# Check to see if the group exists # Must perform detection for Local and Global/Universal Group separately and combine the results net localgroup "EDS Servers" /domain 2>&1 | Out-Null $LocalGroup = (get-variable LastExitCode).Value net group "EDS Servers" /domain 2>&1 | Out-Null $GlobalGroup = (get-variable LastExitCode).Value $GroupExists = !($LocalGroup -and $GlobalGroup) if (!$GroupExists) { Write-ExchangeSetupLog -Info "EDS group does not exist, creating group" net group "EDS Servers" /ADD /DOMAIN 2>&1 | Out-Null } $exitCode = (get-variable LastExitCode).Value if ($exitCode) { Write-ExchangeSetupLog -Error "Unable to create EDS Servers security group" } else { Write-ExchangeSetupLog -Info "EDS Servers security group was created successfully" } # Add all Exchange servers and domain controllers to the group with access to the DKM container. # They have EDS installed. $ds = new-object -type system.directoryservices.directorysearcher -argumentlist "(&(objectClass=group)(cn=EDS Servers))" $searchResult = $ds.FindOne() if ($searchResult -eq $null) { Write-ExchangeSetupLog -Error "Cannot find the EDS Servers security group in AD." } $edsServers = $searchResult.GetDirectoryEntry() if ($edsServers -eq $null) { Write-ExchangeSetupLog -Error "The EDS Servers security group does not have a directory entry in AD." } # Make sure EDS Servers is a universal group. $universalSecurityGroup = 0x80000008 $edsServers.InvokeSet("groupType", $universalSecurityGroup) $edsServers.CommitChanges() $ds = new-object -type system.directoryservices.directorysearcher -argumentlist "(&(objectClass=group)(cn=Exchange Servers))" $searchResult = $ds.FindOne() if ($searchResult -eq $null) { Write-ExchangeSetupLog -Error "Cannot find the Exchange Servers security group in AD." } $exchangeServers = $searchResult.GetDirectoryEntry() if ($exchangeServers -eq $null) { Write-ExchangeSetupLog -Error "The Exchange Servers security group does not have a directory entry in AD." } $exchangeServersDN = $exchangeServers.DistinguishedName[0] if (-not $edsServers.Properties["member"].Contains($exchangeServersDN)) { $edsServers.Properties["member"].Add($exchangeServersDN) } Write-ExchangeSetupLog -Info "The Exchange Servers group was added to the EDS Servers security group successfully." $ds = new-object -type system.directoryservices.directorysearcher -argumentlist "(&(objectClass=group)(cn=Domain Controllers))" $searchResult = $ds.FindOne() if ($searchResult -eq $null) { Write-ExchangeSetupLog -Error "Cannot find the Domain Controllers security group in AD." } $domainControllers = $searchResult.GetDirectoryEntry() if ($domainControllers -eq $null) { Write-ExchangeSetupLog -Error "The Domain Controllers security group does not have a directory entry in AD." } $domainControllersDN = $domainControllers.DistinguishedName[0] if (-not $edsServers.Properties["member"].Contains($domainControllersDN)) { $edsServers.Properties["member"].Add($domainControllersDN) } Write-ExchangeSetupLog -Info "The Domain Controllers group was added to the EDS Servers security group successfully." $ds = new-object -type system.directoryservices.directorysearcher -argumentlist "(&(objectClass=group)(cn=Central Admin SQL Servers))" $searchResult = $ds.FindOne() if ($searchResult -ne $null) { $centralAdminSQLServers = $searchResult.GetDirectoryEntry() if ($centralAdminSQLServers -eq $null) { Write-ExchangeSetupLog -Error "The Central Admin SQL Servers security group does not have a directory entry in AD." } $centralAdminSQLServersDN = $centralAdminSQLServers.DistinguishedName[0] if (-not $edsServers.Properties["member"].Contains($centralAdminSQLServersDN)) { $edsServers.Properties["member"].Add($centralAdminSQLServersDN) } Write-ExchangeSetupLog -Info "The Central Admin SQL Servers group was added to the EDS Servers security group successfully." } $ds = new-object -type system.directoryservices.directorysearcher -argumentlist "(&(objectClass=group)(cn=NAT Servers))" $searchResult = $ds.FindOne() if ($searchResult -ne $null) { $natServers = $searchResult.GetDirectoryEntry() if ($natServers -eq $null) { Write-ExchangeSetupLog -Error "The NAT Servers security group does not have a directory entry in AD." } $natServersDN = $natServers.DistinguishedName[0] if (-not $edsServers.Properties["member"].Contains($natServersDN)) { $edsServers.Properties["member"].Add($natServersDN) } Write-ExchangeSetupLog -Info "The NAT Servers security group was added to the EDS Servers security group successfully." } $edsServers.CommitChanges() Write-ExchangeSetupLog -Info "The EDS Servers group was committed successfully."
Changing the FQDN to "{0}" requires updating databases currently configured to use the old FQDN.To fix the affected databases ...
ChannelSubscribe Average Response Time is the average elapsed time (in milliseconds) between the beginning and end of a ChannelSubscribe ...
ChannelUnsubscribe Average Response Time is the average elapsed time (in milliseconds) between the beginning and end of an ...
Check the server configuration for this service. For example, check the capabilities that the server supports. You can use ...
Check to see if the group exists # Must perform detection for Local and Global/Universal Group separately and combine the ...
Check whether there are common destinations shared by messages in the 'Local delivery' queue (this step is conducted only ...
Check whether there are common destinations shared by messages in the queue (this step is conducted only when the server ...
Checking the on-premises organization relationship domains against the accepted domains returned by the Get-OrganizationConfig ...
Checkpoint depth for storage group '{3}' on server {2} is not set to the recommended value of 5242880 (5 MB) on this cluster. ...