Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Overview of Windows PowerShell
Figure 1-1: A Setup error is generated if .NET Framework 2.0 is not present
Figure 1-2: Using help to display information one page at a time
Chapter 2: Using Windows PowerShell Cmdlets
Figure 2-1: The VBScript wshShell object contributes many easy-to-use methods and properties for the network administrator
Figure 2-2: Tab Completion enumerates methods provided by the object
Figure 2-3: Ensure that Windows PowerShell can read the profile by saving it with the All Files option, under Save As Type, in Notepad
Chapter 3: Leveraging PowerShell Providers
Figure 3-1: Using Set-Location without : results in an error
Figure 3-2: Highlight items to copy using the mouse
Figure 3-3: Enable Quick Edit Mode to enable Clipboard Support
Figure 3-4: Certmgr.msc can be used to examine certificate properties
Figure 3-5: Use set in a CMD prompt to see environment variables
Figure 3-6: A Regedit.exe similar view of HKEY_LOCAL_MACHINE\SOFTWARE
Chapter 4: Using PowerShell Scripts
Figure 4-1: Error generated when attempting to run a Windows PowerShell script when execution policy not set
Figure 4-2: Use the -noexit argument for the PowerShell.exe program to keep the console open after a script run
Chapter 5: Using WMI
Figure 5-1: WMI namespaces on Windows XP
Figure 5-2: The WMIProvidersXP.xls spreadsheet lists classes supported by provider name
Chapter 7: Working with Active Directory
Figure 7-1: Exploring the hierarchy of a forest to ensure the correct path for ADSI
Figure 7-2: Using the string attribute editor in ADSI Edit to quickly verify the distinguished name of a potential target for ADSI scripting
Figure 7-3: ADSI attribute names of the General tab of Active Directory Users and Computers
Figure 7-4: Every item on the Address tab in Active Directory Users and Computers can be filled in via ADSI and Windows PowerShell
Figure 7-5: ADSI attributes used to fill out the profile page in Active Directory
Figure 7-6: Telephone page attributes found in Active Directory
Figure 7-7: Organization attributes in Active Directory
Chapter 8: Leveraging the Power of ADO
Figure 8-1: Heavily queried attributes often benefit from indexing
Chapter 9: Managing Exchange 2007
Figure 9-1: You cannot convert a string into a secure string
Figure 9-2: The New-Mailbox cmdlet prompts for the password
Previous page
Table of content
Next page
MicrosoftВ® Windows PowerShell(TM) Step By Step (Step By Step (Microsoft))
ISBN: 0735623953
EAN: 2147483647
Year: 2007
Pages: 128
Authors:
Ed Wilson
BUY ON AMAZON
Qshell for iSeries
Introduction to Qshell
Grep
Writing Programs for Qshell
The Perl Utility
C and C++ Development Tools
CISSP Exam Cram 2
Auditing Your Security Infrastructure
Computer System Architecture
WANS and Their Components
Exam Prep Questions
Answers to Practice Exam Questions
WebLogic: The Definitive Guide
Configuring a Simple Web Cluster
Managing WebLogic JTA
Clustering
An Overview of Clustering
WebLogics SNMP Infrastructure
MySQL Clustering
Adding Tables
Using Multiple Management Nodes
Running MySQL in a Chrooted Environment
Benchmarking
Common Setups
An Introduction to Design Patterns in C++ with Qt 4
Layout of Widgets
Table Models
Database Models
Review Questions
Resource Sharing
Quantitative Methods in Project Management
Organizing and Estimating the Work
Making Quantitative Decisions
Risk-Adjusted Financial Management
Quantitative Time Management
Quantitative Methods in Project Contracts
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies