Export (0) Print
Expand All
Expand Minimize



Topic Last Modified: 2012-03-23

Retrieves information about one or more computers that host trusted applications.

Get-CsTrustedApplicationComputer [-Identity <XdsGlobalRelativeIdentity>] [-Pool <String>]
Get-CsTrustedApplicationComputer [-Filter <String>] [-Pool <String>]

We recommend that the computers that are running trusted applications within a Microsoft Lync Server 2010 deployment be added to a separate pool that is only for trusted applications. However, you can add trusted application computers to an existing pool that is also used for other purposes. Use this cmdlet to retrieve the Identity (FQDN) and the pool on which it is located of one of more computers that contain trusted applications.

You can use this cmdlet to retrieve computers based on the computer FQDN or to retrieve all the computers that are part of a specified pool.

Who can run this cmdlet: By default, members of the following groups are authorized to run the Get-CsTrustedApplicationComputer cmdlet locally: RTCUniversalUserAdmins, RTCUniversalServerAdmins. To return a list of all the role-based access control (RBAC) roles this cmdlet has been assigned to (including any custom RBAC roles you have created yourself), run the following command from the Windows PowerShell prompt:

Get-CsAdminRole | Where-Object {$_.Cmdlets –match "Get-CsTrustedApplicationComputer"}


Parameter Required Type Description




The fully qualified domain name (FQDN) of the computer you want to retrieve.




A string that includes wildcards that enables you to retrieve trusted computers based on Identity values that match the given wildcard string.




The FQDN of the trusted application pool for which you want to retrieve computer information.

Retrieves one or more objects of type Microsoft.Rtc.Management.Xds.DisplayComputer.

-------------------------- Example 1 ------------------------


Example 1 retrieves all computers that have been assigned to any trusted application pool within the Lync Server 2010 deployment.

-------------------------- Example 2 ------------------------

Get-CsTrustedApplicationComputer -Identity Trust1.litwareinc.com

Example 2 retrieves information about the computer with the FQDN Trust1.litwareinc.com.

-------------------------- Example 3 ------------------------

Get-CsTrustedApplicationComputer -Filter Trust*

This example uses the Filter parameter to do a wildcard search for all computers that have an FQDN beginning with the string Trust that have been assigned to trusted application pools. The Filter parameter searches the Identity property of all trusted application computers. The wildcard character (*) at the end of the string means that the Filter should look for identities that begin with the string Trust followed by any other characters.

-------------------------- Example 4 ------------------------

Get-CsTrustedApplicationComputer -Pool TrustPool.litwareinc.com

Example 4 retrieves a list of all computers that have been assigned to the trusted application pool TrustPool.litwareinc.com.

-------------------------- Example 5 ------------------------

Get-CsTrustedApplicationComputer | Where-Object {$_.Pool -like "*.litwareinc.com"}

In Example 3 we used the Filter parameter to do a wildcard search based on Identity (the FQDN of the computer). In this example, we’re again doing a wildcard search, but this time on the pool rather than the identity. We first call Get-CsTrustedApplicationComputer to retrieve a collection of all the trusted application computers. We then pipe that collection to the Where-Object cmdlet. Where-Object enables us to narrow down the collection that has been piped to it. In this case we want to keep only the trusted application computers that are in any pool on the litwareinc.com domain. To do this we check the Pool property of each item in the collection ($_.Pool) and see if it matches (-like) the wildcard string *.litwareinc.com. A value will match that string if it begins with any set of characters and ends with the string .litwareinc.com.

Was this page helpful?
(1500 characters remaining)
Thank you for your feedback
© 2015 Microsoft