Introduction |
|
xvi | |
|
Part I An Overview of Windows PowerShell 2.0 for Exchange 2010 |
|
|
|
Chapter 1 New Features and the Exchange Management Shell |
|
|
1 | (10) |
|
What's New in PowerShell 2.0 |
|
|
1 | (3) |
|
|
4 | (2) |
|
The Exchange Management Shell |
|
|
6 | (5) |
|
Chapter 2 Basic Techniques |
|
|
11 | (26) |
|
|
11 | (1) |
|
Understanding the Basic Syntax of a cmdlet |
|
|
12 | (19) |
|
Basic Syntax: Some Common Cmdlets Using the Get Verb |
|
|
16 | (11) |
|
Basic Syntax: Some Common Parameters |
|
|
27 | (4) |
|
|
31 | (1) |
|
Finding Help for the Right Cmdlet |
|
|
32 | (2) |
|
What's Included in Each Version of Help |
|
|
33 | (1) |
|
Using the Tab Completion Feature |
|
|
34 | (3) |
|
Part II Achieving a Comfort Level with PowerShell |
|
|
|
Chapter 3 Advanced Techniques |
|
|
37 | (14) |
|
|
37 | (4) |
|
|
41 | (1) |
|
Creating and Running Scripts |
|
|
42 | (6) |
|
Registry Modifications with PowerShell |
|
|
48 | (1) |
|
|
48 | (3) |
|
Chapter 4 Customizing the PowerShell Environment |
|
|
51 | (14) |
|
Creating and Using PowerShell Profiles |
|
|
51 | (5) |
|
|
56 | (1) |
|
Working with User-Defined Aliases |
|
|
57 | (2) |
|
|
59 | (1) |
|
|
60 | (5) |
|
Part III PowerShell and the Exchange 2010 Deployment Process |
|
|
|
Chapter 5 Standard Deployments |
|
|
65 | (18) |
|
Deploying Prerequisites for All Versions of Exchange Server 2010 on Windows Server 2008 Operating Systems |
|
|
65 | (1) |
|
Deploying Prerequisites for Exchange Server 2010 RTM (Release-to-Manufacturing) on Windows Server 2008 SP2 |
|
|
66 | (1) |
|
Deploying Prerequisites for Exchange Server 2010 RTM on Windows Server 2008 SP2 |
|
|
67 | (2) |
|
Deploying Prerequisites for Exchange Server 2010 RTM on Windows Server 2008 R2 |
|
|
69 | (3) |
|
Deploying Prerequisites for Exchange Server 2010 SP1 on Windows Server 2008 R2 |
|
|
72 | (2) |
|
Setup Options for Exchange Server 2010 RTM |
|
|
74 | (4) |
|
Upgrading from Exchange Server 2010 RTM to SP1 |
|
|
78 | (2) |
|
Using the Exchange 2010 Deployment Assistant |
|
|
80 | (3) |
|
Chapter 6 Disaster Recovery Deployments |
|
|
83 | (10) |
|
Recovering from a Single Role Failure |
|
|
83 | (2) |
|
Recovering from a Multiple-Role Failure on the Same Server |
|
|
85 | (4) |
|
Recovering from a Database Availability Group (DAG) Member Server Failure |
|
|
89 | (4) |
|
Part IV PowerShell and Recipient Objects |
|
|
|
Chapter 7 Working with Recipient Objects |
|
|
93 | (28) |
|
Identifying the Exchange 2010 Recipient Types |
|
|
93 | (8) |
|
Creating and Managing a User Mailbox |
|
|
101 | (3) |
|
Creating and Managing a Mail-Enabled User |
|
|
104 | (2) |
|
Creating and Managing a Mail-Enabled Contact |
|
|
106 | (2) |
|
Creating and Managing Resource Mailboxes |
|
|
108 | (1) |
|
Working with Distribution Groups |
|
|
109 | (3) |
|
Converting Recipient Types |
|
|
112 | (1) |
|
Creating and Managing Email Address Policies |
|
|
