more
- Taking it a step further
- See also
- Reporting on mailbox database size
- How to do it...
- How it works...
- There's more...
- See also
- Finding the total number of mailboxes in a database
- How to do it...
- How it works...
- There's more...
- See also
- Determining the average mailbox size per database
- How to do it...
- How it works...
- There's more...
- See also
- Reporting on database backup status
- How to do it...
- How it works...
- There's more...
- See also
- Restoring data from a recovery database
- How to do it...
- How it works...
- There's more
- Understanding target mailbox identity
- Learning about other useful parameters
- Understanding mailbox restore request cmdlets
- Taking it a step further
- See also
- Configuring public folder replication
- How to do it...
- How it works...
- There's more...
- Managing user access to public folders
- How to do it...
- How it works...
- There's more...
- Reporting on public folder statistics
- How to do it...
- How it works...
- There's more...
- See also
- Introduction
- 7. Managing Client Access
- Introduction
- Performing some basic steps
- Creating an RPC Client Access array
- How to do it...
- How it works...
- There's more...
- See also
- Configuring the CAS server used by RPC clients
- How to do it...
- How it works...
- There's more...
- See also
- Configuring RPC encryption requirements
- How to do it.
- How it works...
- There's more...
- See also
- Managing ActiveSync, OWA, POP3, and IMAP4 mailbox settings
- How to do it...
- How it works...
- There's more...
- See also
- Setting internal and external CAS URLs
- How to do it...
- How it works...
- There's more
- Command syntax for the remaining virtual directories
- See also
- Managing Outlook Anywhere settings
- How to do it...
- How it works...
- There's more...
- See also
- Blocking Outlook clients from connecting to Exchange
- How to do it...
- How it works...
- There's more
- Reporting on active OWA and RPC connections
- How to do it...
- How it works...
- There's more...
- See also
- Controlling ActiveSync device access
- How to do it...
- How it works...
- There's more...
- See also
- Reporting on ActiveSync devices
- How to do it...
- How it works...
- There's more...
- See also
- Introduction
- 8. Managing Transport Servers
- Introduction
- Performing some basic steps
- Managing connectors
- How to do it...
- How it works...
- There's more
- See also
- Configuring transport limits
- How to do it...
- How it works...
- There's more
- See also
- Allowing application servers to relay mail
- How to do it...
- How it works...
- There's more
- See also
- Managing transport rules
- How to do it...
- How it works...
- There's more
- Modifying transport rules
- Enabling, disabling, and removing transport rules
- Understanding regular expressions in transport rules
- Working with custom DSN messages
- How to do it...
- How it works...
- There's more
- Managing connectivity and protocol logs
- How to do it...
- How it works...
- There's more
- Parsing logfiles
- Message tracking logs
- How to do it...
- How it works...
- There's more
- Taking it a step further
- See also
- Working with messages in transport queues
- How to do it...
- How it works...
- There's more
- Searching anti-spam agent logs
- How to do it...
- How it works...
- There's more
- See also
- Implementing a header firewall
- How to do it...
- How it works...
- There's more...
- Introduction
- 9. High Availability
- Introduction
- Performing some basic steps
- Building a Windows NLB cluster for CAS servers
- Getting ready
- How to do it...
- How it works...
- There's more
- Taking it a step further
- See also
- Creating a Database Availability Group
- How to do it...
- How it works...
- There's more
- See also
- Adding mailbox servers to a Database Availability Group
- How to do it...
- How it works...
- There's more...
- See also
- Configuring Database Availability Group network settings
- How to do it...
- How it works...
- There's more
- Renaming and removing DAG networks
- Adding mailbox copies to a Database Availability Group
- How to do it...
- How it works...
- There's more
- See also
- Activating mailbox database copies
- How to do it...
- How it works...
- There's more
- See also
- Working with lagged database copies
- How to do it...
- How it works...
- There's more...
- Reseeding a database copy
- How to do it...
- How it works...
- There's more...
- See also
- Performing maintenance on Database Availability Group members
- How to do it...
- How it works...
- There's more...
- Reporting on database status, redundancy, and replication
- How to do it...
- How it works...
- There's more
- Understanding switchover and failover metrics
- Understanding Replication Metrics
- See also
- Introduction
- 10. Exchange Security
- Introduction
- Performing some basic steps
- Granting users full access permissions to mailboxes
- How to do it...
- How it works...
