M06 - Providing First Level Remote Help Desk Support
M06 - Providing First Level Remote Help Desk Support
Level-III
Based on June 2021, Curriculum Version - II
November 2023
Acronym......................................................................................................vi
Self-Check 1.................................................................................................13
Self-Check 2.................................................................................................29
Self-Check 3.................................................................................................39
Self-Check 4.................................................................................................48
References...................................................................................................49
Developers Profile..........................................................................................50
Ministry of Labor and Skills wish to extend thanks and appreciation to the many
representatives of TVET instructors and respective industry experts who donated
their time and expertise to the development of this Teaching, Training and Learning
Materials (TTLM).
This module is designed to meet the industry requirement under the Hard Ware and Network
Servicing occupational standard, particularly for the unit of competency: Providing First Level
Remote Help Desk.
Module Instruction
For effective use this module trainees are expected to follow the following module instruction:
This guide will also assist you to attain the learning outcomes stated in the cover page. Specifically, upon
completion of this learning guide, you will be able to:
In computer terminology, an error log is a record of critical errors that are encountered by the
application, operating system or server while in operation.
Some of the common entries in an error log include table corruption and configuration
corruption. Error logs in many cases serve as extremely useful tools for troubleshooting and
managing systems, servers and even networks.
Error logs for different applications, operating systems, networks or servers are set up in
different ways.
Some error logs are configured to capture every single error which occurs in the system,
whereas some are designed to selectively store error information pertaining to specific
error codes.
Some error logs only capture certain information about the error, whereas others are
programmed to capture all available information such as timestamp, system information,
and user location and user entry. In many cases, access to error logs need special
administrative rights, as these would help as a security measure against providing access
to unauthorized resources or users from seeing the error documentation or details.
In the case of servers and office networks, error logs track issues faced by users and help
in root causes analysis of those issues. A network or system administrator can resolve
errors more quickly and easily with the information available from the error logs.
For webmasters, error log analysis provides information about the issues users encounter
and can proactively resolve issues without anyone reporting on them. Error logs also
could provide insights on hacking attempts, as most hacking attempts on systems and
servers result in error or have a high probability of being captured in error logs as the
hackers attempt to compromise the system.
Also, by using gray log’s, you will be able to contextualize a series of seemingly unrelated
events (such as 100 failed login events in a row from the same IP address – a clear example of a
brute force attack attempt) and correlate them according to their severity and meaning.
This is only one set of examples how log management can help you with general troubleshooting
techniques. The best log management tools such as gray log have features that are specifically
designed to aid in frequent troubleshooting operations, and exploring and analyzing your event
log data should always be one of the first steps towards resolving these issue.
Common Issues That Can Be Diagnosed and Fixed with System Logs
Analyzing system logs makes it possible to identify errors, track performance, and determine
the root cause of problems. They help you get things back on track. Here are some common
issues you can easily fix by diving into those system logs.
The log data you collect from your systems and devices may seem pretty mundane.
The information captured by logs can be used to help protect sensitive data and to
support incident response and forensic analysis in the event of a suspected data breach
or other forms of electronic crime, such as fraud.
Here are some best practices that can help ensure log data and log management practices
properly support investigations.
Have a clear corporate policy for managing logs across the entire organization.
Document what is being logged and why, as well as how the log data is captured, stored
and analyzed.
Ensure that 100% of log-able devices and applications are captured and the data is
unfiltered.
Have centralized storage and retention of all logs, with everything in one place and in one
format.
Ensure the time synchronization of logs to facilitate correlating the data and retrieving
data over specific timeframes.
Ensure the separation of duties over logs and log management systems to protect from
potential internal threats such as a superuser or administrator turning off or modifying
logs to conceal illicit activity.
Always maintain backup copies of logs.
Have a defined retention policy that specifies the retention period across the organization
for all log data. Organizations should work with legal counsel to determine the best time
frames and have log data incorporated into an overall data retention policy.
Have a defined procedure to follow after an incident.
Test the incident response plan, including the retrieval of backup log data from offsite
storage.
If an incident or data breach is suspected, there are several steps to take right away:
With the appropriate care, logs can provide solid forensic evidence when and if it is
needed. “If your home had been robbed, you would have to tell the police officer what
was stolen and how the burglar got in”, the same is also true for the network. If you
simply tell us you have been broken into, and have no evidence to support it, we may be
empathetic, but we can’t open a case. Though analyzing log data may not make for an
exciting TV drama, it is a necessary step for investigating and successfully prosecuting a
crime.
