How To Migrate Data Protection Manager Resources to a New Storage Location

Written by Cheng Pei Koay, Microsoft Premier Field Engineer. I was recently trying to migrate System Center Data Protection Manager (DPM) Data Sources to a new storage location and faced a number of challenges, so I’d to share my experiences to help others avoid any potentially unnecessary frustration. MigrateDatasourceDataFromDPM is a command-line script that lets…


4 Must-Have Windows High-CPU Troubleshooting Tools

Written by Cheng Pei Koay, Microsoft Premier Field Engineer. Here’s my quick list of 4 tools that should be in the arsenal of anyone who’s troubleshooting high-CPU usage situations on Windows systems. 1) User Mode Process Dumper The User Mode Process Dumper dumps any running Win32 processes memory image which includes system process. This tool…


Exchange Server Recommendations for File-Level Antivirus Scanners

Written by Cheng Pei Koay, Premier Field Engineer. If you are deploying file-level antivirus scanners on Exchange servers, make sure that the appropriate exclusions, such as directory exclusions, process exclusions, and file name extension exclusions are in place for both scheduled and real-time scanning. This post describes some recommended exclusions for each server or server…


Windows Server Failover Clustering Quorum Configuration Models Explained

Written by Cheng Pei Koay, Microsoft Premier Field Engineer. A Windows Server 2008 failover cluster is known to provide high availability for various types of back-end applications and services (note that failover clustering is designed for stateful applications). A common perception is to having 2 nodes clustered will accomplish the required level of high availability;…


Microsoft Exchange: Which Windows Server Operating System Is Required?

Written by Cheng Pei Koay, Microsoft Premier Field Engineer Microsoft Exchange 2010 Service Pack 1 (SP1) has been available since September 2010 and this new release helps IT Professionals to achieve new levels of reliability with greater flexibility, enhanced user experiences and increased protection for business communication. There are a lot of questions that arise…