113 | (3) |
|
Creating and Managing Address Lists |
|
|
116 | (5) |
|
Chapter 8 Bulk Management of Recipients |
|
|
121 | (14) |
|
Creating Multiple Recipients |
|
|
121 | (8) |
|
Modifying Multiple Recipients |
|
|
129 | (4) |
|
Reconnecting Multiple Disconnected Mailboxes |
|
|
133 | (2) |
|
Part V PowerShell and the Transport Roles Message Routing |
|
|
|
Chapter 9 The Hub Transport Role |
|
|
135 | (22) |
|
Configuring Accepted and Remote Domains |
|
|
135 | (6) |
|
|
136 | (1) |
|
|
136 | (1) |
|
|
137 | (1) |
|
|
137 | (1) |
|
|
138 | (1) |
|
|
138 | (1) |
|
|
138 | (3) |
|
Managing Email Address Policies |
|
|
141 | (3) |
|
Working with SMTP Connectors and Other Transport Objects |
|
|
144 | (8) |
|
|
144 | (4) |
|
|
148 | (3) |
|
|
151 | (1) |
|
Working with Routing Group Connectors |
|
|
152 | (2) |
|
Managing Transport Queues |
|
|
154 | (3) |
|
Chapter 10 The Edge Transport Role |
|
|
157 | (12) |
|
Creating an Edge Subscription |
|
|
157 | (2) |
|
|
159 | (2) |
|
Cloning an Edge Transport |
|
|
161 | (4) |
|
|
165 | (4) |
|
Chapter 11 Configuring Rules and Agents on Transport Servers |
|
|
169 | (10) |
|
Transport Rules and Transport Agents |
|
|
169 | (5) |
|
|
169 | (4) |
|
|
173 | (1) |
|
Journaling Rules and Journaling Agents |
|
|
174 | (3) |
|
|
174 | (2) |
|
|
176 | (1) |
|
|
177 | (2) |
|
Part VI PowerShell and the Client Access Server Role |
|
|
|
|
179 | (8) |
|
Configuring Outlook Access |
|
|
179 | (1) |
|
Enabling and Configuring Outlook Anywhere Access |
|
|
180 | (1) |
|
Enabling and Configuring OWA Access |
|
|
181 | (1) |
|
Configuring POP3 and IMAP4 |
|
|
182 | (1) |
|
Configuring the Autodiscover Service |
|
|
183 | (1) |
|
Configuring the Offline Address Book (OAB) |
|
|
184 | (3) |
|
Chapter 13 Working with Certificates |
|
|
187 | (6) |
|
|
187 | (1) |
|
Generating a Certificate Request |
|
|
187 | (4) |
|
Importing the Certificate |
|
|
191 | (1) |
|
|
192 | (1) |
|
Part VII PowerShell and the Mailbox Role |
|
|
|
Chapter 14 Mailbox Servers and Databases |
|
|
193 | (10) |
|
Configuring the Properties of a Mailbox Server |
|
|
193 | (1) |
|
Creating and Mounting a New Database |
|
|
194 | (2) |
|
Managing an Existing Database |
|
|
196 | (5) |
|
Removing an Existing Database |
|
|
201 | (2) |
|
Chapter 15 Working with Mailboxes |
|
|
203 | (10) |
|
|
203 | (4) |
|
|
207 | (1) |
|
|
208 | (3) |
|
Running the Clean-MailboxDatabase Cmdlet |
|
|
211 | (2) |
|
Chapter 16 Using the Recovery Database (RDB) |
|
|
213 | (6) |
|
Creating the Recovery Database (RDB) |
|
|
213 | (3) |
|
Restoring a Database to the RDB |
|
|
216 | (2) |
|
|
218 | (1) |
|
Part VIII PowerShell and the Unified Messaging Role |
|
|
|
Chapter 17 Working with Unified Messaging (UM) Role Objects |
|
|
219 | (10) |
|
Configuring the Properties of a UM Server |
|
|
219 | (1) |
|
Creating and Managing Dial Plans |
|
|
220 | (3) |
|
Creating and Managing UM IP Gateways |
|
|
