Using PowerGUI and its PowerPacks

PowerGUI is one of the best free tools, especially for those of us who work with PowerShell environments and still do not feel comfortable, it is a graphic tool that allows us to create, edit, import, export our Windows PowerShell-based scripts. In this document we will see how to install it that has nothing and how we can organize our scripts, as well as being able to see how to use scripts for VMware, Exchange, Active Directory, SQL, Routers, communications, Internet, Systems Center, Operations Manager, Xen, Hyper-V, Citrix, Skype, Reporting, Twitter … everything that relies on PowerShell.

Enabling the Recycle Bin in Windows Active Directory 2008 R2

Windows Server 2008 R2 brings an improvement at the Active Directory level, Finally it will let us recover a deleted element without losing its settings, has introduced the Recycle Bin or 'Recycle Bin Feature' feature. In this document, We'll see how to enable it, since by default it is not enabled or activated if we come from an Active Directory prior to Windows 2008 R2.

Exchange Migration 2003 to Exchange 2010

In this document, we'll look at the steps to take when migrating a Microsoft Exchange Server organization 2003 to Microsoft Exchange Server 2010, we will note that in this document we will migrate an Exchange server 2003 with mailboxes, Public Folders, policies and OWA to an Exchange server 2010 With all the roles (Transport Hub, Client Access, Mailbox and Exchange Management Tools). If we want to get an Exchange organization 2010 With the separate functions we can use the document as a guide, since each migration is completely different from the rest.

Setting up RBL lists in Fortigate to avoid SPAM

If our intention is to block all spam that passes through our firewall, RBL lists are most commonly configured, and this document shows how to configure them on a Fortinet firewall, in a Fortigate. RBL is the acronym for “Realtime Blackhole list” or “Real-time blacklist”. These are systems that publish a database with a list of IP addresses that have been the source of unsolicited email sendings (SPAM). These databases are consulted online in real time by AntiSpam systems or mail servers before accepting a new email and said email will be marked as spam or we will reject it, according to interest.

Software requirements for Exchange Server 2010

This document shows what the requirements are to be able to install Microsoft Exchange 2010 in our organization, whether it is a new installation or for the migration of our environment to Microsoft Exchange Server 2010. Only the requirements are shown at the operating system and software level, in addition to the procedure for the installation of them. Another document will show what the requirements are at the Active Directory level and how to proceed.

Using Windows AIK for Windows Deployments 7 and Windows 2008 R2

We can use Windows AIK (Windows Automated Installation Kit) to easily and quickly display Windows images 7 and Windows 2008 R2. With this, We will be able to create an image from a team that we have prepared for our organization and apply it to all the teams (being able to put drivers, Applications, Configurations…). This document will look at the use of response files to prevent interaction during the installation of the operating system and thus perform unattended installations, creating and using a Windows PE CD for booting the pre-installation environment and network imaging deployment, as well as the use of scripts to avoid our intervention as much as possible.