Sharpen your Exchange PowerShell scripting skills

Few Exchange admins enjoy typing out complex Exchange Management Shell commands. Manually entering long strings can lead to mistakes as well as potentially destructive administrative

    Requires Free Membership to View

actions. PowerShell can help diminish these risks.

PowerShell scripting can be simple once you know the basics. For Exchange 2010 admins who are beyond the fundamentals, this tutorial illustrates how to apply execution policies and use them to control whether or not certain PowerShell scripts run. The final lesson offers best practices for protecting Exchange Server from a common problem -- buggy scripts.

PowerShell 101:
PowerShell scripting basics  

PowerShell 201:
Setting PowerShell execution policies in Exchange 2010

PowerShell 301:
Preventing buggy Exchange PowerShell scripts


Brien M. Posey, MCSE, is a seven-time recipient of Microsoft's Most Valuable Professional (MVP) award for his work with Exchange Server, Windows Server, Internet Information Services (IIS), and File Systems and Storage. Brien has served as CIO for a nationwide chain of hospitals and was once responsible for the Department of Information Management at Fort Knox. As a freelance technical writer, Brien has written for Microsoft, TechTarget, CNET, ZDNet, MSD2D, Relevant Technologies and other technology companies. You can visit Brien's personal website at www.brienposey.com.

This was first published in January 2011

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: