Categories
Ebooks
-
Business and economy
- Bitcoin
- Businesswoman
- Coaching
- Controlling
- E-business
- Economy
- Finances
- Stocks and investments
- Personal competence
- Computer in the office
- Communication and negotiation
- Small company
- Marketing
- Motivation
- Multimedia trainings
- Real estate
- Persuasion and NLP
- Taxes
- Social policy
- Guides
- Presentations
- Leadership
- Public Relation
- Reports, analyses
- Secret
- Social Media
- Sales
- Start-up
- Your career
- Management
- Project management
- Human Resources
-
For children
-
For youth
-
Education
-
Encyclopedias, dictionaries
-
E-press
- Architektura i wnętrza
- Biznes i Ekonomia
- Home and garden
- E-business
- Finances
- Personal finance
- Business
- Photography
- Computer science
- HR & Payroll
- Computers, Excel
- Accounts
- Culture and literature
- Scientific and academic
- Environmental protection
- Opinion-forming
- Education
- Taxes
- Travelling
- Psychology
- Religion
- Agriculture
- Book and press market
- Transport and Spedition
- Healthand beauty
-
History
-
Computer science
- Office applications
- Data bases
- Bioinformatics
- IT business
- CAD/CAM
- Digital Lifestyle
- DTP
- Electronics
- Digital photography
- Computer graphics
- Games
- Hacking
- Hardware
- IT w ekonomii
- Scientific software package
- School textbooks
- Computer basics
- Programming
- Mobile programming
- Internet servers
- Computer networks
- Start-up
- Operational systems
- Artificial intelligence
- Technology for children
- Webmastering
-
Other
-
Foreign languages
-
Culture and art
-
School reading books
-
Literature
- Antology
- Ballade
- Biographies and autobiographies
- For adults
- Dramas
- Diaries, memoirs, letters
- Epic, epopee
- Essay
- Fantasy and science fiction
- Feuilletons
- Work of fiction
- Humour and satire
- Other
- Classical
- Crime fiction
- Non-fiction
- Fiction
- Mity i legendy
- Nobelists
- Novellas
- Moral
- Okultyzm i magia
- Short stories
- Memoirs
- Travelling
- Narrative poetry
- Poetry
- Politics
- Popular science
- Novel
- Historical novel
- Prose
- Adventure
- Journalism, publicism
- Reportage novels
- Romans i literatura obyczajowa
- Sensational
- Thriller, Horror
- Interviews and memoirs
-
Natural sciences
-
Social sciences
-
School textbooks
-
Popular science and academic
- Archeology
- Bibliotekoznawstwo
- Cinema studies
- Philology
- Polish philology
- Philosophy
- Finanse i bankowość
- Geography
- Economy
- Trade. World economy
- History and archeology
- History of art and architecture
- Cultural studies
- Linguistics
- Literary studies
- Logistics
- Maths
- Medicine
- Humanities
- Pedagogy
- Educational aids
- Popular science
- Other
- Psychology
- Sociology
- Theatre studies
- Theology
- Economic theories and teachings
- Transport i spedycja
- Physical education
- Zarządzanie i marketing
-
Guides
-
Game guides
-
Professional and specialist guides
-
Law
- Health and Safety
- History
- Road Code. Driving license
- Law studies
- Healthcare
- General. Compendium of knowledge
- Academic textbooks
- Other
- Construction and local law
- Civil law
- Financial law
- Economic law
- Economic and trade law
- Criminal law
- Criminal law. Criminal offenses. Criminology
- International law
- International law
- Health care law
- Educational law
- Tax law
- Labor and social security law
- Public, constitutional and administrative law
- Family and Guardianship Code
- agricultural law
- Social law, labour law
- European Union law
- Industry
- Agricultural and environmental
- Dictionaries and encyclopedia
- Public procurement
- Management
-
Tourist guides and travel
- Africa
- Albums
- Southern America
- North and Central America
- Australia, New Zealand, Oceania
- Austria
- Asia
- Balkans
- Middle East
- Bulgary
- China
- Croatia
- The Czech Republic
- Denmark
- Egipt
- Estonia
