Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Microsoft Exchange Server 2013 PowerShell Cookbook
Table of Contents
Microsoft Exchange Server 2013 PowerShell Cookbook
Credits
About the Authors
Acknowledgement
About the Reviewers
www.PacktPub.com
Support files, eBooks, discount offers and more
Why Subscribe?
Free Access for Packt account holders
Instant Updates on New Packt Books
Preface
What this book covers
What you need for this book
Who this book is for
Conventions
Reader feedback
Customer support
Downloading the example code
Errata
Piracy
Questions
1. PowerShell Key Concepts
Introduction
Performing some basic steps
Using the help system
How to do it...
How it works...
There's more...
Getting help with cmdlets and functions
See also
Understanding command syntax and parameters
How to do it...
How it works...
There's more...
See also
Understanding the pipeline
How to do it...
How it works...
There's more...
See also
Working with variables and objects
How to do it...
How it works...
There's more...
Variable expansion in strings
Strongly typed variables
Formatting output
How to do it...
How it works...
There's more…
See also
Working with arrays and hash tables
How to do it...
How it works...
There's more…
See also
Looping through items
How to do it...
How it works...
There's more…
See also
Creating and running scripts
How to do it...
How it works...
There's more…
Execution policy
See also
Using flow control statements
How to do it...
How it works...
There's more...
See also
Creating custom objects
How to do it...
How it works...
There's more...
Watch out for concurrent pipeline errors
See also
Creating PowerShell functions
How to do it...
How it works...
There's more…
Taking it a step further
See also
Setting up a profile
How to do it...
How it works...
There's more…
See also
2. Exchange Management Shell Common Tasks
Introduction
Performing some basic steps
Manually configuring remote PowerShell connections
Getting ready
How to do it...
How it works...
There's more...
See also
Using explicit credentials with PowerShell cmdlets
How to do it...
How it works...
There's more...
Transferring files through remote shell connections
How to do it...
How it works...
There's more...
See also
Dealing with concurrent pipelines in remote PowerShell
How to do it...
How it works...
There's more...
See also
Managing domains or an entire forest using recipient scope
How to do it...
How it works...
There's more...
Exporting reports to text and CSV files
How to do it...
How it works...
There's more...
See also
Sending SMTP e-mails through PowerShell
How to do it...
How it works...
There's more...
Sending messages with attachments
Sending command output in the body of a message
See also
Scheduling scripts to run at a later time
How to do it...
How it works...
There's more...
See also
Logging shell sessions to a transcript
How to do it...
How it works...
There's more...
See also
Automating tasks with the scripting agent
Getting ready
How to do it...
How it works...
There's more...
Using multiple cmdlets with the OnComplete API
See also
Scripting an Exchange server installation
Getting ready
How to do it...
How it works...
There's more...
See also
3. Managing Recipients
Introduction
Performing some basic steps
Adding, modifying, and removing mailboxes
How to do it...
How it works...
There's more...
Setting active directory attributes
See also
Working with contacts
How to do it...
How it works...
There's more...
See also
Managing distribution groups
How to do it...
How it works...
There's more...
See also
Managing resource mailboxes
How to do it...
How it works...
There's more...
Converting mailboxes
See also
Creating recipients in bulk using a CSV file
Getting ready
How to do it...
How it works...
There's more...
Taking it a step further
See also
Working with recipient filters
How to do it...
How it works...
There's more…
Understanding variables in filters
See also
Adding and removing recipient e-mail addresses
How to do it...
How it works...
There's more...
See also
Hiding recipients from address lists
How to do it...
How it works...
There's more...
See also
Configuring recipient moderation
How to do it...
How it works...
There's more...
See also
Configuring message delivery restrictions
How to do it...
How it works...
There's more...
See also
Managing automatic replies and out of office settings for a user
How to do it...
How it works...
There's more...
Adding, modifying, and removing server-side inbox rules
How to do it...
How it works...
There's more...
See also
Managing mailbox folder permissions
How to do it...
How it works...
There's more...
See also
Importing user photos into Active Directory
Getting ready
How to do it...
How it works...
There's more…
Taking it a step further
See also
4. Managing Mailboxes
Introduction
Performing some basic steps
Reporting on the mailbox size
How to do it...
How it works...
There's more...
See also
Working with move requests and performing mailbox moves
How to do it...
How it works...
There's more...
Removing the move requests
Moving the archive mailboxes
Moving the mailboxes in batches
Moving mailboxes with corrupt items
See also
Mailbox move e-mail notification
How to do it...
How it works...
There's more…
See also
Importing and exporting mailboxes
How to do it...
How it works...
There's more…
Importing data into mailboxes
Taking it a step further
See also
Deleting messages from mailboxes
How to do it...
How it works...
There's more…
Running reports before deleting data
Deleting messages in bulk
See also
Managing disconnected mailboxes
How to do it...
How it works...
There's more…
See also
Generating mailbox folder reports
How to do it...
How it works...
There's more…
Taking it a step further
See also
Reporting on mailbox creation time
How to do it...
How it works...
There's more...
See also
Checking mailbox logon statistics
How to do it...
How it works...
There's more...
See also
Setting storage quotas for mailboxes
How to do it...
How it works...
There's more...
Finding inactive mailboxes
How to do it...
How it works...
There's more...
Detecting and fixing corrupt mailboxes
How to do it...
How it works...
There's more...
See also
Restoring deleted items from mailboxes
How to do it...
How it works...
There's more...
See also
Managing public folder mailboxes
How to do it...
How it works...
There's more…
See also
Reporting on public folder statistics
How to do it...
How it works...
There's more…
See also
Managing user access to public folders
How to do it...
How it works...
There's more…
5. Distribution Groups and Address Lists
Introduction
Performing some basic steps
Reporting on distribution group membership
How to do it...
How it works...
There's more...
See also
Adding members to a distribution group from an external file
How to do it...
How it works...
There's more...
See also
Previewing dynamic distribution group membership
How to do it...
How it works...
There's more...
See also
Excluding hidden recipients from a dynamic distribution group
How to do it...
How it works...
There's more...
See also
Converting and upgrading distribution groups
How to do it...
How it works...
There's more...
See also
Allowing managers to modify group membership
How to do it...
How it works...
There's more...
See also
Removing disabled user accounts from distribution groups
How to do it...
How it works...
There's more…
See also
Working with distribution group naming policies
How to do it...
How it works...
There's more...
See also
Working with distribution group membership approval
How to do it...
How it works...
There's more...
See also
Creating address lists
How to do it...
How it works...
There's more...
See also
Exporting address list membership to a CSV file
How to do it...
How it works...
There's more...
See also
Configuring hierarchical address books
How to do it...
How it works...
There's more...
See also
6. Mailbox Database Management
Introduction
Performing some basic steps
Managing the mailbox databases
How to do it...
How it works...
There's more…
Understanding automatic mailbox distribution
Taking it a step further
See also
Moving databases and logs to another location
How to do it...
How it works...
There's more…
Manually moving databases
Taking it a step further
See also
Configuring the mailbox database limits
How to do it...
How it works...
There's more…
Taking it a step further
See also
Reporting on mailbox database size
How to do it...
How it works...
There's more...
See also
Finding the total number of mailboxes in a database
How to do it...
How it works...
There's more...
See also
Determining the average mailbox size per database
How to do it...
How it works...
There's more...
See also
Reporting on database backup status
How to do it...
How it works...
There's more...
See also
Restoring data from a recovery database
How to do it...
How it works...
There's more…
Understanding target mailbox identity
Learning about other useful parameters
Understanding mailbox restore request cmdlets
Taking it a step further
See also
7. Managing Client Access
Introduction
Performing some basic steps
Managing ActiveSync, OWA, POP3, and IMAP4 mailbox settings
How to do it...
How it works...
There's more...
See also
Setting internal and external CAS URLs
How to do it...
How it works...
There's more…
Command syntax for the remaining virtual directories
See also
Managing Outlook Anywhere settings
How to do it...
How it works...
There's more...
See also
Blocking Outlook clients from connecting to Exchange
How to do it...
How it works...
There's more…
Reporting on active OWA and RPC connections
How to do it...
How it works...
There's more...
See also
Controlling ActiveSync device access
How to do it...
How it works...
There's more...
See also
Reporting on ActiveSync devices
How to do it...
How it works...
There's more...
See also
8. Managing Transport Service
Introduction
Performing some basic steps
Managing connectors
How to do it...
How it works...
There's more…
See also
Configuring transport limits
How to do it...
How it works...
There's more…
See also
Allowing application servers to relay mail
How to do it...
How it works...
There's more…
See also
Managing transport rules and settings
How to do it...
How it works...
There's more…
Modifying transport rules
Enabling, disabling, and removing transport rules
Protecting data from leaving the organization
Creating a basic disclaimer
How to do it...
How it works...
See also
Working with custom DSN messages
How to do it...
How it works...
There's more…
Managing connectivity and protocol logs
How to do it...
How it works...
There's more…
Parsing logfiles
Searching message tracking logs
How to do it...
How it works...
There's more…
Taking it a step further
See also
Working with messages in transport queues
How to do it...
How it works...
There's more…
Searching anti-spam agent logs
How to do it...
How it works...
There's more…
See also
Implementing a header firewall
How to do it...
How it works...
There's more...
9. High Availability
Introduction
Performing some basic steps
Building a Windows NLB cluster for CAS servers
Getting ready
How to do it...
How it works...
There's more…
Taking it a step further
See also
Creating a Database Availability Group
How to do it...
