Kategorien
E-Books
-
Wirtschaft
- Bitcoin
- Geschäftsfrau
- Coaching
- Controlling
- E-Business
- Ökonomie
- Finanzen
- Börse und Investitionen
- Persönliche Kompetenzen
- Computer im Büro
- Kommunikation und Verhandlungen
- Kleines Unternehmen
- Marketing
- Motivation
- Multimedia-Training
- Immobilien
- Überzeugung und NLP
- Steuern
- Sozialpolitik
- Handbȕcher
- Präsentationen
- Führung
- Public Relation
- Berichte, Analysen
- Geheimnis
- Social Media
- Verkauf
- Start-up
- Ihre Karriere
- Management
- Projektmanagement
- Personal (HR)
-
Für Kinder
-
Für Jugendliche
-
Bildung
-
Enzyklopädien, Wörterbücher
-
E-Presse
- Architektura i wnętrza
- Biznes i Ekonomia
- Haus und Garten
- E-Business
- Finanzen
- Persönliche Finanzen
- Unternehmen
- Fotografie
- Informatik
- HR und Gehaltsabrechnung
- Computer, Excel
- Buchhaltung
- Kultur und Literatur
- Wissenschaftlich und akademisch
- Umweltschutz
- meinungsbildend
- Bildung
- Steuern
- Reisen
- Psychologie
- Religion
- Landwirtschaft
- Buch- und Pressemarkt
- Transport und Spedition
- Gesundheit und Schönheit
-
Geschichte
-
Informatik
- Office-Programme
- Datenbank
- Bioinformatik
- IT Branche
- CAD/CAM
- Digital Lifestyle
- DTP
- Elektronik
- Digitale Fotografie
- Computergrafik
- Spiele
- Hacking
- Hardware
- IT w ekonomii
- Wissenschaftliche Pakete
- Schulbücher
- Computergrundlagen
- Programmierung
- Mobile-Programmierung
- Internet-Server
- Computernetzwerke
- Start-up
- Betriebssysteme
- Künstliche Inteligenz
- Technik für Kinder
- Webmaster
-
Andere
-
Fremdsprachen lernen
-
Kultur und Kunst
-
Lektüre
-
Literatur
- Anthologien
- Ballade
- Biografien und Autobiografien
- Für Erwachsene
- Drama
- Tagebücher, Memoiren, Briefe
- Epos
- Essay
- Science Fiction
- Felietonys
- Fiktion
- Humor, Satire
- Andere
- Klassisch
- Krimi
- Sachbücher
- Belletristik
- Mity i legendy
- Nobelpreisträger
- Kurzgeschichten
- Gesellschaftlich
- Okultyzm i magia
- Erzählung
- Erinnerungen
- Reisen
- Gedicht
- Poesie
- Politik
- Populärwissenschaftlich
- Roman
- Historischer Roman
- Prosa
- Abenteuer
- Journalismus
- Reportage
- Romans i literatura obyczajowa
- Sensation
- Thriller, Horror
- Interviews und Erinnerungen
-
Naturwissenschaften
-
Sozialwissenschaften
-
Schulbücher
-
Populärwissenschaft und akademisch
- Archäologie
- Bibliotekoznawstwo
- Filmwissenschaft
- Philologie
- Polnische Philologie
- Philosophie
- Finanse i bankowość
- Erdkunde
- Wirtschaft
- Handel. Weltwirtschaft
- Geschichte und Archäologie
- Kunst- und Architekturgeschichte
- Kulturwissenschaft
- Linguistik
- Literaturwissenschaft
- Logistik
- Mathematik
- Medizin
- Geisteswissenschaften
- Pädagogik
- Lehrmittel
- Populärwissenschaftlich
- Andere
- Psychologie
- Soziologie
- Theatrologie
- Teologie
- Theorien und Wirtschaftswissenschaften
- Transport i spedycja
- Sportunterricht
- Zarządzanie i marketing
-
Handbȕcher
-
Spielanleitungen
-
Professioneller und fachkundige Leitfaden
-
Jura
- Sicherheit und Gesundheit am Arbeitsplatz
- Geschichte
- Verkehrsregeln. Führerschein
- Rechtswissenschaften
- Gesundheitswesen
- Allgemeines. Wissenskompendium