- Europe
- France
- Mountains
- Greece
- Spain
- Holand
- Iceland
- Lithuania
- Latvia
- Mapy, Plany miast, Atlasy
- Mini travel guides
- Germany
- Norway
- Active travelling
- Poland
- Portugal
- Other
- Russia
- Romania
- Slovakia
- Slovenia
- Switzerland
- Sweden
- World
- Turkey
- Ukraine
- Hungary
- Great Britain
- Italy
-
Psychology
- Philosophy of life
- Kompetencje psychospołeczne
- Interpersonal communication
- Mindfulness
- General
- Persuasion and NLP
- Academic psychology
- Psychology of soul and mind
- Work psychology
- Relacje i związki
- Parenting and children psychology
- Problem solving
- Intellectual growth
- Secret
- Sexapeal
- Seduction
- Appearance and image
- Philosophy of life
-
Religion
-
Sport, fitness, diets
-
Technology and mechanics
Audiobooks
-
Business and economy
- Bitcoin
- Businesswoman
- Coaching
- Controlling
- E-business
- Economy
- Finances
- Stocks and investments
- Personal competence
- Communication and negotiation
- Small company
- Marketing
- Motivation
- Real estate
- Persuasion and NLP
- Taxes
- Guides
- Presentations
- Leadership
- Public Relation
- Secret
- Social Media
- Sales
- Start-up
- Your career
- Management
- Project management
- Human Resources
-
For children
-
For youth
-
Education
-
Encyclopedias, dictionaries
-
History
-
Computer science
-
Other
-
Foreign languages
-
Culture and art
-
School reading books
-
Literature
- Antology
- Ballade
- Biographies and autobiographies
- For adults
- Dramas
- Diaries, memoirs, letters
- Epic, epopee
- Essay
- Fantasy and science fiction
- Feuilletons
- Work of fiction
- Humour and satire
- Other
- Classical
- Crime fiction
- Non-fiction
- Fiction
- Mity i legendy
- Nobelists
- Novellas
- Moral
- Okultyzm i magia
- Short stories
- Memoirs
- Travelling
- Poetry
- Politics
- Popular science
- Novel
- Historical novel
- Prose
- Adventure
- Journalism, publicism
- Reportage novels
- Romans i literatura obyczajowa
- Sensational
- Thriller, Horror
- Interviews and memoirs
-
Natural sciences
-
Social sciences
-
Popular science and academic
-
Guides
-
Professional and specialist guides
-
Law
-
Tourist guides and travel
-
Psychology
- Philosophy of life
- Interpersonal communication
- Mindfulness
- General
- Persuasion and NLP
- Academic psychology
- Psychology of soul and mind
- Work psychology
- Relacje i związki
- Parenting and children psychology
- Problem solving
- Intellectual growth
- Secret
- Sexapeal
- Seduction
- Appearance and image
- Philosophy of life
-
Religion
-
Sport, fitness, diets
-
Technology and mechanics
Videocourses
-
Data bases
-
Big Data
-
Biznes, ekonomia i marketing
-
Cybersecurity
-
Data Science
-
DevOps
-
For children
-
Electronics
-
Graphics/Video/CAX
-
Games
-
Microsoft Office
-
Development tools
-
Programming
-
Personal growth
-
Computer networks
-
Operational systems
-
Software testing
-
Mobile devices
-
UX/UI
-
Web development
-
Management
Podcasts
- Ebooks
- Computer science
- Operational systems
- Microsoft Exchange 2010 PowerShell Cookbook. This brilliant Cookbook is packed with step-by-step instructions on writing scripts for Exchange 2010. You’ll be able to use the recipes straightaway and take your Microsoft Exchange management capabilities to another level
E-book details
Log in, If you're interested in the contents of the item.
Microsoft Exchange 2010 PowerShell Cookbook. This brilliant Cookbook is packed with step-by-step instructions on writing scripts for Exchange 2010. You’ll be able to use the recipes straightaway and take your Microsoft Exchange management capabilities to another level
Ebook
- Microsoft Exchange 2010 PowerShell Cookbook
- Table of Contents
- Microsoft Exchange 2010 PowerShell Cookbook
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- Support files, eBooks, discount offers and more
- Why subscribe?
- Free access for Packt account holders
- Instant updates on new Packt books
- Support files, eBooks, discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Downloading the example code
- Errata
- Piracy
- Questions
- 1. PowerShell Key Concepts
- Introduction
- Performing some basic steps
- Understanding command syntax and parameters
- How to do it...
- How it works...
- Theres more...
- See also
- Using the help system
- How to do it...
- How it works...
- There's more...
- Getting help with cmdlets and functions
- See also
- Understanding the pipeline
- How to do it...
- How it works...
- There's more...
- See also
- Working with variables and objects
- How to do it...
- How it works...
- There's more...
- Variable expansion in strings
- Strongly typed variables
- Formatting output
- How to do it...
- How it works...
- There's more
- See also
- Working with arrays and hash tables
- How to do it...
- How it works...
- There's more
- See also
- Looping through items
- How to do it...
- How it works...
- There's more
- See also
- Using flow control statements
- How to do it...
- How it works...
- There's more...
- See also
- Creating custom objects
- How to do it...
- How it works...
- There's more...
- Watch out for concurrent pipeline errors
- See also
- Creating PowerShell functions
- How to do it...
- How it works...
- There's more
- Taking it a step further
- See also
- Creating and running scripts
- How to do it...
- How it works...
- There's more
- Execution policy
- See also
- Setting up a profile
- How to do it...
- How it works...
- There's more
- See also
- Introduction
- 2. Exchange Management Shell Common Tasks
- Introduction
- Performing some basic steps
- Using command discovery through the Exchange Management Console
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Manually configuring remote PowerShell connections
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Transferring files through remote shell connections
- How to do it...
- How it works...
- There's more...
- See also
- Dealing with concurrent pipelines in remote PowerShell
- How to do it...
- How it works...
- There's more...
- See also
- Managing domains or an entire forest using recipient scope
- How to do it...
- How it works...
- There's more...
- Using explicit credentials with PowerShell cmdlets
- How to do it...
- How it works...
- There's more...
- Exporting reports to text and CSV files
- How to do it...
- How it works...
- T here's more...
- See also
- Sending SMTP e-mails through PowerShell
- How to do it...
- How it works...
- There's more...
- Sending messages with attachments
- Sending command output in the body of a message
- See also
- Scheduling scripts to run at a later time
- How to do it...
- How it works...
- There's more...
- See also
- Logging shell sessions to a transcript
- How to do it...
- How it works...
- There's more...
- See also
- Automating tasks with the scripting agent
- Getting ready
- How to do it...
- How it works...
- There's more...
- Using multiple cmdlets with the OnComplete API
- See also
- Scripting an Exchange server Installation
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Introduction
- 3. Managing Recipients
- Introduction
- Performing some basic steps
- Adding, modifying, and removing mailboxes
- How to do it...
- How it works...
- There's more...
- Setting active directory attributes
- See also
- Working with contacts
- How to do it...
- How it works...
- There's more...
- See also
- Managing distribution groups
- How to do it...
- How it works...
- There's more...
- See also
- Managing resource mailboxes
- How to do it...
- How it works...
- There's more...
- Converting mailboxes
- See also
- Creating recipients in bulk using a CSV file
- Getting ready
- How to do it...
- How it works...
- There's more...
- Taking it a step further
- See also
- Working with recipient filters
- How to do it...
- How it works...
- There's more
- Understanding variables in filters
- See also
- Adding and removing recipient e-mail addresses
- How to do it...
- How it works...
- There's more...
- See also
- Hiding recipients from address lists
- How to do it...
- How it works...
- There's more...
- See also
- Configuring recipient moderation
- How to do it...
- How it works...
- There's more...
- See also
- Configuring message delivery restrictions
- How to do it...
- How it works...
- There's more...
- See also
- Managing automatic replies and out of office settings for a user
- How to do it...
- How it works...
- There's more...
- Adding, modifying, and removing server-side inbox rules
- How to do it...
- How it works...
- There's more...
- See also
- Managing mailbox folder permissions
- How to do it...
- How it works...
- There's more...
- See also
- Importing user photos into Active Directory
- Getting ready
- How to do it...
- How it works...
- There's more
- Taking it a step further
- See also
- Introduction
- 4. Managing Mailboxes
- Introduction
- Performing some basic steps
- Reporting on the mailbox size
- How to do it...
