Категорії
Електронні книги
-
Бізнес та економіка
- Біткойн
- Ділова жінка
- Коучинг
- Контроль
- Електронний бізнес
- Економіка
- Фінанси
- Фондова біржа та інвестиції
- Особисті компетенції
- Комп'ютер в офісі
- Комунікація та переговори
- Малий бізнес
- Маркетинг
- Мотивація
- Мультимедійне навчання
- Нерухомість
- Переконання та НЛП
- Податки
- Соціальна політика
- Порадники
- Презентації
- Лідерство
- Зв'язки з громадськістю
- Звіти, аналізи
- Секрет
- Соціальні засоби комунікації
- Продаж
- Стартап
- Ваша кар'єра
- Управління
- Управління проектами
- Людські ресурси (HR)
-
Для дітей
-
Для молоді
-
Освіта
-
Енциклопедії, словники
-
Електронна преса
- Architektura i wnętrza
- Biznes i Ekonomia
- Будинок та сад
- Електронний бізнес
- Фінанси
- Особисті фінанси
- Бізнес
- Фотографія
- Інформатика
- Відділ кадрів та оплата праці
- Комп'ютери, Excel
- Бухгалтерія
- Культура та література
- Наукові та академічні
- Охорона навколишнього середовища
- Впливові
- Освіта
- Податки
- Подорожі
- Психологія
- Релігія
- Сільське господарство
- Ринок книг і преси
- Транспорт та спедиція
- Здоров'я та краса
-
Історія
-
Інформатика
- Офісні застосунки
- Бази даних
- Біоінформатика
- Бізнес ІТ
- CAD/CAM
- Digital Lifestyle
- DTP
- Електроніка
- Цифрова фотографія
- Комп'ютерна графіка
- Ігри
- Хакування
- Hardware
- IT w ekonomii
- Наукові пакети
- Шкільні підручники
- Основи комп'ютера
- Програмування
- Мобільне програмування
- Інтернет-сервери
- Комп'ютерні мережі
- Стартап
- Операційні системи
- Штучний інтелект
- Технологія для дітей
- Вебмайстерність
-
Інше
-
Іноземні мови
-
Культура та мистецтво
-
Шкільні читанки
-
Література
- Антології
- Балада
- Біографії та автобіографії
- Для дорослих
- Драми
- Журнали, щоденники, листи
- Епос, епопея
- Нарис
- Наукова фантастика та фантастика
- Фельєтони
- Художня література
- Гумор, сатира
- Інше
- Класичний
- Кримінальний роман
- Нехудожня література
- Художня література
- Mity i legendy
- Лауреати Нобелівської премії
- Новели
- Побутовий роман
- Okultyzm i magia
- Оповідання
- Спогади
- Подорожі
- Оповідна поезія
- Поезія
- Політика
- Науково-популярна
- Роман
- Історичний роман
- Проза
- Пригодницька
- Журналістика
- Роман-репортаж
- Romans i literatura obyczajowa
- Сенсація
- Трилер, жах
- Інтерв'ю та спогади
-
Природничі науки
-
Соціальні науки
-
Шкільні підручники
-
Науково-популярна та академічна
- Археологія
- Bibliotekoznawstwo
- Кінознавство / Теорія кіно
- Філологія
- Польська філологія
- Філософія
- Finanse i bankowość
- Географія
- Економіка
- Торгівля. Світова економіка
- Історія та археологія
- Історія мистецтва і архітектури
- Культурологія
- Мовознавство
- літературні студії
- Логістика
- Математика
- Ліки
- Гуманітарні науки
- Педагогіка
- Навчальні засоби
- Науково-популярна
- Інше
- Психологія
- Соціологія
- Театральні студії
- Богослов’я
- Економічні теорії та науки
- Transport i spedycja
- Фізичне виховання
- Zarządzanie i marketing
-
Порадники
-
Ігрові посібники
-
Професійні та спеціальні порадники
-
Юридична
- Безпека життєдіяльності
- Історія
- Дорожній кодекс. Водійські права
- Юридичні науки
- Охорона здоров'я
- Загальне, компендіум
- Академічні підручники
- Інше
- Закон про будівництво і житло
- Цивільне право
- Фінансове право
- Господарське право
- Господарське та комерційне право
- Кримінальний закон
- Кримінальне право. Кримінальні злочини. Кримінологія
- Міжнародне право
- Міжнародне та іноземне право
- Закон про охорону здоров'я
- Закон про освіту
- Податкове право
- Трудове право та законодавство про соціальне забезпечення
- Громадське, конституційне та адміністративне право
- Кодекс про шлюб і сім'ю
- Аграрне право
- Соціальне право, трудове право
- Законодавство Євросоюзу
- Промисловість
- Сільське господарство та захист навколишнього середовища
- Словники та енциклопедії
- Державні закупівлі
- Управління
-
Путівники та подорожі
- Африка
- Альбоми
- Південна Америка
- Центральна та Північна Америка
- Австралія, Нова Зеландія, Океанія
- Австрія
- Азії
- Балкани
- Близький Схід
- Болгарія
- Китай
- Хорватія
- Чеська Республіка
- Данія
- Єгипет
- Естонія
- Європа
- Франція
- Гори
- Греція
- Іспанія
- Нідерланди
- Ісландія
- Литва
- Латвія
- Mapy, Plany miast, Atlasy
- Мініпутівники
- Німеччина
- Норвегія
- Активні подорожі
- Польща
- Португалія
- Інше
- Росія
- Румунія
- Словаччина
- Словенія
- Швейцарія
- Швеція
- Світ
- Туреччина
- Україна
- Угорщина
- Велика Британія
- Італія
-
Психологія
- Філософія життя
- Kompetencje psychospołeczne
- Міжособистісне спілкування
- Mindfulness
- Загальне
- Переконання та НЛП
- Академічна психологія
- Психологія душі та розуму
- Психологія праці
- Relacje i związki
- Батьківство та дитяча психологія
- Вирішення проблем
- Інтелектуальний розвиток
- Секрет
- Сексуальність
- Спокушання
- Зовнішній вигляд та імідж
- Філософія життя
-
Релігія
-
Спорт, фітнес, дієти
-
Техніка і механіка
Аудіокниги
-
Бізнес та економіка
- Біткойн
- Ділова жінка
- Коучинг
- Контроль
- Електронний бізнес
- Економіка
- Фінанси
- Фондова біржа та інвестиції
- Особисті компетенції
- Комунікація та переговори
- Малий бізнес
- Маркетинг
- Мотивація
- Нерухомість
- Переконання та НЛП
- Податки
- Порадники
- Презентації
- Лідерство
- Зв'язки з громадськістю
- Секрет
- Соціальні засоби комунікації
- Продаж
- Стартап
- Ваша кар'єра
- Управління
- Управління проектами
- Людські ресурси (HR)
-
Для дітей
-
Для молоді
-
Освіта
-
Енциклопедії, словники
-
Історія
-
Інформатика
-
Інше
-
Іноземні мови
-
Культура та мистецтво
-
Шкільні читанки
-
Література
- Антології
- Балада
- Біографії та автобіографії
- Для дорослих
- Драми
- Журнали, щоденники, листи
- Епос, епопея
- Нарис
- Наукова фантастика та фантастика
- Фельєтони
- Художня література
- Гумор, сатира
- Інше
- Класичний
- Кримінальний роман
- Нехудожня література
- Художня література
- Mity i legendy
- Лауреати Нобелівської премії
- Новели
- Побутовий роман
- Okultyzm i magia
- Оповідання
- Спогади
- Подорожі
- Поезія
- Політика
- Науково-популярна
- Роман
- Історичний роман
- Проза
- Пригодницька
- Журналістика
- Роман-репортаж
- Romans i literatura obyczajowa
- Сенсація
- Трилер, жах
- Інтерв'ю та спогади
-
Природничі науки
-
Соціальні науки
-
Науково-популярна та академічна
-
Порадники
-
Професійні та спеціальні порадники
-
Юридична
-
Путівники та подорожі
-
Психологія
- Філософія життя
- Міжособистісне спілкування
- Mindfulness
- Загальне
- Переконання та НЛП
- Академічна психологія
- Психологія душі та розуму
- Психологія праці
- Relacje i związki
- Батьківство та дитяча психологія
- Вирішення проблем
- Інтелектуальний розвиток
- Секрет
- Сексуальність
- Спокушання
- Зовнішній вигляд та імідж
- Філософія життя
-
Релігія
-
Спорт, фітнес, дієти
-
Техніка і механіка
Відеокурси
-
Бази даних
-
Big Data
-
Biznes, ekonomia i marketing
-
Кібербезпека
-
Data Science
-
DevOps
-
Для дітей
-
Електроніка
-
Графіка / Відео / CAX
-
Ігри
-
Microsoft Office
-
Інструменти розробки
-
Програмування
-
Особистісний розвиток
-
Комп'ютерні мережі
-
Операційні системи
-
Тестування програмного забезпечення
-
Мобільні пристрої
-
UX/UI
-
Веброзробка, Web development
-
Управління
Подкасти
- Електронні книги
- Інформатика
- Операційні системи
- Microsoft Exchange 2010 PowerShell Cookbook. This brilliant Cookbook is packed with step-by-step instructions on writing scripts for Exchange 2010. You’ll be able to use the recipes straightaway and take your Microsoft Exchange management capabilities to another level
Деталі електронної книги
Увійти, Якщо вас цікавить зміст видання.