- akademische Bücher
- Andere
- Bau- und Wohnungsrecht
- Zivilrecht
- Finanzrecht
- Wirtschaftsrecht
- Wirtschafts- und Handelsrecht
- Strafrecht
- Strafrecht. Kriminelle Taten. Kriminologie
- Internationales Recht
- Internationales und ausländisches Recht
- Gesundheitsschutzgesetz
- Bildungsrecht
- Steuerrecht
- Arbeits- und Sozialversicherungsrecht
- Öffentliches, Verfassungs- und Verwaltungsrecht
- Familien- und Vormundschaftsrecht
- Agrarrecht
- Sozialrecht, Arbeitsrecht
- EU-Recht
- Industrie
- Agrar- und Umweltschutz
- Wörterbücher und Enzyklopädien
- Öffentliche Auftragsvergabe
- Management
-
Führer und Reisen
- Afrika
- Alben
- Südamerika
- Mittel- und Nordamerika
- Australien, Neuseeland, Ozeanien
- Österreich
- Asien
- Balkan
- Naher Osten
- Bulgarien
- China
- Kroatien
- Tschechische Republik
- Dänemark
- Ägypten
- Estland
- Europa
- Frankreich
- Berge
- Griechenland
- Spanien
- Niederlande
- Island
- Litauen
- Lettland
- Mapy, Plany miast, Atlasy
- Miniführer
- Deutschland
- Norwegen
- Aktive Reisen
- Polen
- Portugal
- Andere
- Russland
- Rumänien
- Slowakei
- Slowenien
- Schweiz
- Schweden
- Welt
- Türkei
- Ukraine
- Ungarn
- Großbritannien
- Italien
-
Psychologie
- Lebensphilosophien
- Kompetencje psychospołeczne
- zwischenmenschliche Kommunikation
- Mindfulness
- Allgemeines
- Überzeugung und NLP
- Akademische Psychologie
- Psychologie von Seele und Geist
- Arbeitspsychologie
- Relacje i związki
- Elternschafts- und Kinderpsychologie
- Problemlösung
- Intellektuelle Entwicklung
- Geheimnis
- Sexualität
- Verführung
- Aussehen ind Image
- Lebensphilosophien
-
Religion
-
Sport, Fitness, Diäten
-
Technik und Mechanik
Hörbücher
-
Wirtschaft
- Bitcoin
- Geschäftsfrau
- Coaching
- Controlling
- E-Business
- Ökonomie
- Finanzen
- Börse und Investitionen
- Persönliche Kompetenzen
- Kommunikation und Verhandlungen
- Kleines Unternehmen
- Marketing
- Motivation
- Immobilien
- Überzeugung und NLP
- Steuern
- Handbȕcher
- Präsentationen
- Führung
- Public Relation
- Geheimnis
- Social Media
- Verkauf
- Start-up
- Ihre Karriere
- Management
- Projektmanagement
- Personal (HR)
-
Für Kinder
-
Für Jugendliche
-
Bildung
-
Enzyklopädien, Wörterbücher
-
Geschichte
-
Informatik
-
Andere
-
Fremdsprachen lernen
-
Kultur und Kunst
-
Lektüre
-
Literatur
- Anthologien
- Ballade
- Biografien und Autobiografien
- Für Erwachsene
- Drama
- Tagebücher, Memoiren, Briefe
- Epos
- Essay
- Science Fiction
- Felietonys
- Fiktion
- Humor, Satire
- Andere
- Klassisch
- Krimi
- Sachbücher
- Belletristik
- Mity i legendy
- Nobelpreisträger
- Kurzgeschichten
- Gesellschaftlich
- Okultyzm i magia
- Erzählung
- Erinnerungen
- Reisen
- Poesie
- Politik
- Populärwissenschaftlich
- Roman
- Historischer Roman
- Prosa
- Abenteuer
- Journalismus
- Reportage
- Romans i literatura obyczajowa
- Sensation
- Thriller, Horror
- Interviews und Erinnerungen
-
Naturwissenschaften
-
Sozialwissenschaften
-
Populärwissenschaft und akademisch
- Archäologie
- Philosophie
- Wirtschaft
- Handel. Weltwirtschaft
- Geschichte und Archäologie
- Kunst- und Architekturgeschichte
- Kulturwissenschaft
