MicrosoftВ® Windows PowerShell(TM) Step By Step (Step By Step (Microsoft))
Chapter 1: Overview of Windows PowerShell
- Figure 1-1: A Setup error is generated if .NET Framework 2.0 is not present
- Figure 1-2: Using help to display information one page at a time
Chapter 2: Using Windows PowerShell Cmdlets
- Figure 2-1: The VBScript wshShell object contributes many easy-to-use methods and properties for the network administrator
- Figure 2-2: Tab Completion enumerates methods provided by the object
- Figure 2-3: Ensure that Windows PowerShell can read the profile by saving it with the All Files option, under Save As Type, in Notepad
Chapter 3: Leveraging PowerShell Providers
- Figure 3-1: Using Set-Location without : results in an error
- Figure 3-2: Highlight items to copy using the mouse
- Figure 3-3: Enable Quick Edit Mode to enable Clipboard Support
- Figure 3-4: Certmgr.msc can be used to examine certificate properties
- Figure 3-5: Use set in a CMD prompt to see environment variables
- Figure 3-6: A Regedit.exe similar view of HKEY_LOCAL_MACHINE\SOFTWARE
Chapter 4: Using PowerShell Scripts
- Figure 4-1: Error generated when attempting to run a Windows PowerShell script when execution policy not set
- Figure 4-2: Use the -noexit argument for the PowerShell.exe program to keep the console open after a script run
Chapter 5: Using WMI
- Figure 5-1: WMI namespaces on Windows XP
- Figure 5-2: The WMIProvidersXP.xls spreadsheet lists classes supported by provider name
Chapter 7: Working with Active Directory
- Figure 7-1: Exploring the hierarchy of a forest to ensure the correct path for ADSI
- Figure 7-2: Using the string attribute editor in ADSI Edit to quickly verify the distinguished name of a potential target for ADSI scripting
- Figure 7-3: ADSI attribute names of the General tab of Active Directory Users and Computers
- Figure 7-4: Every item on the Address tab in Active Directory Users and Computers can be filled in via ADSI and Windows PowerShell
- Figure 7-5: ADSI attributes used to fill out the profile page in Active Directory
- Figure 7-6: Telephone page attributes found in Active Directory
- Figure 7-7: Organization attributes in Active Directory
Chapter 8: Leveraging the Power of ADO
- Figure 8-1: Heavily queried attributes often benefit from indexing
Chapter 9: Managing Exchange 2007
- Figure 9-1: You cannot convert a string into a secure string
- Figure 9-2: The New-Mailbox cmdlet prompts for the password
Категории