How it works...
There's more…
See also
Adding mailbox servers to a Database Availability Group
How to do it...
How it works...
There's more...
See also
Configuring Database Availability Group network settings
How to do it...
How it works...
There's more…
Renaming and removing DAG networks
Adding mailbox copies to a Database Availability Group
How to do it...
How it works...
There's more…
See also
Activating mailbox database copies
How to do it...
How it works...
There's more…
See also
Working with lagged database copies
How to do it...
How it works...
There's more...
Reseeding a database copy
How to do it...
How it works...
There's more...
See also
Using the automatic reseed feature
How to do it...
How it works...
See also
Performing maintenance on Database Availability Group members
How to do it...
How it works...
There's more...
Reporting on database status, redundancy, and replication
How to do it...
How it works...
There's more…
Understanding switchover and failover metrics
Understanding replication metrics
See also
10. Exchange Security
Introduction
Performing some basic steps
Granting users full access permissions to mailboxes
How to do it...
How it works...
There's more...
See also
Finding users with full access to mailboxes
How to do it...
How it works...
There's more...
Sending e-mail messages as another user or group
How to do it...
How it works...
There's more...
Working with Role Based Access Control (RBAC)
How to do it...
How it works...
There's more...
RBAC is for end users too
See also
Creating a custom RBAC role for administrators
How to do it...
How it works...
There's more...
See also
Creating a custom RBAC role for end users
How to do it...
How it works...
There's more...
See also
Troubleshooting Role Based Access Control
How to do it...
How it works...
There's more...
See also
Generating a certificate request
How to do it...
How it works...
There's more...
See also
Installing certificates and enabling services
How to do it...
How it works...
There's more...
See also
Importing certificates on multiple exchange servers
How to do it...
How it works...
There's more...
See also
11. Compliance and Audit Logging
Introduction
Performing some basic steps
Managing archive mailboxes
How to do it...
How it works...
There's more...
See also
Configuring archive mailbox quotas
How to do it...
How it works...
There's more...
See also
Creating retention tags and policies
How to do it...
How it works…
There's more…
Understanding default tags
See also
Applying retention policies to mailboxes
How to do it...
How it works...
There's more...
See also
Placing mailboxes on retention hold
How to do it...
How it works...
There's more...
See also
Placing mailboxes on in-place hold
How to do it...
How it works...
There's more...
See also
Performing a discovery search
How to do it...
How it works...
There's more...
See also
Enabling mailbox audit logging
How to do it...
How it works...
There's more...
See also
Generating mailbox audit log reports
How to do it...
How it works...
There's more...
See also
Configuring Administrator Audit Logging
How to do it...
How it works...
There's more...
See also
Searching the administrator audit logs
How to do it...
How it works...
There's more...
See also
12. Server Monitoring and Troubleshooting
Introduction
Performing some basic steps
Managing and monitoring services
How to do it...
How it works...
There's more...
See also
Verifying server connectivity
How to do it...
How it works...
Working with event logs
How to do it...
How it works...
There's more...
Reporting on disk usage
How to do it...
How it works...
There's more...
See also
Checking CPU utilization
How to do it...
How it works...
There's more...
See also
Monitoring memory utilization
How to do it...
How it works...
There's more...
See also
Reporting on Exchange Server uptime
How to do it...
How it works...
There's more...
See also
Troubleshooting the Mailbox role
How to do it...
How it works...
See also
Troubleshooting the Client Access Server role
How to do it...
How it works...
See also
Troubleshooting the Transport service
How to do it...
How it works...
See also
Verifying certificate health
How to do it...
How it works...
There's more...
See also
13. Scripting with the Exchange Web Services Managed API
Introduction
Performing some basic steps
Getting connected to EWS
How to do it...
How it works...
There's more...
Certificates matter
Sending e-mail messages with EWS
How to do it...
How it works...
There's more...
See also
Working with impersonation
Getting ready
How to do it...
How it works...
There's more...
Searching mailboxes
How to do it...
How it works...
There's more...
See also
Retrieving the headers of an e-mail message
How to do it...
How it works...
There's more...
See also
Deleting e-mail items from a mailbox
How to do it...
How it works...
There's more...
See also
Creating calendar items
How to do it...
How it works...
There's more...
See also
Exporting attachments from a mailbox
How to do it...
How it works...
There's more...
See also
A. Common Shell Information
Exchange Management Shell reference
Commonly-used shell variables
Commonly-used type accelerators
Scripts available in the $Exscripts directory
Properties that can be used with the Filter parameter
Properties that can be used with the RecipientFilter parameter
B. Query Syntaxes
Advanced Query Syntax
Using the word phrase search
Examples
Using a date range search
Examples
Using the message type search
Examples
Using the logical connector search
Examples
Index
← Prev
Back
Next →
← Prev
Back
Next →