M06 - Providing First Level Remote Help Desk Support
M06 - Providing First Level Remote Help Desk Support
Level-III
Based on June 2021, Curriculum Version - II
November 2023
This guide will also assist you to attain the learning outcomes stated in the cover page. Specifically, upon
completion of this learning guide, you will be able to:
Analyzing system logs makes it possible to identify errors, track performance, and determine the root cause of
problems. They help you get things back on track. Here are some common issues you can easily fix by diving
into those system logs.
The log data you collect from your systems and devices may seem pretty mundane.
The information captured by logs can be used to help protect sensitive data and to support incident
response and forensic analysis in the event of a suspected data breach or other forms of electronic
crime, such as fraud.
Here are some best practices that can help ensure log data and log management practices properly support
investigations.
Have a clear corporate policy for managing logs across the entire organization.
Document what is being logged and why, as well as how the log data is captured, stored and analyzed.
Ensure that 100% of log-able devices and applications are captured and the data is unfiltered.
Have centralized storage and retention of all logs, with everything in one place and in one format.
Ensure the time synchronization of logs to facilitate correlating the data and retrieving data over specific
timeframes.
Ensure the separation of duties over logs and log management systems to protect from potential internal
threats such as a superuser or administrator turning off or modifying logs to conceal illicit activity.
Always maintain backup copies of logs.
Have a defined retention policy that specifies the retention period across the organization for all log data.
Organizations should work with legal counsel to determine the best time frames and have log data
incorporated into an overall data retention policy.
Have a defined procedure to follow after an incident.
Test the incident response plan, including the retrieval of backup log data from offsite storage.
If an incident or data breach is suspected, there are several steps to take right away:
Increase the logging capability to the maximum and consider adding a network sniffer to capture
additional detail from network traffic. In an incident, it’s better to have more data rather than less.
Freeze the rotation or destruction of existing logs to prevent the loss of potential evidence.
Get backup copies of the logs and make sure they are secure.
Deploy a qualified investigations team to determine the situation.
With the appropriate care, logs can provide solid forensic evidence when and if it is needed. ―If your
home had been robbed, you would have to tell the police officer what was stolen and how the burglar got
in‖, the same is also true for the network. If you simply tell us you have been broken into, and have no
evidence to support it, we may be empathetic, but we can’t open a case. Though analyzing log data may
not make for an exciting TV drama, it is a necessary step for investigating and successfully prosecuting a
crime.
1.3. Providing support for clients on the investigated result
No product or service – or end user – is perfect. This is especially true when it comes to hardware and software.
That is why companies, if they want to stay in and grow their business, need to provide help to customers when
things go wrong. And while no two products or problems are exactly alike, the best tech support departments
share the following eight traits.
If you want customers to follow through on completing a survey, make sure you follow some simple best
practices.
Only ask questions that help you meet your goals.
Write thoughtful open-ended questions.
Create consistent rating scales.
Avoid leading or loaded questions.
Email and customer contact forms
Email is one of the easiest ways to gather candid customer feedback. Because it’s a support channel for
most companies, you can use each interaction as an opportunity to gather feedback.
Usability tests
For usability testing to bring deep insights to your company, it requires more upfront planning. With a
clear strategy, though, you can uncover challenges that customers don’t know they’re facing and
actionable insights that make their experiences better. You may even want to consider rewarding your
user research participants the way Google does.
Exploratory customer interviews
Does direct outreach translate to beneficial feedback from customers? Absolutely! Reaching out to
customers directly opens up conversations that otherwise wouldn’t happen.
Social media
Social listening can give you access to an otherwise untapped reservoir of candid feedback from
customers. Direct comments or mentions on social networks aren’t the only way for your business to
collect customer feedback either — many networks include built-in polling tools.
On-site activity (via analytics)
Analytics reveal what customers don’t know about how they use your product. Especially if you sell a
digital product or service, you benefit from leveraging analytics to understand how users interact with
your company. For example, if you offer self-service content as a form of customer service, you could
see the number of people visiting each article.
. Instant feedback from your website
With an embeddable on-site widget like Beacon, you can collect instant customer feedback without
asking the customer any questions.
Self-Check 1
Part I. Choose the correct answer from the given alternatives
1. In order to clearly define the problem we have to consider
A. Agree with the team where the team should be
B. Describing and documenting the problem
C. A and B
2. Some questions that can be usefully employed to document the identified problem are:
A. What is happening?
B. When is it happening?
C. Where is it happening?
D. All
3. A problem can be regarded as a difference between the ____situation and the _____situation
A. Actual
B. Desired
C. A and B
D. None
1. A problem can be regarded as a difference between the actual situation and the desired situation
2. With the appropriate care, logs can provide solid forensic evidence when and if it is needed.
Purpose: To acquire the trainees the skill of Checking logged windows events
Equipment, tools and materials required: Desk top or lap top computer installed with the required operating
system
Step 1. From the Start Menu, type event viewer and open it by clicking on it.
