Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Overview of Windows PowerShell
Figure 1-1: A Setup error is generated if .NET Framework 2.0 is not present
Figure 1-2: Using help to display information one page at a time
Chapter 2: Using Windows PowerShell Cmdlets
Figure 2-1: The VBScript wshShell object contributes many easy-to-use methods and properties for the network administrator
Figure 2-2: Tab Completion enumerates methods provided by the object
Figure 2-3: Ensure that Windows PowerShell can read the profile by saving it with the All Files option, under Save As Type, in Notepad
Chapter 3: Leveraging PowerShell Providers
Figure 3-1: Using Set-Location without : results in an error
Figure 3-2: Highlight items to copy using the mouse
Figure 3-3: Enable Quick Edit Mode to enable Clipboard Support
Figure 3-4: Certmgr.msc can be used to examine certificate properties
Figure 3-5: Use set in a CMD prompt to see environment variables
Figure 3-6: A Regedit.exe similar view of HKEY_LOCAL_MACHINE\SOFTWARE
Chapter 4: Using PowerShell Scripts
Figure 4-1: Error generated when attempting to run a Windows PowerShell script when execution policy not set
Figure 4-2: Use the -noexit argument for the PowerShell.exe program to keep the console open after a script run
Chapter 5: Using WMI
Figure 5-1: WMI namespaces on Windows XP
Figure 5-2: The WMIProvidersXP.xls spreadsheet lists classes supported by provider name
Chapter 7: Working with Active Directory
Figure 7-1: Exploring the hierarchy of a forest to ensure the correct path for ADSI
Figure 7-2: Using the string attribute editor in ADSI Edit to quickly verify the distinguished name of a potential target for ADSI scripting
Figure 7-3: ADSI attribute names of the General tab of Active Directory Users and Computers
Figure 7-4: Every item on the Address tab in Active Directory Users and Computers can be filled in via ADSI and Windows PowerShell
Figure 7-5: ADSI attributes used to fill out the profile page in Active Directory
Figure 7-6: Telephone page attributes found in Active Directory
Figure 7-7: Organization attributes in Active Directory
Chapter 8: Leveraging the Power of ADO
Figure 8-1: Heavily queried attributes often benefit from indexing
Chapter 9: Managing Exchange 2007
Figure 9-1: You cannot convert a string into a secure string
Figure 9-2: The New-Mailbox cmdlet prompts for the password
Previous page
Table of content
Next page
MicrosoftВ® Windows PowerShell(TM) Step By Step (Step By Step (Microsoft))
ISBN: 0735623953
EAN: 2147483647
Year: 2007
Pages: 128
Authors:
Ed Wilson
BUY ON AMAZON
Absolute Beginner[ap]s Guide to Project Management
Next Step in the Schedule Development Process
Reasons for Estimating Woes
Best Practices
Proven Techniques
Ending a Project
WebLogic: The Definitive Guide
Session Persistence
Features of WebLogics CMP
Designing a Domain
An Overview of Clustering
Mapping Certificates to WebLogic Users
MySQL Clustering
Retrieving the Latest Snapshot from BitKeeper
Ensuring That MySQL Cluster Works
Performance
Benchmarking
Miscellaneous Commands
Twisted Network Programming Essentials
Downloading a Web Page
Downloading Mail from a POP3 Server
Listing Mailboxes on an IMAP Server
Downloading Messages from an IMAP Mailbox
Using SMTP as a User Interface
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Tools
Computers as Persuasive Media Simulation
Credibility and the World Wide Web
Increasing Persuasion through Mobility and Connectivity
Quantitative Methods in Project Management
Project Value: The Source of all Quantitative Measures
Introduction to Probability and Statistics for Projects
Making Quantitative Decisions
Risk-Adjusted Financial Management
Quantitative Time Management
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies