?
Solved

need a powershell script to add whitelist entries in bulk

Posted on 2014-01-02
10
Medium Priority
?
1,483 Views
Last Modified: 2014-01-08
can someone provide a powershell script for Office 365 that I can use to add in 1000+ whitelist entries. [would like the script to key on a CSV input file.]

thanks in advance,

S.
0
Comment
Question by:siber1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 5
10 Comments
 
LVL 25

Accepted Solution

by:
Zephyr ICT earned 1500 total points
ID: 39753199
Does something like this work for you?

Import-Csv "D:\whitelist.csv"  | foreach { Set-MailboxJunkEmailConfiguration -Identity  $_.Identity -TrustedSendersAndDomains  @{Add='your.user@yourdomain.com'} }

The csv should look something like this:

user1, your.user1@yourdomain.com
user2, your.user2@yourdomain.com
0
 

Author Comment

by:siber1
ID: 39753806
thx Spravtek, but we would mostly be whitelisting IP's or domain names. how can we modify your script to account for that?
0
 
LVL 25

Expert Comment

by:Zephyr ICT
ID: 39753916
I understood your question wrong probably ... Anyway, I will look into the script, I have to go for  a while now.

More information on how to block domains using poweshell can be found here:

http://support.microsoft.com/kb/2545137
0
What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

 

Author Comment

by:siber1
ID: 39755568
hello spravtek any update on this?
0
 
LVL 25

Expert Comment

by:Zephyr ICT
ID: 39755722
Hi, have been looking into this yes, but first I'd like to ask which Office365 plan you have... Do you have an E1 plan or? There seems to be some mixed information regarding availability to the whitelist and such.

Thanks
0
 

Author Comment

by:siber1
ID: 39756583
Hi Spravtek, we have the E3 plan
0
 
LVL 25

Expert Comment

by:Zephyr ICT
ID: 39758604
I'm sorry for the late reaction between posts, weekend and all ...

The reason I'm asking about the E-plan is because you can be using FOPE, so that changes things...

Are you using something like this? http://www.office365advisors.com/fope-blacklists/
0
 

Author Comment

by:siber1
ID: 39759028
actually FOPE was changed to EOP. we are using EOP.

thx
0
 
LVL 25

Expert Comment

by:Zephyr ICT
ID: 39759059
Interesting.... I'm not really following the Office365 story ...

The only thing I could find is this, but how it relates to the EOP, I can't really say, I'd test it if I had Office365, let alone an E-plan.
0
 

Author Comment

by:siber1
ID: 39760927
does anyone else have an idea on this?
0

Featured Post

Get your Disaster Recovery as a Service basics

Disaster Recovery as a Service is one go-to solution that revolutionizes DR planning. Implementing DRaaS could be an efficient process, easily accessible to non-DR experts. Learn about monitoring, testing, executing failovers and failbacks to ensure a "healthy" DR environment.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article will help to fix the below errors for MS Exchange Server 2013 I. Certificate error "name on the security certificate is invalid or does not match the name of the site" II. Out of Office not working III. Make Internal URLs and Externa…
There are times when we need to generate a report on the inbox rules, where users have set up forwarding externally in their mailbox. In this article, I will be sharing a script I wrote to generate the report in CSV format.
how to add IIS SMTP to handle application/Scanner relays into office 365.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Suggested Courses
Course of the Month10 days, 23 hours left to enroll

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question