No product or service – or end user – is perfect. This is especially true when it comes to
hardware and software. That is why companies, if they want to stay in and grow their business,
need to provide help to customers when things go wrong. And while no two products or
problems are exactly alike, the best tech support departments share the following eight traits.
Without customer feedback, a company will never know if customers are getting value out of
their product. Without knowing if they’re getting value, the product and go-to-market teams
won’t know if they’re nurturing loyal customers (not to mention be able to measure customer
retention and customer health). And without loyal customers, well…
According to Gartner, “customers’ salient experiences with the company heavily influence their
long-term switching behavior and reflect the true drivers of loyalty.” How does one find out what
these salient experiences were? Customer feedback.
The 7 most effective customer feedback methods
Before you begin collecting feedback from customers, you need to pinpoint why you’re seeking
their input. Identifying your desired outcomes and outlining the process for getting there sets the
groundwork for a worthwhile investment of your time — and your customers’ time. Without a
clear intention, your feedback may not serve anyone.
Customer Feedback Methods:
Customer feedback surveys
Email and customer contact forms
Usability tests
Exploratory customer interviews
Social media
On-site activity (via analytics)
Hardware and Network Servicing Version -1
Page 9 Federal TVET Agency
Level III
Author/Copyright November 2023
Instant feedback from your website
Customer feedback surveys
Developing a useful customer survey may be more challenging than you think. There are
a ton of questions you could ask customers. The good news: you can choose between
short slider surveys (which help you target specific issues) that pop up on your site or
longer, traditional surveys.
If you want customers to follow through on completing a survey, make sure you follow
some simple best practices.
Only ask questions that help you meet your goals.
Write thoughtful open-ended questions.
Create consistent rating scales.
Avoid leading or loaded questions.
Email and customer contact forms
Email is one of the easiest ways to gather candid customer feedback. Because it’s a
support channel for most companies, you can use each interaction as an opportunity to
gather feedback.
Usability tests
For usability testing to bring deep insights to your company, it requires more upfront
planning. With a clear strategy, though, you can uncover challenges that customers don’t
know they’re facing and actionable insights that make their experiences better. You may
even want to consider rewarding your user research participants the way Google does.
Social media
Social listening can give you access to an otherwise untapped reservoir of candid
feedback from customers. Direct comments or mentions on social networks aren’t the
Analytics reveal what customers don’t know about how they use your product.
Especially if you sell a digital product or service, you benefit from leveraging analytics
to understand how users interact with your company. For example, if you offer self-
service content as a form of customer service, you could see the number of people
visiting each article.
With an embeddable on-site widget like Beacon, you can collect instant customer
feedback without asking the customer any questions.
C. A and B
2. Some questions that can be usefully employed to document the identified problem are:
A. What is happening?
B. When is it happening?
C. Where is it happening?
D. All
A. Actual
B. Desired
C. A and B
D. None
1. A problem can be regarded as a difference between the actual situation and the desired
situation
Operation Sheet 1
Operation Title: Procedures used to Checking logged windows events
Purpose: To acquire the trainees the skill of Checking logged windows events
Equipment, tools and materials required: Desk top or lap top computer installed with the
required operating system
Step 1. From the Start Menu, type event viewer and open it by clicking on it.
Step 2. To expand the Windows Logs folder, click on Event Viewer (local) .
Step 4. Double-click on Filter Current Log and open the dropdown menu for Event
Sources.
Step 5. Scroll down to Power-Troubleshooter and tick the box next to it. Then click OK.
The Windows Event Viewer will show you when your computer was brought out of sleep mode or turned
on. If you weren’t using it during these times, someone else was.
This guide will also assist you to attain the learning outcomes stated in the cover page.
Specifically, upon completion of this learning guide, you will be able to:
View User History: See who has made changes, to what, and when.
Lock Record: This will make the record un editable, so that no user can change
the log of actions.
Edit Record: In some cases, you might want the record to be kept editable - for instance,
if you made a mistake or need to keep certain information private from other parties.
Create Discrete Steps: An approval process is only effective if there are clear, defined,
and repeatable steps. Choose a program that allows you to write discrete steps that users
can easily follow and repeat an infinite number of times.
Templates and/or Built-In Workflows: Pre-built templates are helpful if you’ll be
creating multiple workflows for a variety of specific use cases. This way, you won’t have
to start from scratch every time, or hard-code any parameters.
Customization: Although built-in workflows can help you get started, you may want to
retain some flexibility. Choose a program with customization options so you can tailor
your process; if it doesn’t fit your needs, there’s no benefit.
Edit Capabilities: Once you build your workflow and start using it, you might need to
make changes to the procedures you initially put in place. Systems that allow editing will
save of time.