- Literaturwissenschaft
- Mathematik
- Medizin
- Geisteswissenschaften
- Pädagogik
- Lehrmittel
- Populärwissenschaftlich
- Andere
- Psychologie
- Soziologie
- Teologie
- Zarządzanie i marketing
-
Handbȕcher
-
Professioneller und fachkundige Leitfaden
-
Jura
-
Führer und Reisen
-
Psychologie
- Lebensphilosophien
- zwischenmenschliche Kommunikation
- Mindfulness
- Allgemeines
- Überzeugung und NLP
- Akademische Psychologie
- Psychologie von Seele und Geist
- Arbeitspsychologie
- Relacje i związki
- Elternschafts- und Kinderpsychologie
- Problemlösung
- Intellektuelle Entwicklung
- Geheimnis
- Sexualität
- Verführung
- Aussehen ind Image
- Lebensphilosophien
-
Religion
-
Sport, Fitness, Diäten
-
Technik und Mechanik
Videokurse
-
Datenbank
-
Big Data
-
Biznes, ekonomia i marketing
-
Cybersicherheit
-
Data Science
-
DevOps
-
Für Kinder
-
Elektronik
-
Grafik / Video / CAX
-
Spiele
-
Microsoft Office
-
Entwicklungstools
-
Programmierung
-
Persönliche Entwicklung
-
Computernetzwerke
-
Betriebssysteme
-
Softwaretest
-
Mobile Geräte
-
UX/UI
-
Web development
-
Management
Podcasts
- E-Books
- Informatik
- Betriebssysteme
- Microsoft Exchange 2010 PowerShell Cookbook. This brilliant Cookbook is packed with step-by-step instructions on writing scripts for Exchange 2010. You’ll be able to use the recipes straightaway and take your Microsoft Exchange management capabilities to another level
Details zum E-Book
Einloggen, wenn Sie am Inhalt des Artikels interessiert sind.
Microsoft Exchange 2010 PowerShell Cookbook. This brilliant Cookbook is packed with step-by-step instructions on writing scripts for Exchange 2010. You’ll be able to use the recipes straightaway and take your Microsoft Exchange management capabilities to another level
E-book
- Microsoft Exchange 2010 PowerShell Cookbook
- Table of Contents
- Microsoft Exchange 2010 PowerShell Cookbook
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- Support files, eBooks, discount offers and more
- Why subscribe?
- Free access for Packt account holders
- Instant updates on new Packt books
- Support files, eBooks, discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Downloading the example code
- Errata
- Piracy
- Questions
- 1. PowerShell Key Concepts
- Introduction
- Performing some basic steps
- Understanding command syntax and parameters
- How to do it...
- How it works...
- Theres more...
- See also
- Using the help system
- How to do it...
- How it works...
- There's more...
- Getting help with cmdlets and functions
- See also
- Understanding the pipeline
- How to do it...
- How it works...
- There's more...
- See also
- Working with variables and objects
- How to do it...
- How it works...
- There's more...
- Variable expansion in strings
- Strongly typed variables
- Formatting output
- How to do it...
- How it works...
- There's more
- See also
- Working with arrays and hash tables
- How to do it...
- How it works...
- There's more
- See also
- Looping through items
- How to do it...
- How it works...
- There's more
- See also
- Using flow control statements
- How to do it...
- How it works...
- There's more...