223 | (1) |
|
Creating and Managing Hunt Groups |
|
|
224 | (1) |
|
Creating and Managing UM Mailbox Policies |
|
|
225 | (1) |
|
Monitoring and Troubleshooting a UM Server |
|
|
226 | (3) |
|
Chapter 18 Managing Unified Messaging (UM) Users |
|
|
229 | (10) |
|
Managing the UM Auto Attendant |
|
|
229 | (5) |
|
Working with Call Answering Rules |
|
|
234 | (1) |
|
Exporting UM Call Data Records |
|
|
234 | (1) |
|
Working with UM-Enabled Mailboxes |
|
|
235 | (4) |
|
Part IX PowerShell and Message Routing |
|
|
|
Chapter 19 Exchange Server 2010 Message Routing |
|
|
239 | (10) |
|
Using Default Message Routing |
|
|
239 | (2) |
|
|
241 | (1) |
|
Using Exchange-Specific Costs on Site Links |
|
|
242 | (4) |
|
Tracking Messages with PowerShell |
|
|
246 | (3) |
|
Chapter 20 Integrating Exchange Server 2010 into an Existing Exchange Server 2003 Environment |
|
|
249 | (6) |
|
Configuring Routing with Exchange Server 2003 |
|
|
249 | (4) |
|
Suppressing Link State Updates On Exchange 2003 Bridgehead Servers |
|
|
253 | (2) |
|
Part X PowerShell and High Availability in Exchange 2010 |
|
|
|
Chapter 21 Database Availability Groups (DAGs) |
|
|
255 | (14) |
|
Creating and Configuring a DAG |
|
|
255 | (5) |
|
Adding or Removing a DAG Member |
|
|
260 | (3) |
|
Recovering a Failed DAG Member |
|
|
263 | (2) |
|
Creating and Configuring a DAG Network |
|
|
265 | (3) |
|
|
268 | (1) |
|
Chapter 22 Mailbox Database Copies |
|
|
269 | (8) |
|
Adding and Configuring a Mailbox Database Copy |
|
|
269 | (3) |
|
Moving the Active Mailbox Database Copy to a New Location |
|
|
272 | (2) |
|
Suspending or Resuming a Mailbox Database Copy |
|
|
274 | (2) |
|
Updating a Mailbox Database Copy |
|
|
276 | (1) |
|
Removing a Copy of a Mailbox Database |
|
|
276 | (1) |
|
Chapter 23 Using DAG to Mitigate Failures |
|
|
277 | (12) |
|
Activating a Mailbox Database Copy on Another DAG Member |
|
|
277 | (2) |
|
Activating a Lagged Mailbox Database Copy on Another DAG Member |
|
|
279 | (3) |
|
Switching Over to Another DAG Member |
|
|
282 | (1) |
|
Switching Over to Another Datacenter |
|
|
283 | (2) |
|
Enabling Datacenter Activation Coordination (DAC) Mode |
|
|
285 | (4) |
|
Chapter 24 Monitoring Highly Available Databases |
|
|
289 | (8) |
|
Monitoring Using the Exchange Management Console |
|
|
289 | (1) |
|
Monitoring Using PowerShell Cmdlets |
|
|
290 | (1) |
|
Monitoring Using Event Viewer |
|
|
291 | (2) |
|
Monitoring Using PowerShell Scripts |
|
|
293 | (4) |
|
Part XI PowerShell and Public Folders |
|
|
|
Chapter 25 Public Folder Database Management |
|
|
297 | (6) |
|
Installing Public Folders |
|
|
297 | (1) |
|
Creating a Public Folder Database |
|
|
298 | (1) |
|
Configuring a Public Folder Database |
|
|
299 | (2) |
|
Removing a Public Folder Database |
|
|
301 | (2) |
|
Chapter 26 Managing Public Folders |
|
|
303 | (6) |
|
Assigning a Default Public Folder Database to a Mailbox Database |