- How it works...
- There's more...
- See also
- Working with move requests and performing mailbox moves
- How to do it...
- How it works...
- There's more...
- Removing the move requests
- Moving the archive mailboxes
- Moving the mailboxes in batches
- Moving mailboxes with corrupt items
- See also
- Importing and exporting mailboxes
- How to do it...
- How it works...
- There's more
- Importing data into mailboxes
- Taking it a step further
- See also
- Deleting messages from mailboxes
- How to do it...
- How it works...
- There's more
- Running reports before deleting data
- Deleting messages in bulk
- See also
- Managing disconnected mailboxes
- How to do it...
- How it works...
- There's more
- See also
- Generating mailbox folder reports
- How to do it...
- How it works...
- There's more
- Taking it a step further
- See also
- Reporting on mailbox creation time
- How to do it...
- How it works...
- There's more...
- See also
- Checking mailbox logon statistics
- How to do it...
- How it works...
- There's more...
- See also
- Setting storage quotas for mailboxes
- How to do it...
- How it works...
- There's more...
- Finding inactive mailboxes
- How to do it...
- How it works...
- There's more...
- Detecting and fixing corrupt mailboxes
- How to do it...
- How it works...
- There's more...
- See also
- Restoring deleted items from mailboxes
- How to do it...
- How it works...
- There's more...
- See also
- 5. Distribution Groups and Address Lists
- Introduction
- Reporting on distribution group membership
- How to do it...
- How it works...
- There's more...
- See also
- Adding members to a distribution group from an external file
- How to do it...
- How it works...
- There's more...
- See also
- Previewing dynamic distribution group membership
- How to do it...
- How it works...
- There's more...
- See also
- Excluding hidden recipients from a dynamic distribution group
- How to do it...
- How it works...
- There's more...
- See also
- Converting and upgrading distribution groups
- How to do it...
- How it works...
- There's more...
- See also
- Allowing managers to modify group membership
- How to do it...
- How it works...
- There's more...
- See also
- Removing disabled user accounts from distribution groups
- How to do it...
- How it works...
- There's more
- See also
- Working with distribution group naming policies
- How to do it...
- How it works...
- There's more...
- See also
- Working with distribution group membership approval
- How to do it...
- How it works...
- There's more...
- See also
- Creating address lists
- How to do it...
- How it works...
- There's more...
- See also
- Exporting address list membership to a CSV file
- How to do it...
- How it works...
- There's more...
- See also
- Configuring hierarchical address books
- How to do it...
- How it works...
- There's more...
- See also
- 6. Mailbox and Public Folder Databases
- Introduction
- Performing some basic steps
- Managing the mailbox and the public folder databases
- How to do it...
- How it works...
- There's more
- Understanding automatic mailbox distribution
- See also
- Moving databases and logs to another location
- How to do it...
- How it works...
- There's more
- Manually moving databases
- Taking it a step further
- See also
- Configuring the mailbox and public folder database limits
- How to do it...
- How it works...
- There's more
- Taking it a step further
- See also
- Reporting on mailbox database size
- How to do it...
- How it works...
- There's more...
- See also
- Finding the total number of mailboxes in a database
- How to do it...
- How it works...
- There's more...
- See also
- Determining the average mailbox size per database
- How to do it...
- How it works...
- There's more...
- See also
- Reporting on database backup status
- How to do it...
- How it works...
- There's more...
- See also
- Restoring data from a recovery database
- How to do it...
- How it works...
- There's more
- Understanding target mailbox identity
- Learning about other useful parameters
- Understanding mailbox restore request cmdlets
- Taking it a step further
- See also
- Configuring public folder replication
- How to do it...
- How it works...
- There's more...
- Managing user access to public folders
- How to do it...
- How it works...
- There's more...
- Reporting on public folder statistics
- How to do it...
- How it works...
- There's more...
- See also
- Introduction
- 7. Managing Client Access
- Introduction
- Performing some basic steps
- Creating an RPC Client Access array
- How to do it...
- How it works...
- There's more...
- See also
- Configuring the CAS server used by RPC clients
- How to do it...
- How it works...
- There's more...
- See also
- Configuring RPC encryption requirements
- How to do it.
- How it works...
- There's more...
- See also
- Managing ActiveSync, OWA, POP3, and IMAP4 mailbox settings
- How to do it...
- How it works...
- There's more...
- See also
- Setting internal and external CAS URLs
- How to do it...
- How it works...
- There's more
- Command syntax for the remaining virtual directories
- See also
- Managing Outlook Anywhere settings
- How to do it...
- How it works...
- There's more...
- See also
- Blocking Outlook clients from connecting to Exchange
- How to do it...
- How it works...
- There's more
- Reporting on active OWA and RPC connections
- How to do it...
- How it works...
- There's more...
- See also
- Controlling ActiveSync device access
- How to do it...
- How it works...
- There's more...
- See also
- Reporting on ActiveSync devices
- How to do it...
- How it works...
- There's more...
- See also
- Introduction
- 8. Managing Transport Servers
- Introduction
- Performing some basic steps
- Managing connectors
- How to do it...
- How it works...
- There's more
- See also
- Configuring transport limits
- How to do it...
- How it works...
- There's more
- See also
- Allowing application servers to relay mail
- How to do it...
- How it works...
- There's more
- See also
- Managing transport rules
- How to do it...
- How it works...
- There's more
- Modifying transport rules
- Enabling, disabling, and removing transport rules
- Understanding regular expressions in transport rules
- Working with custom DSN messages
- How to do it...
- How it works...
- There's more
- Managing connectivity and protocol logs
- How to do it...
- How it works...
- There's more
- Parsing logfiles
- Message tracking logs
- How to do it...
- How it works...
- There's more
- Taking it a step further
- See also
- Working with messages in transport queues
- How to do it...
- How it works...
- There's more
- Searching anti-spam agent logs
- How to do it...
- How it works...
- There's more
- See also
- Implementing a header firewall
- How to do it...
- How it works...
- There's more...
- Introduction
- 9. High Availability
- Introduction
- Performing some basic steps
- Building a Windows NLB cluster for CAS servers
- Getting ready
- How to do it...
- How it works...
- There's more
- Taking it a step further
- See also
- Creating a Database Availability Group
- How to do it...
- How it works...
- There's more
- See also
- Adding mailbox servers to a Database Availability Group
- How to do it...
- How it works...
- There's more...
- See also
- Configuring Database Availability Group network settings
- How to do it...
- How it works...
- There's more
- Renaming and removing DAG networks
- Adding mailbox copies to a Database Availability Group
- How to do it...
- How it works...
- There's more
- See also
- Activating mailbox database copies
- How to do it...
- How it works...
- There's more
- See also
- Working with lagged database copies
- How to do it...
- How it works...
- There's more...
- Reseeding a database copy
- How to do it...
- How it works...
- There's more...
- See also
- Performing maintenance on Database Availability Group members
- How to do it...
- How it works...
- There's more...
- Reporting on database status, redundancy, and replication
- How to do it...
- How it works...
- There's more
- Understanding switchover and failover metrics
- Understanding Replication Metrics
- See also
- Introduction
- 10. Exchange Security
- Introduction
- Performing some basic steps
- Granting users full access permissions to mailboxes
- How to do it...
- How it works...
- There's more...
- See also
- Finding users with full access to mailboxes
- How to do it...
- How it works...
- There's more...
- Sending e-mail messages as another user or group
- How to do it...
- How it works...
- There's more...
- Working with Role Based Access Control (RBAC)
- How to do it...
- How it works...
- There's more
- RBAC is for end-users too
- See also
- Creating a custom RBAC role for administrators
- How to do it...
- How it works...
- There's more...
- See also
- Creating a custom RBAC role for end users
- How to do it...
- How it works...
- There's more...
- See also
- Troubleshooting Role Based Access Control
- How to do it...
- How it works...
- There's more...
- See also
- Generating a certificate request
- How to do it...
- How it works...
- There's more...
- See also
- Installing certificates and enabling services
- How to do it...
- How it works...
- There's more...
- See also
- Importing certificates on multiple exchange servers
- How to do it...
- How it works...
- There's more...
