• 13Aug

    To do this you must open up the Exchange Management Shell on Exchange 2007.  Then at the prompt you will want to find the GUID for the mailbox you wish to delete.  You can do this by typing the following command:

    Get-MailboxStatistics | where-object { $_.DisconnectDate -ne $null } | Select DisplayName,MailboxGuid

    You should then see a prompt like this.

    To remove individual mailboxes use the  following command with your servers info replaced in bold:
    Remove-Mailbox -Database “Database-Name” -StoreMailboxIdentity MailboxGuid -confirm:$false

    After this runs check to see if the GUID is gone by running the “Get-MailboxStatistics” command again.  After this has been run the mailbox has been removed from the system.

    To remove all disconnected mailboxes use the following commands, please note replace “Mailbox Store” with your information.

    This command will query the current disconnected mailboxes.
    $users = Get-MailboxStatistics | where-object { $_.DisconnectDate -ne $null } | Select DisplayName,MailboxGuid

    This command will use the query to remove the mailboxes.
    $users | ForEach { Remove-Mailbox -Database “Mailbox Store” -StoreMailboxIdentity $_.MailboxGuid -confirm:$false }

    – Harry Caskey

    Tags: , ,

  • 25Sep

    I would highly recommend checking out the Server 2008 R2 trial, Microsoft is giving a 180 day trial of Server 2008 R2.

    There are so many robust features such as:
    – Active Directory Administrative Center
    – Active Directory Module for Windows PowerShell
    – Active Directory Recycle Bin
    – Active Directory Best Practices Analyzer
    – Active Directory Web Services
    – Managed Service Accounts
    – Offline Domain Join

    All these features are huge upgrades to Windows Server 2003 R2, you have 180 days to check out the trial.  It’s worth it!

    Check out the trial here:

    – Harry Caskey


  • 07Apr

    Active Directory is truly the heart of an organization. You might even say if a computer system were a human being it would be the brain spanning all knowledge of the system. It is a central repository for all data regarding users, groups, computers, printers, shared folders, contacts, and policies. This store all information into a database, also can be known as the hive. Which contains strings and strings of data, and meta data.

    Many applications are written to connect to the Active Directory. This is useful because when you start to implement a system you can easily integrate it with authentication. If you are a authenticated user at a certain level you can restrict other users access to other resources. Such as you don’t want your Public Relations department to be able to have access to Human Resources files.

    As a Systems Administrator or Network Administrator you can safeguard practically anything you chose. You can even specify in a group policy what programs you would want users to access or install. Let alone when a user signs on run a batch file or implement an import of internal resources of favorites into the users Internet Explorer. If you are just learning about Information Technology I would suggest you visit Microsoft’s website for a training guide. There you can also find resources such as a Virtual Machine to experiment with. You need to practice because this is something you will need to know.

    – Harry Caskey