- See also
- Creating custom objects
- How to do it...
- How it works...
- There's more...
- Watch out for concurrent pipeline errors
- See also
- Creating PowerShell functions
- How to do it...
- How it works...
- There's more
- Taking it a step further
- See also
- Creating and running scripts
- How to do it...
- How it works...
- There's more
- Execution policy
- See also
- Setting up a profile
- How to do it...
- How it works...
- There's more
- See also
- Introduction
- 2. Exchange Management Shell Common Tasks
- Introduction
- Performing some basic steps
- Using command discovery through the Exchange Management Console
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Manually configuring remote PowerShell connections
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Transferring files through remote shell connections
- How to do it...
- How it works...
- There's more...
- See also
- Dealing with concurrent pipelines in remote PowerShell
- How to do it...
- How it works...
- There's more...
- See also
- Managing domains or an entire forest using recipient scope
- How to do it...
- How it works...
- There's more...
- Using explicit credentials with PowerShell cmdlets
- How to do it...
- How it works...
- There's more...
- Exporting reports to text and CSV files
- How to do it...
- How it works...
- T here's more...
- See also
- Sending SMTP e-mails through PowerShell
- How to do it...
- How it works...
- There's more...
- Sending messages with attachments
- Sending command output in the body of a message
- See also
- Scheduling scripts to run at a later time
- How to do it...
- How it works...
- There's more...
- See also
- Logging shell sessions to a transcript
- How to do it...
- How it works...
- There's more...
- See also
- Automating tasks with the scripting agent
- Getting ready
- How to do it...
- How it works...
- There's more...
- Using multiple cmdlets with the OnComplete API
- See also
- Scripting an Exchange server Installation
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Introduction
- 3. Managing Recipients
- Introduction
- Performing some basic steps
- Adding, modifying, and removing mailboxes
- How to do it...
- How it works...
- There's more...
- Setting active directory attributes
- See also
- Working with contacts
- How to do it...
- How it works...
- There's more...
- See also
- Managing distribution groups
- How to do it...
- How it works...
- There's more...
- See also
- Managing resource mailboxes
- How to do it...
- How it works...
- There's more...
- Converting mailboxes
- See also
- Creating recipients in bulk using a CSV file
- Getting ready
- How to do it...
- How it works...
- There's more...
- Taking it a step further
- See also
- Working with recipient filters
- How to do it...
- How it works...
- There's more
- Understanding variables in filters
- See also
- Adding and removing recipient e-mail addresses
- How to do it...
- How it works...
- There's more...
- See also
- Hiding recipients from address lists
- How to do it...
- How it works...
- There's more...
- See also
- Configuring recipient moderation
- How to do it...
- How it works...
- There's more...
- See also
- Configuring message delivery restrictions
- How to do it...
- How it works...
- There's more...
- See also
- Managing automatic replies and out of office settings for a user
- How to do it...
- How it works...
- There's more...
- Adding, modifying, and removing server-side inbox rules
- How to do it...
- How it works...
- There's more...
- See also
- Managing mailbox folder permissions
- How to do it...
- How it works...
- There's more...
- See also
- Importing user photos into Active Directory
- Getting ready
- How to do it...
- How it works...
- There's more
- Taking it a step further
- See also
- Introduction
- 4. Managing Mailboxes
- Introduction
- Performing some basic steps
- Reporting on the mailbox size
- How to do it...
- How it works...
- There's more...
- See also
- Working with move requests and performing mailbox moves
- How to do it...
- How it works...
- There's more...
- Removing the move requests
- Moving the archive mailboxes
- Moving the mailboxes in batches
- Moving mailboxes with corrupt items
- See also
- Importing and exporting mailboxes
- How to do it...
- How it works...
- There's more
- Importing data into mailboxes
- Taking it a step further
- See also
- Deleting messages from mailboxes
- How to do it...
- How it works...
- There's more
- Running reports before deleting data
- Deleting messages in bulk
- See also
- Managing disconnected mailboxes
- How to do it...
