Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Overview of Windows PowerShell
Figure 1-1: A Setup error is generated if .NET Framework 2.0 is not present
Figure 1-2: Using help to display information one page at a time
Chapter 2: Using Windows PowerShell Cmdlets
Figure 2-1: The VBScript wshShell object contributes many easy-to-use methods and properties for the network administrator
Figure 2-2: Tab Completion enumerates methods provided by the object
Figure 2-3: Ensure that Windows PowerShell can read the profile by saving it with the All Files option, under Save As Type, in Notepad
Chapter 3: Leveraging PowerShell Providers
Figure 3-1: Using Set-Location without : results in an error
Figure 3-2: Highlight items to copy using the mouse
Figure 3-3: Enable Quick Edit Mode to enable Clipboard Support
Figure 3-4: Certmgr.msc can be used to examine certificate properties
Figure 3-5: Use set in a CMD prompt to see environment variables
Figure 3-6: A Regedit.exe similar view of HKEY_LOCAL_MACHINE\SOFTWARE
Chapter 4: Using PowerShell Scripts
Figure 4-1: Error generated when attempting to run a Windows PowerShell script when execution policy not set
Figure 4-2: Use the -noexit argument for the PowerShell.exe program to keep the console open after a script run
Chapter 5: Using WMI
Figure 5-1: WMI namespaces on Windows XP
Figure 5-2: The WMIProvidersXP.xls spreadsheet lists classes supported by provider name
Chapter 7: Working with Active Directory
Figure 7-1: Exploring the hierarchy of a forest to ensure the correct path for ADSI
Figure 7-2: Using the string attribute editor in ADSI Edit to quickly verify the distinguished name of a potential target for ADSI scripting
Figure 7-3: ADSI attribute names of the General tab of Active Directory Users and Computers
Figure 7-4: Every item on the Address tab in Active Directory Users and Computers can be filled in via ADSI and Windows PowerShell
Figure 7-5: ADSI attributes used to fill out the profile page in Active Directory
Figure 7-6: Telephone page attributes found in Active Directory
Figure 7-7: Organization attributes in Active Directory
Chapter 8: Leveraging the Power of ADO
Figure 8-1: Heavily queried attributes often benefit from indexing
Chapter 9: Managing Exchange 2007
Figure 9-1: You cannot convert a string into a secure string
Figure 9-2: The New-Mailbox cmdlet prompts for the password
Previous page
Table of content
Next page
MicrosoftВ® Windows PowerShell(TM) Step By Step (Step By Step (Microsoft))
ISBN: 0735623953
EAN: 2147483647
Year: 2007
Pages: 128
Authors:
Ed Wilson
BUY ON AMAZON
Java I/O
File Viewer, Part 1
Server Sockets
Byte Arrays
Pack200
Character Sets
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Why Project Risk Management?
Quantifying and Analyzing Activity Risks
Managing Activity Risks
Quantifying and Analyzing Project Risk
Conclusion
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Unauthorized Activity II
IDS and IPS Architecture
IDS and IPS Internals
Internet Security Systems RealSecure
Laws, Standards, and Organizations
Ruby Cookbook (Cookbooks (OReilly))
Choosing Randomly from a Weighted List
Checking Your Access to a File
Comparing Two Files
Undefining a Method
Transforming Plain Text to HTML
File System Forensic Analysis
Introduction
Bibliography
Directory Entries
MFT Entry Attribute Concepts
Indexes
What is Lean Six Sigma
The Four Keys to Lean Six Sigma
Key #2: Improve Your Processes
Key #4: Base Decisions on Data and Facts
Making Improvements That Last: An Illustrated Guide to DMAIC and the Lean Six Sigma Toolkit
The Experience of Making Improvements: What Its Like to Work on Lean Six Sigma Projects
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies