-
The following interactive PowerShell 3.0 script creates a new virtual machine. It utilizes the ‘Using’ scope modifier to pass local variables to remote machines with the invoke-command cmdlet. An existing .vhdx file is copied to a new location and renamed . Same file is used to create the virtual machine. The script assumes the VM…
-
Originally posted on Exchange Times: Microsoft has done away with dcpromo when it comes to Windows Server 2012. We’ve been so accustomed to using dcpromo that I actually struggled a bit to promote a 2012 server to a DC in one of my labs. This short video shows how to install the Active Directory Directory…
-
In part 2 of this topic, I will show how to configure the Switch Virtual Interfaces and IP Helper addresses on the Cisco 3750G EMI: L3Switch(config)#interface vlan 20 L3Switch(config-if)# ip address 10.0.2.1 255.255.255.0 (Configure IP Address on the vlan 20 interface) L3Switch(config)# exit It is not necessary to specify an IP Helper address for the…
-
The following poster was just released by Microsoft to help shed some light on the features Gen 2 Virtual machines :
-
I was doing some quick research recently with a topic totally unrelated to Exchange. Due to some resource constraints, I decided to install and setup an instance of Spiceworks (Helpdesk and Asset Management tool) on my Lab Exchange 2010 SP2 Server. Then began my problem. As soon as I was done, it didn’t take long…
-
As a follow up to the last post, I decided to further restrict the Support Staff users’ access to the available Custom ‘Address Book Management’ Role cmdlets. The following commands enabled me accomplish this objective: 1) C:\>Get-ManagementRoleEntry -Identity “Address Book Management\*” | ?{$_.Name -ne “Get-User”} | Remove-ManagementRoleEntry ( This command removes all available cmdlets from…
-
I recently received a request for specific users to be able to modify users and contact information for the HR department. I immediately thought of Exchange Role Based Access Control. Personally, I think this is one of the best features of Microsoft Exchange 2010, but that’s another story. In short, RBAC ensures that end-users only…
-
In this series, I would like to post my practical experience in setting up multiple VLANs/subnets and using a Layer 3 switch to route traffic across them. The post will also include my configuration steps enabling the use of a Microsoft-based DHCP Server. This is by no means a treatise on these subjects. A number…
-
In this post, I am going to talk about my experience doing an Authoritative Restore of a deleted Active Directory user object. The steps were completed by restoring from a previous System State backup and using the ntds utility. I started by deleting a test AD user: Ryan Smith from the Accounting_OU Organizational Unit in…
-
I recently came by a situation where confidential email was mistakenly sent to the wrong users. I was asked to find a way to delete the email. I knew I could use the Search-mailbox cmdlet since this is an Exchange 2010 deployment, but totally forgot I had to configure a Role assignment before this could…