- How it works...
- There's more
- See also
- Generating mailbox folder reports
- How to do it...
- How it works...
- There's more
- Taking it a step further
- See also
- Reporting on mailbox creation time
- How to do it...
- How it works...
- There's more...
- See also
- Checking mailbox logon statistics
- How to do it...
- How it works...
- There's more...
- See also
- Setting storage quotas for mailboxes
- How to do it...
- How it works...
- There's more...
- Finding inactive mailboxes
- How to do it...
- How it works...
- There's more...
- Detecting and fixing corrupt mailboxes
- How to do it...
- How it works...
- There's more...
- See also
- Restoring deleted items from mailboxes
- How to do it...
- How it works...
- There's more...
- See also
- 5. Distribution Groups and Address Lists
- Introduction
- Reporting on distribution group membership
- How to do it...
- How it works...
- There's more...
- See also
- Adding members to a distribution group from an external file
- How to do it...
- How it works...
- There's more...
- See also
- Previewing dynamic distribution group membership
- How to do it...
- How it works...
- There's more...
- See also
- Excluding hidden recipients from a dynamic distribution group
- How to do it...
- How it works...
- There's more...
- See also
- Converting and upgrading distribution groups
- How to do it...
- How it works...
- There's more...
- See also
- Allowing managers to modify group membership
- How to do it...
- How it works...
- There's more...
- See also
- Removing disabled user accounts from distribution groups
- How to do it...
- How it works...
- There's more
- See also
- Working with distribution group naming policies
- How to do it...
- How it works...
- There's more...
- See also
- Working with distribution group membership approval
- How to do it...
- How it works...
- There's more...
- See also
- Creating address lists
- How to do it...
- How it works...
- There's more...
- See also
- Exporting address list membership to a CSV file
- How to do it...
- How it works...
- There's more...
- See also
- Configuring hierarchical address books
- How to do it...
- How it works...
- There's more...
- See also
- 6. Mailbox and Public Folder Databases
- Introduction
- Performing some basic steps
- Managing the mailbox and the public folder databases
- How to do it...
- How it works...
- There's more
- Understanding automatic mailbox distribution
- See also
- Moving databases and logs to another location
- How to do it...
- How it works...
- There's more
- Manually moving databases
- Taking it a step further
- See also
- Configuring the mailbox and public folder database limits
- How to do it...
- How it works...
- There's more
- Taking it a step further
- See also
- Reporting on mailbox database size
- How to do it...
- How it works...
- There's more...
- See also
- Finding the total number of mailboxes in a database
- How to do it...
- How it works...
- There's more...
- See also
- Determining the average mailbox size per database
- How to do it...
- How it works...
- There's more...
- See also
- Reporting on database backup status
- How to do it...
- How it works...
- There's more...
- See also
- Restoring data from a recovery database
- How to do it...
- How it works...
- There's more
- Understanding target mailbox identity
- Learning about other useful parameters
- Understanding mailbox restore request cmdlets
- Taking it a step further
- See also
- Configuring public folder replication
- How to do it...
- How it works...
- There's more...
- Managing user access to public folders
- How to do it...
- How it works...
- There's more...
- Reporting on public folder statistics
- How to do it...
- How it works...
- There's more...
- See also
- Introduction
- 7. Managing Client Access
- Introduction
- Performing some basic steps
- Creating an RPC Client Access array
- How to do it...
- How it works...
- There's more...
- See also
- Configuring the CAS server used by RPC clients
- How to do it...
- How it works...
- There's more...
- See also
- Configuring RPC encryption requirements
- How to do it.
- How it works...
- There's more...
- See also
- Managing ActiveSync, OWA, POP3, and IMAP4 mailbox settings
- How to do it...
- How it works...
- There's more...
- See also
- Setting internal and external CAS URLs
- How to do it...
- How it works...
- There's more
- Command syntax for the remaining virtual directories
- See also
- Managing Outlook Anywhere settings
- How to do it...
- How it works...
- There's more...
- See also
- Blocking Outlook clients from connecting to Exchange
- How to do it...
- How it works...
- There's more
- Reporting on active OWA and RPC connections
- How to do it...
- How it works...
- There's more...
- See also
- Controlling ActiveSync device access
- How to do it...
- How it works...
- There's more...
- See also
- Reporting on ActiveSync devices
- How to do it...
- How it works...
- There's more...
- See also
- Introduction
- 8. Managing Transport Servers
- Introduction
- Performing some basic steps
- Managing connectors
- How to do it...
- How it works...
- There's more
- See also
- Configuring transport limits
- How to do it...
- How it works...
- There's more
- See also
- Allowing application servers to relay mail
- How to do it...
- How it works...
- There's more
- See also
- Managing transport rules
- How to do it...
- How it works...
- There's more
- Modifying transport rules
- Enabling, disabling, and removing transport rules
- Understanding regular expressions in transport rules
- Working with custom DSN messages
- How to do it...
- How it works...
- There's more
- Managing connectivity and protocol logs
- How to do it...
- How it works...
- There's more
- Parsing logfiles
- Message tracking logs
- How to do it...
- How it works...
- There's more
- Taking it a step further
- See also
- Working with messages in transport queues
- How to do it...
- How it works...
- There's more
- Searching anti-spam agent logs
- How to do it...
- How it works...
- There's more
- See also
- Implementing a header firewall
- How to do it...
- How it works...
- There's more...
- Introduction
- 9. High Availability
- Introduction
- Performing some basic steps
- Building a Windows NLB cluster for CAS servers
- Getting ready
- How to do it...
- How it works...
- There's more
- Taking it a step further
- See also
- Creating a Database Availability Group
- How to do it...
- How it works...
- There's more
- See also
- Adding mailbox servers to a Database Availability Group
- How to do it...
- How it works...
- There's more...
- See also
- Configuring Database Availability Group network settings
- How to do it...
- How it works...
- There's more
- Renaming and removing DAG networks
- Adding mailbox copies to a Database Availability Group
- How to do it...
- How it works...
- There's more
- See also
- Activating mailbox database copies
- How to do it...
- How it works...
- There's more
- See also
- Working with lagged database copies
- How to do it...
- How it works...
- There's more...
- Reseeding a database copy
- How to do it...
- How it works...
- There's more...
- See also
- Performing maintenance on Database Availability Group members
- How to do it...
- How it works...
- There's more...
- Reporting on database status, redundancy, and replication
- How to do it...
- How it works...
- There's more
- Understanding switchover and failover metrics
- Understanding Replication Metrics
- See also
- Introduction
- 10. Exchange Security
- Introduction
- Performing some basic steps
- Granting users full access permissions to mailboxes
- How to do it...
- How it works...
- There's more...
- See also
- Finding users with full access to mailboxes
- How to do it...
- How it works...
- There's more...
- Sending e-mail messages as another user or group
- How to do it...
- How it works...
- There's more...
- Working with Role Based Access Control (RBAC)
- How to do it...
- How it works...
- There's more
- RBAC is for end-users too
- See also
- Creating a custom RBAC role for administrators
- How to do it...
- How it works...
- There's more...
- See also
- Creating a custom RBAC role for end users
- How to do it...
- How it works...
- There's more...
- See also
- Troubleshooting Role Based Access Control
- How to do it...
- How it works...
- There's more...
- See also
- Generating a certificate request
- How to do it...
- How it works...
- There's more...
- See also
- Installing certificates and enabling services
- How to do it...
- How it works...
- There's more...
- See also
- Importing certificates on multiple exchange servers
- How to do it...
- How it works...
- There's more...
- See also
- Introduction
- 11. Compliance and Audit Logging
- Introduction
- Performing some basic steps
- Managing archive mailboxes
- How to do it...
- How it works...
- There's more...
- See also
- Configuring archive mailbox quotas
- How to do it...
- How it works...
- There's more...
