Monthly Archives: September 2013

How to Customize Exchange 2010 RBAC Roles for Delegating User/Contact Management Part 2.

As a follow up to the last post, I decided to further restrict the Support Staff users’ access to the available Custom ‘Address Book Management’ Role cmdlets. The following commands enabled me accomplish this objective: 1) C:\>Get-ManagementRoleEntry -Identity “Address Book … Continue reading

Posted in Exchange 2010 SP2, Exchange Cmdlets, Exchange Management Roles, Exchange Management Shell, Microsoft Exchange, PowerShell, RBAC, Role Based Access Control | Tagged , , , , , , , , , | Leave a comment

How to Customize Exchange 2010 RBAC Roles for Delegating User/Contact Management Part 1.

I recently received a request for specific users to be able to modify users and contact information for the HR department. I immediately thought of Exchange Role Based Access Control. Personally, I think this is one of the best features … Continue reading

Posted in Exchange 2010 SP2, Exchange Cmdlets, Exchange Management Roles, Exchange Management Shell, RBAC, Role Based Access Control | Tagged , , | Leave a comment

Configuring InterVLAN Routing on a Layer 3 Switch and providing DHCP to multiple subnets Part 1

In this series, I would like to post my practical experience in setting up multiple VLANs/subnets and using a Layer 3 switch to route traffic across them. The post will also include my configuration steps enabling the use of a … Continue reading

Posted in Cisco, DHCP, Helper Address, IP, Router, svi, Switch, Switch Virtual Interface, vlan | Tagged , , , , | 3 Comments

How to Restore an Active Directory Object from Backup.

In this post, I am going to talk about my experience doing an Authoritative Restore of a deleted Active Directory user object. The steps were completed by restoring from a previous System State backup and using the ntds utility. I … Continue reading

Posted in Active Directory, BCDEdit, DSRM, NTDSUtil, PowerShell, PowerShell 3.0, Windows Server 2008 R2, Windows Server 2008 R2 Backup | Tagged , , , , | Leave a comment

How to remove/delete email sent to wrong user(s) using Search-mailbox cmdlet

I recently came by a situation where confidential email was mistakenly sent to the wrong users. I was asked to find a way to delete the email. I knew I could use the Search-mailbox cmdlet since this is an Exchange … Continue reading

Posted in Exchange 2010 SP2, Exchange Cmdlets, Exchange Management Shell, PowerShell | Leave a comment

Configuring Windows Server 2012 as an iSCSI Target SAN in a Two Host Failover Cluster Part 5

As it turns out, I already have two Virtual machines running on one of the cluster nodes. I set these up before the cluster creation. The VMs are currently not cluster roles/resources. I will go ahead and make one of … Continue reading

Posted in Cluster Shared Volume, CSV, Failover Cluster, Hyper-v, ISCSI, ISCSI Initiator, ISCSI Target, Microsoft Hyper-v, PowerShell, PowerShell 3.0, Quorum, Virtual Machines, Witness | Tagged , , , , , | Leave a comment

Configuring Windows Server 2012 as an iSCSI Target SAN in a Two Host Failover Cluster Part 4

Here we go over my steps for the actual cluster creation, cluster and node validation, quorum setup and cluster shared volume configuration.We have by running a cluster validation on each node. This can be achieved with the following cmdlets: Test-Cluster … Continue reading

Posted in Cluster Shared Volume, CSV, Failover Cluster, Hyper-v, ISCSI, ISCSI Initiator, ISCSI Target, Microsoft Hyper-v, PowerShell, PowerShell 3.0, Quorum, Windows Server 2012, Witness | Leave a comment

Configuring Windows Server 2012 as an iSCSI Target SAN in a Two Host Failover Cluster Part 3

In the next part of the series, we will create a simple 1GB iSCSI virtual disk, assign it to the already configured target and verify the disk is visible to the iSCSI initiators. New-IscsiVirtualDisk -Description “Witness Disk” -Path g:\iscsivirtualdisks\Witness00.vhd -Size … Continue reading

Posted in Cluster Shared Volume, CSV, Failover Cluster, Hyper-v, ISCSI, ISCSI Initiator, ISCSI Target, Microsoft Hyper-v, PowerShell, PowerShell 3.0, Windows Server 2012 | Leave a comment

How to Configure ssh on a Cisco Switch.

Telnet is a widely used protocol for accessing and administering Cisco devices. But this protocol is not exactly secure and transmits data over a network in plain text. Ssh is a secure protocol and it’s best practice to secure your … Continue reading

Posted in Cisco, Router, ssh, Switch, Telnet | Leave a comment

Configuring Policy Based Routing on a Cisco 3750G EMI

So we recently restructured the Company network from a flat network to multiple Vlans. The need has arisen to route traffic for specific vlans through a different ISP for business reasons. This means routing traffic to a path different from … Continue reading

Posted in ASA, Cisco, Firewall, IOS, Router, Switch | Leave a comment