万本电子书0元读

万本电子书0元读

顶部广告

Microsoft Exchange 2010 PowerShell Cookbook电子书

售       价:¥

3人正在读 | 0人评论 6.2

作       者:Mike Pfeiffer

出  版  社:Packt Publishing

出版时间:2011-07-25

字       数:338.3万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
This book is written in a cookbook-style format and provides practical, immediately usable task-based recipes that show you how to manage and maintain your Microsoft Exchange Server 2010 environment with Windows PowerShell 2.0. Each chapter of the book is written so that it can be used as a desktop reference, or it can be read from beginning to end, allowing you to build a solid foundation for building *s in your Exchange environment. This book is for messaging professionals who want to learn how to build real-world *s with Windows PowerShell 2.0 and the Exchange Management Shell. If you are a network or systems administrator responsible for managing and maintaining Exchange Server 2010, then this book is for you. The recipes in this cookbook touch on each of the core Exchange 2010 server roles and require a working knowledge of supporting technologies including Windows Server 2008 or Windows Server 2008 R2, Active Directory, and DNS. This book covers the latest additions to Exchange Server 2010 including Service Pack 1. A basic understanding of Exchange Server 2010 and Windows PowerShell 2.0 is highly recommended.
目录展开

Microsoft Exchange 2010 PowerShell Cookbook

Table of Contents

Microsoft Exchange 2010 PowerShell Cookbook

Credits

About the Author

About the Reviewers

www.PacktPub.com

Support files, eBooks, discount offers and more

Why subscribe?

Free access for Packt account holders

Instant updates on new Packt books

Preface

What this book covers

What you need for this book

Who this book is for

Conventions

Reader feedback

Customer support

Downloading the example code

Errata

Piracy

Questions

1. PowerShell Key Concepts

Introduction

Performing some basic steps

Understanding command syntax and parameters

How to do it...

How it works...

There's more...

See also

Using the help system

How to do it...

How it works...

There's more...

Getting help with cmdlets and functions

See also

Understanding the pipeline

How to do it...

How it works...

There's more...

See also

Working with variables and objects

How to do it...

How it works...

There's more...

Variable expansion in strings

Strongly typed variables

Formatting output

How to do it...

How it works...

There's more…

See also

Working with arrays and hash tables

How to do it...

How it works...

There's more…

See also

Looping through items

How to do it...

How it works...

There's more…

See also

Using flow control statements

How to do it...

How it works...

There's more...

See also

Creating custom objects

How to do it...

How it works...

There's more...

Watch out for concurrent pipeline errors

See also

Creating PowerShell functions

How to do it...

How it works...

There's more…

Taking it a step further

See also

Creating and running scripts

How to do it...

How it works...

There's more…

Execution policy

See also

Setting up a profile

How to do it...

How it works...

There's more…

See also

2. Exchange Management Shell Common Tasks

Introduction

Performing some basic steps

Using command discovery through the Exchange Management Console

Getting ready

How to do it...

How it works...

There's more...

See also

Manually configuring remote PowerShell connections

Getting ready

How to do it...

How it works...

There's more...

See also

Transferring files through remote shell connections

How to do it...

How it works...

There's more...

See also

Dealing with concurrent pipelines in remote PowerShell

How to do it...

How it works...

There's more...

See also

Managing domains or an entire forest using recipient scope

How to do it...

How it works...

There's more...

Using explicit credentials with PowerShell cmdlets

How to do it...

How it works...

There's more...

Exporting reports to text and CSV files

How to do it...

How it works...

T here's more...

See also

Sending SMTP e-mails through PowerShell

How to do it...

How it works...

There's more...

Sending messages with attachments

Sending command output in the body of a message

See also

Scheduling scripts to run at a later time

How to do it...

How it works...

There's more...

See also

Logging shell sessions to a transcript

How to do it...

How it works...

There's more...

See also

Automating tasks with the scripting agent

Getting ready

How to do it...

How it works...

There's more...

Using multiple cmdlets with the OnComplete API

See also

Scripting an Exchange server Installation

Getting ready

How to do it...

How it works...

There's more...

See also

3. Managing Recipients

Introduction

Performing some basic steps

Adding, modifying, and removing mailboxes

How to do it...

How it works...

There's more...

Setting active directory attributes

See also

Working with contacts

How to do it...

How it works...

There's more...

See also

Managing distribution groups

How to do it...

How it works...

There's more...

See also

Managing resource mailboxes

How to do it...

How it works...

There's more...

Converting mailboxes

See also

Creating recipients in bulk using a CSV file

Getting ready

How to do it...

How it works...

There's more...

Taking it a step further

See also

Working with recipient filters

How to do it...

How it works...

There's more…

Understanding variables in filters

See also

Adding and removing recipient e-mail addresses

How to do it...

How it works...

There's more...

See also

Hiding recipients from address lists

How to do it...

How it works...

There's more...

See also

Configuring recipient moderation

How to do it...

How it works...

There's more...

See also

Configuring message delivery restrictions

How to do it...

How it works...

There's more...

See also

Managing automatic replies and out of office settings for a user

How to do it...

How it works...

There's more...

Adding, modifying, and removing server-side inbox rules

How to do it...

How it works...

There's more...

See also

Managing mailbox folder permissions

How to do it...

How it works...

There's more...

See also

Importing user photos into Active Directory

Getting ready

How to do it...

How it works...

There's more…

Taking it a step further

See also

4. Managing Mailboxes

Introduction

Performing some basic steps

Reporting on the mailbox size

How to do it...

How it works...

There's more...

See also

Working with move requests and performing mailbox moves

How to do it...

How it works...

There's more...

Removing the move requests

Moving the archive mailboxes

Moving the mailboxes in batches

Moving mailboxes with corrupt items

See also

Importing and exporting mailboxes

How to do it...

How it works...

There's more…

Importing data into mailboxes

Taking it a step further

See also

Deleting messages from mailboxes

How to do it...

How it works...

There's more…

Running reports before deleting data

Deleting messages in bulk

See also

Managing disconnected mailboxes

How to do it...

How it works...

There's more…

See also

Generating mailbox folder reports

How to do it...

How it works...

There's more…

Taking it a step further

See also

Reporting on mailbox creation time

How to do it...

How it works...

There's more...

See also

Checking mailbox logon statistics

How to do it...

How it works...

There's more...

See also

Setting storage quotas for mailboxes

How to do it...

How it works...

There's more...

Finding inactive mailboxes

How to do it...

How it works...

There's more...

Detecting and fixing corrupt mailboxes

How to do it...

How it works...

There's more...

See also

Restoring deleted items from mailboxes

How to do it...

How it works...

There's more...

See also

5. Distribution Groups and Address Lists

Introduction

Reporting on distribution group membership

How to do it...

How it works...

There's more...

See also

Adding members to a distribution group from an external file

How to do it...

How it works...

There's more...

See also

Previewing dynamic distribution group membership

How to do it...

How it works...

There's more...

See also

Excluding hidden recipients from a dynamic distribution group

How to do it...

How it works...

There's more...

See also

Converting and upgrading distribution groups

How to do it...

How it works...

There's more...

See also

Allowing managers to modify group membership

How to do it...

How it works...

There's more...

See also

Removing disabled user accounts from distribution groups

How to do it...

How it works...

There's more…

See also

Working with distribution group naming policies

How to do it...

How it works...

There's more...

See also

Working with distribution group membership approval

How to do it...

How it works...

There's more...

See also

Creating address lists

How to do it...

How it works...

There's more...

See also

Exporting address list membership to a CSV file

How to do it...

How it works...

There's more...

See also

Configuring hierarchical address books

How to do it...

How it works...

There's more...

See also

6. Mailbox and Public Folder Databases

Introduction

Performing some basic steps

Managing the mailbox and the public folder databases

How to do it...