Microsoft Exchange 2010 PowerShell Cookbook. This brilliant Cookbook is packed with step-by-step instructions on writing scripts for Exchange 2010. You’ll be able to use the recipes straightaway and take your Microsoft Exchange management capabilities to another level
Eлектронна книга
- Microsoft Exchange 2010 PowerShell Cookbook
- Table of Contents
- Microsoft Exchange 2010 PowerShell Cookbook
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- Support files, eBooks, discount offers and more
- Why subscribe?
- Free access for Packt account holders
- Instant updates on new Packt books
- Support files, eBooks, discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Downloading the example code
- Errata
- Piracy
- Questions
- 1. PowerShell Key Concepts
- Introduction
- Performing some basic steps
- Understanding command syntax and parameters
- How to do it...
- How it works...
- Theres more...
- See also
- Using the help system
- How to do it...
- How it works...
- There's more...
- Getting help with cmdlets and functions
- See also
- Understanding the pipeline
- How to do it...
- How it works...
- There's more...
- See also
- Working with variables and objects
- How to do it...
- How it works...
- There's more...
- Variable expansion in strings
- Strongly typed variables
- Formatting output
- How to do it...
- How it works...
- There's more
- See also
- Working with arrays and hash tables
- How to do it...
- How it works...
- There's more
- See also
- Looping through items
- How to do it...
- How it works...
- There's more
- See also
- Using flow control statements
- How to do it...
- How it works...
- There's more...
- See also
- Creating custom objects
- How to do it...
- How it works...
- There's more...
- Watch out for concurrent pipeline errors
- See also
- Creating PowerShell functions
- How to do it...
- How it works...
- There's more
- Taking it a step further
- See also
- Creating and running scripts
- How to do it...
- How it works...
- There's more
- Execution policy
- See also
- Setting up a profile
- How to do it...
- How it works...
- There's more
- See also
- Introduction
- 2. Exchange Management Shell Common Tasks
- Introduction
- Performing some basic steps
- Using command discovery through the Exchange Management Console
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Manually configuring remote PowerShell connections
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Transferring files through remote shell connections
- How to do it...
- How it works...
- There's more...
- See also
- Dealing with concurrent pipelines in remote PowerShell
- How to do it...
- How it works...
- There's more...
- See also
- Managing domains or an entire forest using recipient scope
- How to do it...
- How it works...
- There's more...
- Using explicit credentials with PowerShell cmdlets
- How to do it...
- How it works...
- There's more...
- Exporting reports to text and CSV files
- How to do it...
- How it works...
- T here's more...
- See also
- Sending SMTP e-mails through PowerShell
- How to do it...
- How it works...
- There's more...
- Sending messages with attachments
- Sending command output in the body of a message
- See also
- Scheduling scripts to run at a later time
- How to do it...
- How it works...
- There's more...
- See also
- Logging shell sessions to a transcript
- How to do it...
- How it works...
- There's more...
- See also
- Automating tasks with the scripting agent
- Getting ready
- How to do it...
- How it works...
- There's more...
- Using multiple cmdlets with the OnComplete API
- See also
- Scripting an Exchange server Installation
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Introduction
- 3. Managing Recipients
- Introduction
- Performing some basic steps
- Adding, modifying, and removing mailboxes
- How to do it...
- How it works...
- There's more...
- Setting active directory attributes
- See also
- Working with contacts
- How to do it...
- How it works...
- There's more...
- See also
- Managing distribution groups
- How to do it...
- How it works...
- There's more...
- See also
- Managing resource mailboxes
- How to do it...
- How it works...
- There's more...
- Converting mailboxes
- See also
- Creating recipients in bulk using a CSV file
- Getting ready
- How to do it...
- How it works...
- There's more...
- Taking it a step further
- See also
- Working with recipient filters
- How to do it...
- How it works...
- There's more
- Understanding variables in filters
- See also
- Adding and removing recipient e-mail addresses
- How to do it...
- How it works...
- There's more...
- See also
- Hiding recipients from address lists
- How to do it...
- How it works...
- There's more...
- See also
- Configuring recipient moderation
- How to do it...
- How it works...
- There's more...
- See also
- Configuring message delivery restrictions
- How to do it...
- How it works...
- There's more...
- See also
- Managing automatic replies and out of office settings for a user
- How to do it...
- How it works...
- There's more...
- Adding, modifying, and removing server-side inbox rules
- How to do it...
- How it works...
- There's more...
- See also
- Managing mailbox folder permissions
- How to do it...
- How it works...
- There's more...
- See also
- Importing user photos into Active Directory
- Getting ready
- How to do it...
- How it works...
- There's more
- Taking it a step further
- See also
- Introduction
- 4. Managing Mailboxes
- Introduction
- Performing some basic steps
- Reporting on the mailbox size
- How to do it...
- How it works...
- There's more...
- See also
- Working with move requests and performing mailbox moves
- How to do it...
- How it works...
- There's more...
- Removing the move requests
- Moving the archive mailboxes
- Moving the mailboxes in batches
- Moving mailboxes with corrupt items
- See also
- Importing and exporting mailboxes
- How to do it...
- How it works...
- There's more
- Importing data into mailboxes
- Taking it a step further
- See also
- Deleting messages from mailboxes
- How to do it...
- How it works...
- There's more
- Running reports before deleting data
- Deleting messages in bulk
- See also
- Managing disconnected mailboxes
- How to do it...
- How it works...
- There's more
- See also
- Generating mailbox folder reports
- How to do it...
- How it works...
- There's more
- Taking it a step further
- See also
- Reporting on mailbox creation time
- How to do it...
- How it works...
- There's more...
- See also
- Checking mailbox logon statistics
- How to do it...
- How it works...
- There's more...
- See also
- Setting storage quotas for mailboxes
- How to do it...
- How it works...
- There's more...
- Finding inactive mailboxes
- How to do it...
- How it works...
- There's more...
- Detecting and fixing corrupt mailboxes
- How to do it...
- How it works...
- There's more...
- See also
- Restoring deleted items from mailboxes
- How to do it...
- How it works...
- There's more...
- See also
- 5. Distribution Groups and Address Lists
- Introduction
- Reporting on distribution group membership
- How to do it...
- How it works...
- There's more...
- See also
- Adding members to a distribution group from an external file
- How to do it...
- How it works...
- There's more...
- See also
- Previewing dynamic distribution group membership
- How to do it...
- How it works...
- There's more...
- See also
- Excluding hidden recipients from a dynamic distribution group
- How to do it...
- How it works...
- There's more...
- See also
- Converting and upgrading distribution groups
- How to do it...
- How it works...
- There's more...
- See also
- Allowing managers to modify group membership
- How to do it...
- How it works...
- There's more...
- See also
- Removing disabled user accounts from distribution groups
- How to do it...
- How it works...
- There's more
- See also
- Working with distribution group naming policies
- How to do it...
- How it works...
- There's more...
- See also
- Working with distribution group membership approval
- How to do it...
- How it works...
- There's more...
- See also
- Creating address lists
- How to do it...
- How it works...
- There's more...
- See also
- Exporting address list membership to a CSV file
- How to do it...
- How it works...
- There's more...
- See also
- Configuring hierarchical address books
- How to do it...
- How it works...
- There's more...
- See also
- 6. Mailbox and Public Folder Databases
- Introduction
- Performing some basic steps
- Managing the mailbox and the public folder databases
- How to do it...
- How it works...
- There's more
- Understanding automatic mailbox distribution
- See also
- Moving databases and logs to another location
- How to do it...
- How it works...
- There's more
- Manually moving databases
- Taking it a step further
- See also
- Configuring the mailbox and public folder database limits
- How to do it...
- How it works...
- There's more
- Taking it a step further
- See also
- Reporting on mailbox database size
- How to do it...
- How it works...
- There's more...
- See also
- Finding the total number of mailboxes in a database
- How to do it...
- How it works...
- There's more...
- See also
- Determining the average mailbox size per database
- How to do it...
- How it works...
- There's more...
- See also
- Reporting on database backup status
- How to do it...
- How it works...
- There's more...
- See also
- Restoring data from a recovery database
- How to do it...
- How it works...