The list below is used with gratitude from the Dartford computer science department
Minimum hardware and software requirements
Installation guide
How to start the system
How to use different features of the system
Screenshots explaining main features of the system
Example inputs and outputs
Explanations of error messages and troubleshooting guides
Information to contact the developer of the system if an undocumented question arises
The quality of user documentation can affect the rate of implementation of the new system.
Examples should include methods such as: help files, online support and printed manuals.
The information is very useful in the event that you would like to utilize forms such
as Training Feedback Forms where you provide feedback on one’s performance.
It can be difficult to decide whether a customer's feedback is actually geared towards helping you
improve your business or if it's simply an attempt to bash your company. Here are the ways you
can tell the difference between these two kinds of negative feedback. For an explanation of the
specific kinds of negative feedback.
Useful Feedback
This feedback has a point. A customer has faced an issue with your product or service and is
reflecting on it. There is something for you to mend or improve in this situation.
This feedback isn't solely the opinion of an individual customer. Typically, it reflects the
thoughts of several customers, some of whom may not have spoken up about it. Taking this
feedback into consideration would improve the experiences of many of your customers, and,
thus, might be a good investment to make.
This feedback shows time and thought. It's clear the customer carefully crafted their feedback,
which means that they care about your business's growth. This is a tip-off that their feedback
could really improve your product or service.
This feedback isn't suggesting that you reconsider your entire company strategy, mission, or
industry. Instead, the customer is offering some opportunities for growth or improvement that
can be easily tweaked within your overarching company strategy.
This feedback is relayed in a fairly kind manner. The customer doesn't feel any need to attack
your company or be aggressive. They simply want to relay their thoughts in the hopes that you'll
consider them for the future.
Useless Feedback
This feedback doesn't have a specific issue for you to track and take into consideration. There is
no way for you to try to "solve" a problem for this customer and improve their experience.
This feedback is bringing up a brand-new point. It doesn't seem like any other customers or
prospects are facing a similar experience with your product or service.
This feedback could potentially be a short burst of angry typing. It doesn't include a lot of details
on the situation and doesn't show signs of clear-headed thought.
This feedback advises you to make large-scale changes to your company. Implementing such
changes would not only be a huge financial investment for you, but it would also take an
extended amount of time and require rebranding.
This feedback is relayed in a harsh way. There doesn't seem to be a basic appreciation for your
company. This customer or prospect simply wants to criticize your business without being
constructive.
We've compiled the following list of steps to take after receiving both negative and positive
feedback.
Effective communication in the workplace is crucial for fostering a positive and productive work
environment. Here are some key requirements to communicate effectively:
1. Clear Expression:
Use Clear Language: Express ideas using clear and concise language. Avoid
jargon or technical terms that may not be understood by everyone.
Organize Thoughts: Structure your communication logically. Present information
in a well-organized manner to enhance comprehension.
2. Active Listening:
Give Full Attention: When someone is speaking, give them your full attention.
Avoid interrupting and listen actively to understand their perspective.
Ask Clarifying Questions: If something is unclear, ask questions for clarification.
This shows that you are engaged and interested in understanding.
3. Feedback:
Provide Constructive Feedback: When giving feedback, focus on specific
behaviors or actions. Be constructive rather than critical.
Be Open to Feedback: Create an environment where others feel comfortable
providing feedback to you. Use feedback as an opportunity for growth.
4. Empathy:
once you and your team have solved the problem and productivity in the workplace
returns to normal, it's beneficial to create a comprehensive issue report. In this report, be
sure to include details about which team member reported the issue, the impact, the steps
taken to resolve the issue, when and how it occurred and all staff involved in problem-
solving. Creating reports like these after issue management takes place allows you to
develop plans to avoid similar issues in the future
Problems can happen when employers and employees don’t follow the correct
workplace laws and rules.
Employers and employees can accidentally break workplace laws when they don't
know or understand their workplace rights and obligations.
These types of problems can often be resolved quickly when employees and
employers communicate and work together to find a solution.
Try talking to your employer or employee first
If you’re having a problem at work, we recommend that you raise it with your
employee or employer first. When employees and employers communicate and
work together to come up with their own solutions, the problem can usually be
resolved without our help.
Even where an employee has left their employment, we encourage employers and
employees to raise issues directly before asking for our help.
Reference Books:
1. "A Guide to Service Desk Concepts" by Donna Knapp
2. "ITIL Foundation Essentials: The Exam Facts You Need" by Claire Agutter
3. "The Practice of System and Network Administration" by Thomas A. Limoncelli,
Christina J. Hogan, and Strata R. Chalup
4. "CompTIA A+ Certification All-in-One Exam Guide" by Mike Meyers