Monthly Archives: September 2013

How to Customize Exchange 2010 RBAC Roles for Delegating User/Contact Management Part 2.

As a follow up to the last post, I decided to further restrict the Support Staff users’ access to the available Custom ‘Address Book Management’ Role cmdlets. The following commands enabled me accomplish this objective: 1) C:\>Get-ManagementRoleEntry -Identity “Address Book … Continue reading

Posted in Exchange 2010 SP2, Exchange Cmdlets, Exchange Management Roles, Exchange Management Shell, Microsoft Exchange, PowerShell, RBAC, Role Based Access Control | Tagged , , , , , , , , , | Leave a comment

How to Customize Exchange 2010 RBAC Roles for Delegating User/Contact Management Part 1.

I recently received a request for specific users to be able to modify users and contact information for the HR department. I immediately thought of Exchange Role Based Access Control. Personally, I think this is one of the best features … Continue reading

Posted in Exchange 2010 SP2, Exchange Cmdlets, Exchange Management Roles, Exchange Management Shell, RBAC, Role Based Access Control | Tagged , , | Leave a comment

Configuring InterVLAN Routing on a Layer 3 Switch and providing DHCP to multiple subnets Part 1

In this series, I would like to post my practical experience in setting up multiple VLANs/subnets and using a Layer 3 switch to route traffic across them. The post will also include my configuration steps enabling the use of a … Continue reading

Posted in Cisco, DHCP, Helper Address, IP, Router, svi, Switch, Switch Virtual Interface, vlan | Tagged , , , , | 3 Comments

How to Restore an Active Directory Object from Backup.

In this post, I am going to talk about my experience doing an Authoritative Restore of a deleted Active Directory user object. The steps were completed by restoring from a previous System State backup and using the ntds utility. I … Continue reading

Posted in Active Directory, BCDEdit, DSRM, NTDSUtil, PowerShell, PowerShell 3.0, Windows Server 2008 R2, Windows Server 2008 R2 Backup | Tagged , , , , | Leave a comment

How to remove/delete email sent to wrong user(s) using Search-mailbox cmdlet

I recently came by a situation where confidential email was mistakenly sent to the wrong users. I was asked to find a way to delete the email. I knew I could use the Search-mailbox cmdlet since this is an Exchange … Continue reading

Posted in Exchange 2010 SP2, Exchange Cmdlets, Exchange Management Shell, PowerShell | Leave a comment

Configuring Windows Server 2012 as an iSCSI Target SAN in a Two Host Failover Cluster Part 5

As it turns out, I already have two Virtual machines running on one of the cluster nodes. I set these up before the cluster creation. The VMs are currently not cluster roles/resources. I will go ahead and make one of … Continue reading

Posted in Cluster Shared Volume, CSV, Failover Cluster, Hyper-v, ISCSI, ISCSI Initiator, ISCSI Target, Microsoft Hyper-v, PowerShell, PowerShell 3.0, Quorum, Virtual Machines, Witness | Tagged , , , , , | Leave a comment

Configuring Windows Server 2012 as an iSCSI Target SAN in a Two Host Failover Cluster Part 4

Here we go over my steps for the actual cluster creation, cluster and node validation, quorum setup and cluster shared volume configuration.We have by running a cluster validation on each node. This can be achieved with the following cmdlets: Test-Cluster … Continue reading

Posted in Cluster Shared Volume, CSV, Failover Cluster, Hyper-v, ISCSI, ISCSI Initiator, ISCSI Target, Microsoft Hyper-v, PowerShell, PowerShell 3.0, Quorum, Windows Server 2012, Witness | Leave a comment