Monitor-MailboxDatabaseCopyStatus.ps1

#Exchange2010 #MsExchange #Powershell

Hello every Happy New Year and all that .. long time to talk.

Wanted to share this.  Basically had a Cisco UCS Blade failure today, where it took 2 nodes of a 3 node Exchange 2010 dag out.

Its been a fun day! NOT!

Anyway, I knocked this script up to monitor the database copy status when we put everything back.

PARAM([String]$Server = (HOSTNAME),
[int]$time            = 30)

Write-Host "Server:.."$Server
Write-Host "Timer:..."$time
$position = $host.ui.rawui.cursorposition
$position.y = $position.y+4
while($True){
  Get-MailboxDatabaseCopyStatus -Server $Server
  $endpos = $host.ui.rawui.cursorposition
  for($i=1;$i-le $time;$i++){write-host "." -nonewline -f Yellow;sleep 1}
  $host.ui.rawui.cursorposition=$endpos;
  Write-Host (" "*$time)
  $host.ui.rawui.cursorposition=$position;
}

Exchange 2010 OWA

#MSEXCHANGE

Everyday is a school day.  Learnt today that if you have say Exchange 2010 SP3 in your internet facing site, and SP2 with Update 7 in your none internet facing site, External OWA may not work!

Reason being is that your SP3 servers, need to have the OWA files from SP2 Update 7 in my case in the <drive>:\Program Files\Microsoft\Exchange Server\v14\ClientAccess\Owa folder.  So in my case it has subfolders for 14.2.347.0; 14.3.123.3 and 14.3.169.1

Otherwise external OWA to the non internet facing site fails!

This only applies if you the server in the internet facing site is kinda new and not had the upgrades of the previous servers.

Hope this helps!

A Month in #Exchange and #OCS: July 2011: Events

#Exchange2010 #Lync #MMMUG

#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#* New On-Demand Web Content from June 2011

TechNet Webcast: Lync Server 2010 Architecture Topologies (Level 200)
In this webcast, we describe the overall architecture of Microsoft Lync Server 2010 and the key considerations for the scalability and performance of each server role. This webcast provides the background and framework for the other Lync Server 2010 webcasts and serves as a bridge between the overview session and the drill-downs in the different product areas

TechNet Webcast: Lync Server 2010: Migration and Coexistence (Level 300)
In this webcast, we explore the path of moving from Microsoft Office Communications Server 2007 R2 to Microsoft Lync Server 2010. Although some of the technical functionalities of the products are similar, these are two very different products. Join this webcast to prepare yourself for a successful migration from Communications Server 2007 R2 to Lync Server 2010.

TechNet Webcast: Lync Server 2010: Role-Based Access Control (RBAC) (Level 300)
In this webcast, we introduce the Microsoft Lync Server 2010 Management Shell, a new method of administration and management. The Lync Server 2010 Management Shell is a powerful management interface built on the Windows PowerShell command-line interface, which includes a comprehensive set of cmdlets that are specific to Lync Server 2010. We take a look at various commands and how to perform various management tasks by using the Lync Server 2010 Management Shell.

TechNet Webcast: Consumerization of IT and Sophistication of Attacks (Level 200)
In this webcast, Frank Simorjay discusses how cybercriminals use marketing-like tactics to target consumers, how that can impact an organization, and how you can stay protected.

#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#* Webcasts of interest showing at a desktop near you in July 2011

Wednesday, July 13, 2011: TechNet Webcast: Information about Microsoft Security Bulletins for July (Level 200)
Join us for a brief overview of the technical details of the Microsoft security bulletins for July. We intend to address your concerns in this webcast; therefore, most of the webcast is devoted to attendees asking questions and getting answers from Microsoft security experts.

Monday, July 25, 2011: TechNet Webcast: Social Engineering Threat Trends in 2010 (Level 200)
Are you interested in learning how social networking has affected the way that cybercriminals work? According to Microsoft’s Security Intelligence Report, Volume 10, social networking has become one of the most common ways that attackers lure their victims. Learn more about the emerging social engineering threats, and get guidance about how you can protect yourself.