How it works...

There's more…

Understanding automatic mailbox distribution

See also

Moving databases and logs to another location

How to do it...

How it works...

There's more…

Manually moving databases

Taking it a step further

See also

Configuring the mailbox and public folder database limits

How to do it...

How it works...

There's more…

Taking it a step further

See also

Reporting on mailbox database size

How to do it...

How it works...

There's more...

See also

Finding the total number of mailboxes in a database

How to do it...

How it works...

There's more...

See also

Determining the average mailbox size per database

How to do it...

How it works...

There's more...

See also

Reporting on database backup status

How to do it...

How it works...

There's more...

See also

Restoring data from a recovery database

How to do it...

How it works...

There's more…

Understanding target mailbox identity

Learning about other useful parameters

Understanding mailbox restore request cmdlets

Taking it a step further

See also

Configuring public folder replication

How to do it...

How it works...

There's more...

Managing user access to public folders

How to do it...

How it works...

There's more...

Reporting on public folder statistics

How to do it...

How it works...

There's more...

See also

7. Managing Client Access

Introduction

Performing some basic steps

Creating an RPC Client Access array

How to do it...

How it works...

There's more...

See also

Configuring the CAS server used by RPC clients

How to do it...

How it works...

There's more...

See also

Configuring RPC encryption requirements

How to do it.

How it works...

There's more...

See also

Managing ActiveSync, OWA, POP3, and IMAP4 mailbox settings

How to do it...

How it works...

There's more...

See also

Setting internal and external CAS URLs

How to do it...

How it works...

There's more…

Command syntax for the remaining virtual directories

See also

Managing Outlook Anywhere settings

How to do it...

How it works...

There's more...

See also

Blocking Outlook clients from connecting to Exchange

How to do it...

How it works...

There's more…

Reporting on active OWA and RPC connections

How to do it...

How it works...

There's more...

See also

Controlling ActiveSync device access

How to do it...

How it works...

There's more...

See also

Reporting on ActiveSync devices

How to do it...

How it works...

There's more...

See also

8. Managing Transport Servers

Introduction

Performing some basic steps

Managing connectors

How to do it...

How it works...

There's more…

See also

Configuring transport limits

How to do it...

How it works...

There's more…

See also

Allowing application servers to relay mail

How to do it...

How it works...

There's more…

See also

Managing transport rules

How to do it...

How it works...

There's more…

Modifying transport rules

Enabling, disabling, and removing transport rules

Understanding regular expressions in transport rules

Working with custom DSN messages

How to do it...

How it works...

There's more…

Managing connectivity and protocol logs

How to do it...

How it works...

There's more…

Parsing logfiles

Message tracking logs

How to do it...

How it works...

There's more…

Taking it a step further

See also

Working with messages in transport queues

How to do it...

How it works...

There's more…

Searching anti-spam agent logs

How to do it...

How it works...

There's more…

See also

Implementing a header firewall

How to do it...

How it works...

There's more...

9. High Availability

Introduction

Performing some basic steps

Building a Windows NLB cluster for CAS servers

Getting ready

How to do it...

How it works...

There's more…

Taking it a step further

See also

Creating a Database Availability Group

How to do it...

How it works...

There's more…

See also

Adding mailbox servers to a Database Availability Group

How to do it...

How it works...

There's more...

See also

Configuring Database Availability Group network settings

How to do it...

How it works...

There's more…

Renaming and removing DAG networks

Adding mailbox copies to a Database Availability Group

How to do it...

How it works...

There's more…

See also

Activating mailbox database copies

How to do it...

How it works...

There's more…

See also

Working with lagged database copies

How to do it...

How it works...

There's more...

Reseeding a database copy

How to do it...

How it works...

There's more...

See also

Performing maintenance on Database Availability Group members

How to do it...

How it works...

There's more...

Reporting on database status, redundancy, and replication

How to do it...

How it works...

There's more…

Understanding switchover and failover metrics

Understanding Replication Metrics

See also

10. Exchange Security

Introduction

Performing some basic steps

Granting users full access permissions to mailboxes

How to do it...

How it works...

There's more...

See also

Finding users with full access to mailboxes

How to do it...

How it works...

There's more...

Sending e-mail messages as another user or group

How to do it...

How it works...

There's more...

Working with Role Based Access Control (RBAC)

How to do it...

How it works...

There's more…

RBAC is for end-users too

See also

Creating a custom RBAC role for administrators

How to do it...

How it works...

There's more...

See also

Creating a custom RBAC role for end users

How to do it...

How it works...

There's more...

See also

Troubleshooting Role Based Access Control

How to do it...

How it works...

There's more...

See also

Generating a certificate request

How to do it...

How it works...

There's more...

See also

Installing certificates and enabling services

How to do it...

How it works...

There's more...

See also

Importing certificates on multiple exchange servers

How to do it...

How it works...

There's more...

See also

11. Compliance and Audit Logging

Introduction

Performing some basic steps

Managing archive mailboxes

How to do it...

How it works...

There's more...

See also

Configuring archive mailbox quotas

How to do it...

How it works...

There's more...

See also

Creating retention tags and policies

How to do it.

How it works…

There's more…

Understanding default tags

See also

Applying retention policies to mailboxes

How to do it...

How it works...

There's more...

See also

Placing mailboxes on retention hold

How to do it...

How it works...

There's more...

See also

Performing a discovery search

How to do it...

How it works...

There's more...

See also

Placing mailboxes on litigation hold

How to do it...

How it works...

There's more...

See also

Enabling mailbox audit logging

How to do it...

How it works...

There's more...

See also

Generating mailbox audit log reports

How to do it...

How it works...

There's more...

See also

Configuring Administrator Audit Logging

How to do it...

How it works...

There's more...

See also

Searching administrator audit logs

How to do it...

How it works...

There's more...

See also

12. Server Monitoring and Troubleshooting

Introduction

Performing some basic steps

Managing and monitoring services

How to do it...

How it works...

There's more...

See also

Verifying server connectivity

How to do it...

How it works...

Working with the event logs

How to do it...

How it works...

There's more...

Reporting on disk usage

How to do it...

How it works...

There's more...

See also

Checking CPU utilization

How to do it...

How it works...

There's more...

See also

Monitoring memory utilization

How to do it...

How it works...

There's more...

See also

Reporting on Exchange Server uptime

How to do it...

How it works...

There's more...

See also

Troubleshooting the Mailbox role

How to do it...

How it works...

See also

Troubleshooting the Client Access Server role

How to do it...

How it works...

There's more...

See also

Troubleshooting Transport servers

How to do it...

How it works...

See also

Verifying certificate health

How to do it...

How it works...

There's more...

See also

13. Scripting with the Exchange Web Services Managed API

Introduction

Performing some basic steps

Getting connected to EWS

How to do it...

How it works...

There's more...

Certificates matter

Sending e-mail messages with EWS

How to do it...

How it works...

There's more...

See also

Working with impersonation

Getting ready

How to do it...

How it works...

There's more...

Searching mailboxes

How to do it...

How it works...

There's more...

See also

Retrieving the headers of an e-mail message

How to do it...

How it works...

There's more...

See also

Deleting e-mail items from a mailbox

How to do it...

How it works...

There's more...

See also

Creating calendar items

How to do it...

How it works...

There's more...

See also

Exporting attachments from a mailbox

How to do it...

How it works...

There's more...

See also

A. Exchange Management Shell reference

Commonly-used shell variables

Commonly-used type accelerators

Scripts available in the $ExBin directory

Properties that can be used with the Filter parameter

Properties that can be used with the RecipientFilterparameter

B. Advanced Query Syntax

Using the word phrase search

Examples

Using a date range search

Examples

Using the message type search

Examples

Using the logical connector search

Examples

Index

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部