|
|
303 | (2) |
|
Creating and Managing Public Folders |
|
|
305 | (2) |
|
Replicating Public Folders |
|
|
307 | (1) |
|
|
308 | (1) |
|
Chapter 27 Public Folder Permissions |
|
|
309 | (6) |
|
Adding Administrative Permissions to the Folder Structure |
|
|
309 | (3) |
|
Controlling Top-level Public Folders |
|
|
312 | (1) |
|
Setting Client Permissions to Public Folder Content |
|
|
312 | (3) |
|
Part XII Troubleshoot Exchange Server 2010 Using PowerShell |
|
|
|
Chapter 28 Troubleshooting with the Test Cmdlets |
|
|
315 | (10) |
|
Using Test Cmdlets for All Roles |
|
|
315 | (2) |
|
Using Test Cmdlets for the Mailbox Role |
|
|
317 | (1) |
|
Using Test Cmdlets for the Transport Roles |
|
|
318 | (2) |
|
Using Test Cmdlets for the Client Access Server Role |
|
|
320 | (1) |
|
Using Test Cmdlets for the Unified Messaging Role |
|
|
321 | (1) |
|
Using Test Cmdlets for Client Connectivity |
|
|
321 | (2) |
|
Using Helpful Non-Exchange Test Cmdlets |
|
|
323 | (2) |
|
Chapter 29 Event Logging with PowerShell |
|
|
325 | (6) |
|
Retrieving Events with Get-EventLog |
|
|
325 | (3) |
|
Setting Diagnostic Event Log Levels |
|
|
328 | (3) |
|
Part XIII PowerShell and Automating Exchange Server 2010 Administration |
|
|
|
Chapter 30 Using and Finding Scripts to Automate |
|
|
331 | (8) |
|
Using Scripts to Automate Tasks in PowerShell |
|
|
331 | (4) |
|
Finding Scripts to Automate Tasks in PowerShell |
|
|
335 | (4) |
|
Part XIV Monitoring Role-Based Access Control (RBAC) Permissions, Mailbox Audit Logging, and Reporting with PowerShell in Exchange Server 2010 |
|
|
|
Chapter 31 Configuring Role-Based Access Control (RBAC) Permissions |
|
|
339 | (8) |
|
Creating and Managing a Management Role Group |
|
|
339 | (2) |
|
Adding Members to the Management Role Group |
|
|
341 | (2) |
|
Retrieving Information about Role Groups and Role Group Members |
|
|
343 | (2) |
|
Setting and Viewing Management Scopes |
|
|
345 | (2) |
|
Chapter 32 Using Mailbox Audit Logging to Monitor Exchange Server |
|
|
347 | (8) |
|
Enabling Mailbox Audit Logging |
|
|
347 | (2) |
|
Initiating Administrative Actions to Test Mailbox Audit Logging |
|
|
349 | (3) |
|
Initiating a Search of the Mailbox Audit Log |
|
|
352 | (3) |
|
Chapter 33 Reporting and Other Useful Cmdlets |
|
|
355 | (12) |
|
Obtaining Information about a Mailbox with Get-MailboxStatistics |
|
|
355 | (4) |
|
Retrieving Logon Information about Currently Active Sessions with Get-LogonStatistics |
|
|
359 | (2) |
|
Using Other Useful Cmdlets |
|
|
361 | (6) |
|
Appendix A Lab Environment Used for This Book |
|
|
367 | (6) |
|
The Platform on Which the Virtual Machines Ran During the Writing of This Book |
|
|
367 | (1) |
|
The Lab Environment Used in this Book |
|
|
368 | (1) |
|
Creating Test Users and Mailboxes for the Lab Environment |
|
|
369 | (3) |
|
|
372 | (1) |
|
Appendix B Create Your Own Journal Here |
|
|
373 | |