Solved

Exchange PowerShell Script

Posted on 2013-11-25
5
337 Views
Last Modified: 2013-11-25
Hi Experts,

Need a script that could do the following:

Scan all distribution groups and list all members email address that is not equal to @domain.com that is associated to that distribution group.

Is this possible and how. Thanks in advance.

Regards,

introlux
0
Comment
Question by:introlux
  • 3
  • 2
5 Comments
 
LVL 9

Expert Comment

by:Sean
ID: 39674795
Here is a script to get all groups and their members...if you play with it you could probably only get the members you want to but if you only need to run it once i would just use excel to remove the users you don't need.

$Groups=Get-DistributionGroup

$Groups| foreach{

$GroupName=$_.Name

$Report+=Get-distributionGroupMember -identity $_.identity| select @{Name='Distribution Group'; Expression={[String]::join(";", $GroupName)}}, Name, PrimarySmtpAddress}

$Report| export-csv "c:\MyFile.csv" -notype
0
 

Author Comment

by:introlux
ID: 39674885
error:

Export-Csv : Cannot bind argument to parameter 'InputObject' because it is null
.
At C:\test.ps1:5 char:20
+ $Report| export-csv <<<<  "c:\MyFile.csv" -notype
    + CategoryInfo          : InvalidData: (:) [Export-Csv], ParameterBindingV
   alidationException
    + FullyQualifiedErrorId : ParameterArgumentValidationErrorNullNotAllowed,M
   icrosoft.PowerShell.Commands.ExportCsvCommand
0
 
LVL 9

Accepted Solution

by:
Sean earned 500 total points
ID: 39674905
Try and run it without exporting to CSV first:

$Groups=Get-DistributionGroup

$Groups| foreach{

$GroupName=$_.Name

Get-distributionGroupMember -identity $_.identity| select @{Name='Distribution Group'; Expression={[String]::join(";", $GroupName)}}, Name, PrimarySmtpAddress}


let me know if it still errors out for you.
0
 

Author Comment

by:introlux
ID: 39674936
That worked thanks!
0
 

Author Closing Comment

by:introlux
ID: 39674938
A++
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Follow this checklist to learn more about the 15 things you should never include in an email signature from personal quotes, animated gifs and out-of-date marketing content.
A procedure for exporting installed hotfix details of remote computers using powershell
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
This video discusses moving either the default database or any database to a new volume.

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now