Video – Exchange 2010 – How to import photos into Active Directory and display in Outlook

Home > Blogs > Exchange Server > Video – Exchange 2010 – How to import photos into Active Directory and display in Outlook

Video – Exchange 2010 – How to import photos into Active Directory and display in Outlook

Like This Blog 0 Interface
Added by November 4, 2011

In this DrillBit™ Video, Microsoft MVP Mike Pfeiffer shows you how to import photos into Exchange Server 2010 Active Directory that can be displayed in Outlook 2010.
Currently there is not a graphical interface that will allow you to do this; it must be done through the Exchange Management Shell. This video will also show you how to import photos in multiple mailboxes.

Upcoming live Exchange & PowerShell training at Interface Technical Training:
EXCH2010: Designing and Implementing Microsoft Exchange Server 2010
PS300: PowerShell for Administrators

Is there a DrillBit™ Video you would like to see?
Let us know in the comments section below. If it’s a popular technical problem, we’ll make a DrillBit™ video with the solution.

Videos You May Like

Creating Users and Managing Passwords in Microsoft Office 365

0 674 3

In this Office 365 training video, instructor Spike Xavier demonstrates how to create users and manage passwords in Office 365.   For instructor-led Office 365 training classes, see our course schedulle: Spike Xavier SharePoint Instructor – Interface Technical Training Phoenix, AZ 20347: Enabling and Managing Office 365    

How to clone a Windows Server 2012 or 2012 R2 Domain Controller

3 1533 3

One of the coolest new features in Window Server 2012 and Windows Server 2012 R2 is the ability to clone a Domain Controller. In the past, if we had virtualized Domain Controllers and we actually took a snapshot of it and then rolled back to that snapshot, it would break the logon service on that … Continue reading How to clone a Windows Server 2012 or 2012 R2 Domain Controller

Detailed Forensic Investigation of Malware Infections – April 21, 2015

4 630 5

How does an investigator hunt down and identify unknown malware? In this recording of our IT Security training webinar on April 21, 2015, Security expert Mike Danseglio (CISSP / CEH) performed several malware investigations on infected computers and identify symptoms, find root cause, and follow the leads to determine what’s happening. He demonstrated his preferred … Continue reading Detailed Forensic Investigation of Malware Infections – April 21, 2015

Write a Comment

Share your thoughts...

Please fill out the comment form below to post a reply.