See how throttling policies can prevent individual users from unfairly consuming server resources. Management shell cmdlets are used to configure policies.
- [Instructor] It isn't unusual in a large organization…to find that one user, or small collection of users,…is accessing the email server more than others.…This can become a problem if these users are consuming…so much of the server's resources…that other feel the pinch.…Sometimes this problem can't be solved…by simply publishing a company rule…about how email is supposed to be used.…It's even possible for Exchange admin tasks…to be the offending traffic.…
Exchange Server has throttling policy options…to help you manage this type of issue.…So here we are, back on the Exchange Server,…in the Exchange Management Shell.…This really is a convenient power shell instance…that has all of the commandlets and most of the scripts…that you'll need to administer in Exchange Environment.…Here, I'm going to take a look…at the throttling policies that are available to us.…And I'm going to type Get-ThrottlingPolicy…and I'm going to filter that result in the format of a list.…
What this commandlet will do…is retrieve any existing throttling policies…
AuthorScott M Burrell
- Planning and configuring Active Directory (AD)
- Creating and configuring mailboxes
- Delegating mailboxes
- Mailbox and mailbox folder permissions
- Mail-enabled users
- Send as versus Send on Behalf
- Using public folders
- Managing public folder permissions
- RBAC versus AD split permissions
- Configuring user assignment policies
- Protecting Exchange content
- Message signing and encryption
- Troubleshooting IRM failure
Skill Level Intermediate
Deploying Exchange Server 2016with Robert McMillen3h 1m Intermediate
Exchange 2016: Client Access Serviceswith Scott M Burrell1h 50m Intermediate
Exchange 2016: Mailbox Databaseswith Scott M Burrell2h 30m Intermediate
Exchange 2016: Transport Serviceswith Scott M Burrell2h 24m Intermediate
1. Plan and Configure Active Directory (AD)
3. Other Mail-Enabled Objects
4. Role-Based Access Control
5. Protecting Exchange Content
Next steps1m 51s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.