- See also
- Introduction
- 11. Compliance and Audit Logging
- Introduction
- Performing some basic steps
- Managing archive mailboxes
- How to do it...
- How it works...
- There's more...
- See also
- Configuring archive mailbox quotas
- How to do it...
- How it works...
- There's more...
- See also
- Creating retention tags and policies
- How to do it.
- How it works
- There's more
- Understanding default tags
- See also
- Applying retention policies to mailboxes
- How to do it...
- How it works...
- There's more...
- See also
- Placing mailboxes on retention hold
- How to do it...
- How it works...
- There's more...
- See also
- Performing a discovery search
- How to do it...
- How it works...
- There's more...
- See also
- Placing mailboxes on litigation hold
- How to do it...
- How it works...
- There's more...
- See also
- Enabling mailbox audit logging
- How to do it...
- How it works...
- There's more...
- See also
- Generating mailbox audit log reports
- How to do it...
- How it works...
- There's more...
- See also
- Configuring Administrator Audit Logging
- How to do it...
- How it works...
- There's more...
- See also
- Searching administrator audit logs
- How to do it...
- How it works...
- There's more...
- See also
- Introduction
- 12. Server Monitoring and Troubleshooting
- Introduction
- Performing some basic steps
- Managing and monitoring services
- How to do it...
- How it works...
- There's more...
- See also
- Verifying server connectivity
- How to do it...
- How it works...
- Working with the event logs
- How to do it...
- How it works...
- There's more...
- Reporting on disk usage
- How to do it...
- How it works...
- There's more...
- See also
- Checking CPU utilization
- How to do it...
- How it works...
- There's more...
- See also
- Monitoring memory utilization
- How to do it...
- How it works...
- There's more...
- See also
- Reporting on Exchange Server uptime
- How to do it...
- How it works...
- There's more...
- See also
- Troubleshooting the Mailbox role
- How to do it...
- How it works...
- See also
- Troubleshooting the Client Access Server role
- How to do it...
- How it works...
- There's more...
- See also
- Troubleshooting Transport servers
- How to do it...
- How it works...
- See also
- Verifying certificate health
- How to do it...
- How it works...
- There's more...
- See also
- Introduction
- 13. Scripting with the Exchange Web Services Managed API
- Introduction
- Performing some basic steps
- Getting connected to EWS
- How to do it...
- How it works...
- There's more...
- Certificates matter
- Sending e-mail messages with EWS
- How to do it...
- How it works...
- There's more...
- See also
- Working with impersonation
- Getting ready
- How to do it...
- How it works...
- There's more...
- Searching mailboxes
- How to do it...
- How it works...
- There's more...
- See also
- Retrieving the headers of an e-mail message
- How to do it...
- How it works...
- There's more...
- See also
- Deleting e-mail items from a mailbox
- How to do it...
- How it works...
- There's more...
- See also
- Creating calendar items
- How to do it...
- How it works...
- There's more...
- See also
- Exporting attachments from a mailbox
- How to do it...
- How it works...
- There's more...
- See also
- A. Exchange Management Shell reference
- Commonly-used shell variables
- Commonly-used type accelerators
- Scripts available in the $ExBin directory
- Properties that can be used with the Filter parameter
- Properties that can be used with the RecipientFilterparameter
- B. Advanced Query Syntax
- Using the word phrase search
- Examples
- Using a date range search
- Examples
- Using the message type search
- Examples
- Using the logical connector search
- Examples
- Using the word phrase search
- Index
- Title: Microsoft Exchange 2010 PowerShell Cookbook. This brilliant Cookbook is packed with step-by-step instructions on writing scripts for Exchange 2010. You’ll be able to use the recipes straightaway and take your Microsoft Exchange management capabilities to another level
- Author: Mike Pfeiffer, MIKE PFEIFFER
- Original title: Microsoft Exchange 2010 PowerShell Cookbook. This brilliant Cookbook is packed with step-by-step instructions on writing scripts for Exchange 2010. You’ll be able to use the recipes straightaway and take your Microsoft Exchange management capabilities to another level.
- ISBN: 9781849682473, 9781849682473
- Date of issue: 2011-07-25
- Format: Ebook
- Item ID: e_3cee
- Publisher: Packt Publishing