- There's more
- Understanding target mailbox identity
- Learning about other useful parameters
- Understanding mailbox restore request cmdlets
- Taking it a step further
- See also
- Configuring public folder replication
- How to do it...
- How it works...
- There's more...
- Managing user access to public folders
- How to do it...
- How it works...
- There's more...
- Reporting on public folder statistics
- How to do it...
- How it works...
- There's more...
- See also
- Introduction
- 7. Managing Client Access
- Introduction
- Performing some basic steps
- Creating an RPC Client Access array
- How to do it...
- How it works...
- There's more...
- See also
- Configuring the CAS server used by RPC clients
- How to do it...
- How it works...
- There's more...
- See also
- Configuring RPC encryption requirements
- How to do it.
- How it works...
- There's more...
- See also
- Managing ActiveSync, OWA, POP3, and IMAP4 mailbox settings
- How to do it...
- How it works...
- There's more...
- See also
- Setting internal and external CAS URLs
- How to do it...
- How it works...
- There's more
- Command syntax for the remaining virtual directories
- See also
- Managing Outlook Anywhere settings
- How to do it...
- How it works...
- There's more...
- See also
- Blocking Outlook clients from connecting to Exchange
- How to do it...
- How it works...
- There's more
- Reporting on active OWA and RPC connections
- How to do it...
- How it works...
- There's more...
- See also
- Controlling ActiveSync device access
- How to do it...
- How it works...
- There's more...
- See also
- Reporting on ActiveSync devices
- How to do it...
- How it works...
- There's more...
- See also
- Introduction
- 8. Managing Transport Servers
- Introduction
- Performing some basic steps
- Managing connectors
- How to do it...
- How it works...
- There's more
- See also
- Configuring transport limits
- How to do it...
- How it works...
- There's more
- See also
- Allowing application servers to relay mail
- How to do it...
- How it works...
- There's more
- See also
- Managing transport rules
- How to do it...
- How it works...
- There's more
- Modifying transport rules
- Enabling, disabling, and removing transport rules
- Understanding regular expressions in transport rules
- Working with custom DSN messages
- How to do it...
- How it works...
- There's more
- Managing connectivity and protocol logs
- How to do it...
- How it works...
- There's more
- Parsing logfiles
- Message tracking logs
- How to do it...
- How it works...
- There's more
- Taking it a step further
- See also
- Working with messages in transport queues
- How to do it...
- How it works...
- There's more
- Searching anti-spam agent logs
- How to do it...
- How it works...
- There's more
- See also
- Implementing a header firewall
- How to do it...
- How it works...
- There's more...
- Introduction
- 9. High Availability
- Introduction
- Performing some basic steps
- Building a Windows NLB cluster for CAS servers
- Getting ready
- How to do it...
- How it works...
- There's more
- Taking it a step further
- See also
- Creating a Database Availability Group
- How to do it...
- How it works...
- There's more
- See also
- Adding mailbox servers to a Database Availability Group
- How to do it...
- How it works...
- There's more...
- See also
- Configuring Database Availability Group network settings
- How to do it...
- How it works...
- There's more
- Renaming and removing DAG networks
- Adding mailbox copies to a Database Availability Group
- How to do it...
- How it works...
- There's more
- See also
- Activating mailbox database copies
- How to do it...
- How it works...
- There's more
- See also
- Working with lagged database copies
- How to do it...
- How it works...
- There's more...
- Reseeding a database copy
- How to do it...
- How it works...
- There's more...
- See also
- Performing maintenance on Database Availability Group members
- How to do it...
- How it works...
- There's more...
- Reporting on database status, redundancy, and replication
- How to do it...
- How it works...
- There's more
- Understanding switchover and failover metrics
- Understanding Replication Metrics
- See also
- Introduction
- 10. Exchange Security
- Introduction
- Performing some basic steps
- Granting users full access permissions to mailboxes
- How to do it...
- How it works...
- There's more...
- See also
- Finding users with full access to mailboxes
- How to do it...
- How it works...
- There's more...
- Sending e-mail messages as another user or group
- How to do it...
- How it works...
- There's more...
- Working with Role Based Access Control (RBAC)
- How to do it...
- How it works...
- There's more
- RBAC is for end-users too
- See also
- Creating a custom RBAC role for administrators
- How to do it...
- How it works...
- There's more...
- See also
- Creating a custom RBAC role for end users
- How to do it...
- How it works...
- There's more...
- See also
- Troubleshooting Role Based Access Control
- How to do it...
- How it works...
- There's more...
- See also
- Generating a certificate request
- How to do it...
- How it works...
- There's more...
- See also
- Installing certificates and enabling services
- How to do it...
- How it works...
- There's more...
- See also
- Importing certificates on multiple exchange servers
- How to do it...
- How it works...
- There's more...
- See also
- Introduction
- 11. Compliance and Audit Logging
- Introduction
- Performing some basic steps
- Managing archive mailboxes
- How to do it...
- How it works...
- There's more...
- See also
- Configuring archive mailbox quotas
- How to do it...
- How it works...
- There's more...
- See also
- Creating retention tags and policies
- How to do it.
- How it works
- There's more
- Understanding default tags
- See also
- Applying retention policies to mailboxes
- How to do it...
- How it works...
- There's more...
- See also
- Placing mailboxes on retention hold
- How to do it...
- How it works...
- There's more...
- See also
- Performing a discovery search
- How to do it...
- How it works...
- There's more...
- See also
- Placing mailboxes on litigation hold
- How to do it...
- How it works...
- There's more...
- See also
- Enabling mailbox audit logging
- How to do it...
- How it works...
- There's more...
- See also
- Generating mailbox audit log reports
- How to do it...
- How it works...
- There's more...
- See also
- Configuring Administrator Audit Logging
- How to do it...
- How it works...
- There's more...
- See also
- Searching administrator audit logs
- How to do it...
- How it works...
- There's more...
- See also
- Introduction
- 12. Server Monitoring and Troubleshooting
- Introduction
- Performing some basic steps
- Managing and monitoring services
- How to do it...
- How it works...
- There's more...
- See also
- Verifying server connectivity
- How to do it...
- How it works...
- Working with the event logs
- How to do it...
- How it works...
- There's more...
- Reporting on disk usage
- How to do it...
- How it works...
- There's more...
- See also
- Checking CPU utilization
- How to do it...
- How it works...
- There's more...
- See also
- Monitoring memory utilization
- How to do it...
- How it works...
- There's more...
- See also
- Reporting on Exchange Server uptime
- How to do it...
- How it works...
- There's more...
- See also
- Troubleshooting the Mailbox role
- How to do it...
- How it works...
- See also
- Troubleshooting the Client Access Server role
- How to do it...
- How it works...
- There's more...
- See also
- Troubleshooting Transport servers
- How to do it...
- How it works...
- See also
- Verifying certificate health
- How to do it...
- How it works...
- There's more...
- See also
- Introduction
- 13. Scripting with the Exchange Web Services Managed API
- Introduction
- Performing some basic steps
- Getting connected to EWS
- How to do it...
- How it works...
- There's more...
- Certificates matter
- Sending e-mail messages with EWS
- How to do it...
- How it works...
- There's more...
- See also
- Working with impersonation
- Getting ready
- How to do it...
- How it works...
- There's more...
- Searching mailboxes
- How to do it...
- How it works...
- There's more...
- See also
- Retrieving the headers of an e-mail message
- How to do it...
- How it works...
- There's more...
- See also
- Deleting e-mail items from a mailbox
- How to do it...
- How it works...
- There's more...
- See also
- Creating calendar items
- How to do it...
- How it works...
- There's more...
- See also
- Exporting attachments from a mailbox
- How to do it...
- How it works...
- There's more...
- See also
- A. Exchange Management Shell reference
- Commonly-used shell variables
- Commonly-used type accelerators
- Scripts available in the $ExBin directory
- Properties that can be used with the Filter parameter
- Properties that can be used with the RecipientFilterparameter
- B. Advanced Query Syntax
- Using the word phrase search
- Examples
- Using a date range search
- Examples
- Using the message type search
- Examples
- Using the logical connector search
- Examples
- Using the word phrase search
- Index
- Назва: Microsoft Exchange 2010 PowerShell Cookbook. This brilliant Cookbook is packed with step-by-step instructions on writing scripts for Exchange 2010. You’ll be able to use the recipes straightaway and take your Microsoft Exchange management capabilities to another level
- Автор: Mike Pfeiffer, MIKE PFEIFFER
- Оригінальна назва: Microsoft Exchange 2010 PowerShell Cookbook. This brilliant Cookbook is packed with step-by-step instructions on writing scripts for Exchange 2010. You’ll be able to use the recipes straightaway and take your Microsoft Exchange management capabilities to another level.
- ISBN: 9781849682473, 9781849682473
- Дата видання: 2011-07-25
- Формат: Eлектронна книга
- Ідентифікатор видання: e_3cee
- Видавець: Packt Publishing