- See also
- Creating retention tags and policies
- How to do it.
- How it works
- There's more
- Understanding default tags
- See also
- Applying retention policies to mailboxes
- How to do it...
- How it works...
- There's more...
- See also
- Placing mailboxes on retention hold
- How to do it...
- How it works...
- There's more...
- See also
- Performing a discovery search
- How to do it...
- How it works...
- There's more...
- See also
- Placing mailboxes on litigation hold
- How to do it...
- How it works...
- There's more...
- See also
- Enabling mailbox audit logging
- How to do it...
- How it works...
- There's more...
- See also
- Generating mailbox audit log reports
- How to do it...
- How it works...
- There's more...
- See also
- Configuring Administrator Audit Logging
- How to do it...
- How it works...
- There's more...
- See also
- Searching administrator audit logs
- How to do it...
- How it works...
- There's more...
- See also
- Introduction
- 12. Server Monitoring and Troubleshooting
- Introduction
- Performing some basic steps
- Managing and monitoring services
- How to do it...
- How it works...
- There's more...
- See also
- Verifying server connectivity
- How to do it...
- How it works...
- Working with the event logs
- How to do it...
- How it works...
- There's more...
- Reporting on disk usage
- How to do it...
- How it works...
- There's more...
- See also
- Checking CPU utilization
- How to do it...
- How it works...
- There's more...
- See also
- Monitoring memory utilization
- How to do it...
- How it works...
- There's more...
- See also
- Reporting on Exchange Server uptime
- How to do it...
- How it works...
- There's more...
- See also
- Troubleshooting the Mailbox role
- How to do it...
- How it works...
- See also
- Troubleshooting the Client Access Server role
- How to do it...
- How it works...
- There's more...
- See also
- Troubleshooting Transport servers
- How to do it...
- How it works...
- See also
- Verifying certificate health
- How to do it...
- How it works...
- There's more...
- See also
- Introduction
- 13. Scripting with the Exchange Web Services Managed API
- Introduction
- Performing some basic steps
- Getting connected to EWS
- How to do it...
- How it works...
- There's more...
- Certificates matter
- Sending e-mail messages with EWS
- How to do it...
- How it works...
- There's more...
- See also
- Working with impersonation
- Getting ready
- How to do it...
- How it works...
- There's more...
- Searching mailboxes
- How to do it...
- How it works...
- There's more...
- See also
- Retrieving the headers of an e-mail message
- How to do it...
- How it works...
- There's more...
- See also
- Deleting e-mail items from a mailbox
- How to do it...
- How it works...
- There's more...
- See also
- Creating calendar items
- How to do it...
- How it works...
- There's more...
- See also
- Exporting attachments from a mailbox
- How to do it...
- How it works...
- There's more...
- See also
- A. Exchange Management Shell reference
- Commonly-used shell variables
- Commonly-used type accelerators
- Scripts available in the $ExBin directory
- Properties that can be used with the Filter parameter
- Properties that can be used with the RecipientFilterparameter
- B. Advanced Query Syntax
- Using the word phrase search
- Examples
- Using a date range search
- Examples
- Using the message type search
- Examples
- Using the logical connector search
- Examples
- Using the word phrase search
- Index
- Titel: Microsoft Exchange 2010 PowerShell Cookbook. This brilliant Cookbook is packed with step-by-step instructions on writing scripts for Exchange 2010. You’ll be able to use the recipes straightaway and take your Microsoft Exchange management capabilities to another level
- Autor: Mike Pfeiffer, MIKE PFEIFFER
- Originaler Titel: Microsoft Exchange 2010 PowerShell Cookbook. This brilliant Cookbook is packed with step-by-step instructions on writing scripts for Exchange 2010. You’ll be able to use the recipes straightaway and take your Microsoft Exchange management capabilities to another level.
- ISBN: 9781849682473, 9781849682473
- Veröffentlichungsdatum: 2011-07-25
- Format: E-book
- Artikelkennung: e_3cee
- Verleger: Packt Publishing