- There's more...
- See also
- Finding users with full access to mailboxes
- How to do it...
- How it works...
- There's more...
- Sending e-mail messages as another user or group
- How to do it...
- How it works...
- There's more...
- Working with Role Based Access Control (RBAC)
- How to do it...
- How it works...
- There's more
- RBAC is for end-users too
- See also
- Creating a custom RBAC role for administrators
- How to do it...
- How it works...
- There's more...
- See also
- Creating a custom RBAC role for end users
- How to do it...
- How it works...
- There's more...
- See also
- Troubleshooting Role Based Access Control
- How to do it...
- How it works...
- There's more...
- See also
- Generating a certificate request
- How to do it...
- How it works...
- There's more...
- See also
- Installing certificates and enabling services
- How to do it...
- How it works...
- There's more...
- See also
- Importing certificates on multiple exchange servers
- How to do it...
- How it works...
- There's more...
- See also
- Introduction
- 11. Compliance and Audit Logging
- Introduction
- Performing some basic steps
- Managing archive mailboxes
- How to do it...
- How it works...
- There's more...
- See also
- Configuring archive mailbox quotas
- How to do it...
- How it works...
- There's more...
- See also
- Creating retention tags and policies
- How to do it.
- How it works
- There's more
- Understanding default tags
- See also
- Applying retention policies to mailboxes
- How to do it...
- How it works...
- There's more...
- See also
- Placing mailboxes on retention hold
- How to do it...
- How it works...
- There's more...
- See also
- Performing a discovery search
- How to do it...
- How it works...
- There's more...
- See also
- Placing mailboxes on litigation hold
- How to do it...
- How it works...
- There's more...
- See also
- Enabling mailbox audit logging
- How to do it...
- How it works...
- There's more...
- See also
- Generating mailbox audit log reports
- How to do it...
- How it works...
- There's more...
- See also
- Configuring Administrator Audit Logging
- How to do it...
- How it works...
- There's more...
- See also
- Searching administrator audit logs
- How to do it...
- How it works...
- There's more...
- See also
- Introduction
- 12. Server Monitoring and Troubleshooting
- Introduction
- Performing some basic steps
- Managing and monitoring services
- How to do it...
- How it works...
- There's more...
- See also
- Verifying server connectivity
- How to do it...
- How it works...
- Working with the event logs
- How to do it...
- How it works...
- There's more...
- Reporting on disk usage
- How to do it...
- How it works...
- There's more...
- See also
- Checking CPU utilization
- How to do it...
- How it works...
- There's more...
- See also
- Monitoring memory utilization
- How to do it...
- How it works...
- There's more...
- See also
- Reporting on Exchange Server uptime
- How to do it...
- How it works...
- There's more...
- See also
- Troubleshooting the Mailbox role
- How to do it...
- How it works...
- See also
- Troubleshooting the Client Access Server role
- How to do it...
- How it works...
- There's more...
- See also
- Troubleshooting Transport servers
- How to do it...
- How it works...
- See also
- Verifying certificate health
- How to do it...
- How it works...
- There's more...
- See also
- Introduction
- 13. Scripting with the Exchange Web Services Managed API
- Introduction
- Performing some basic steps
- Getting connected to EWS
- How to do it...
- How it works...
- There's more...
- Certificates matter
- Sending e-mail messages with EWS
- How to do it...
- How it works...
- There's more...
- See also
- Working with impersonation
- Getting ready
- How to do it...
- How it works...
- There's more...
- Searching mailboxes
- How to do it...
- How it works...
- There's more...
- See also
- Retrieving the headers of an e-mail message
- How to do it...
- How it works...
- There's more...
- See also
- Deleting e-mail items from a mailbox
- How to do it...
- How it works...
- There's more...
- See also
- Creating calendar items
- How to do it...
- How it works...
- There's more...
- See also
- Exporting attachments from a mailbox
- How to do it...
- How it works...
- There's more...
- See also
- A. Exchange Management Shell reference
- Commonly-used shell variables
- Commonly-used type accelerators
- Scripts available in the $ExBin directory
- Properties that can be used with the Filter parameter
- Properties that can be used with the RecipientFilterparameter
- B. Advanced Query Syntax
- Using the word phrase search
- Examples
- Using a date range search
- Examples
- Using the message type search
- Examples
- Using the logical connector search
- Examples
- Using the word phrase search
- Index