Step 3. Expand Windows Logs by clicking on it, and then right-click on System.
Step 4. Double-click on Filter Current Log and open the dropdown menu for Event Sources.
Step 5. Scroll down to Power-Troubleshooter and tick the box next to it. Then click OK.
The Windows Event Viewer will show you when your computer was brought out of sleep mode or turned on. If you
weren’t using it during these times, someone else was.
Lap Test: Practical Demonstration for operation sheet 1
This guide will also assist you to attain the learning outcomes stated in the cover page.
Specifically, upon completion of this learning guide, you will be able to:
Confirm network requirements
Investigate and documenting solution
Obtain approval from client
Discuss and agreeing level of technical support
Provide manuals and help documentation
Before purchasing a software program or hardware device, you can check the system requirements to make sure
the product is compatible with your system. Typical system requirements for a software program include:
Operating system
Minimum CPU or processor speed
Minimum system memory (RAM)
Minimum free storage space
Audio hardware (sound card, speakers,)
System requirements listed for a hardware device may include:
Operating system
Available ports (USB, Ethernet,)
Wireless connectivity
Minimum GPU (for displays and graphics hardware)
As a result, many organizations have transitioned to automated approval processes and workflows. Companies
can use software to create a tailored approval process, which then guides users through that process to ensure
work is completed and approved the same way every time. The main benefits of automated approval processes
include saving time, maximizing efficiency, and standardizing processes.
View User History: See who has made changes, to what, and when.
Lock Record: This will make the record un editable, so that no user can change
the log of actions.
Edit Record: In some cases, you might want the record to be kept editable - for instance, if you made a
mistake or need to keep certain information private from other parties.
Create Discrete Steps: An approval process is only effective if there are clear, defined, and repeatable
steps. Choose a program that allows you to write discrete steps that users can easily follow and repeat an
infinite number of times.
Templates and/or Built-In Workflows: Pre-built templates are helpful if you’ll be creating multiple
workflows for a variety of specific use cases. This way, you won’t have to start from scratch every time,
or hard-code any parameters.
Customization: Although built-in workflows can help you get started, you may want to retain some
flexibility. Choose a program with customization options so you can tailor your process; if it doesn’t fit
your needs, there’s no benefit.
Edit Capabilities: Once you build your workflow and start using it, you might need to make changes to
the procedures you initially put in place. Systems that allow editing will save of time.
Mobile Features: Solutions that offer mobile capabilities enable your team to submit work, receive
notifications, make requests, and approve work from their phone or tablet.
Signature Collection: If you’re approving sensitive or highly important documents and information, you
may require a signature. Some programs offer signature collection so that you can verify approvals.
Feedback Collection: Perhaps you want to create a workflow that elicits feedback, rather than approves
work. In this case, look for a program with qualitative collection capabilities. This might be a template
option within a larger system (as in Sharepoint, for example).
Notification Templates: You might also want to send notifications in a specific way, such as an in-app
notification, email, or push notification on another device.
1.3. Discussing and agreeing level of technical support
A service-level agreement (SLA) is a commitment between a service provider and a client. Particular
aspects of the service – quality, availability, responsibilities – are agreed between the service provider and
the service user.
The most common component of an SLA is that the services should be provided to the customer as
agreed upon in the contract. As an example, Internet service providers and telecom will commonly
include service level agreements within the terms of their contracts with customers to define the level(s)
of service being sold in plain language terms. In this case the SLA will typically have a technical
definition in mean time between failures (MTBF), mean time to repair or mean time to recovery (MTTR);
identifying which party is responsible for reporting faults or paying fees; responsibility for various
data rates; throughput; jitter; or similar measurable details.
Useful Feedback
It points out an actual pain point or problem.
This feedback has a point. A customer has faced an issue with your product or service and is reflecting on it.
There is something for you to mend or improve in this situation.
It would benefit others to implement this feedback.
This feedback isn't solely the opinion of an individual customer. Typically, it reflects the thoughts of several
customers, some of whom may not have spoken up about it. Taking this feedback into consideration would
improve the experiences of many of your customers, and, thus, might be a good investment to make.
It's fairly long or detailed.
This feedback shows time and thought. It's clear the customer carefully crafted their feedback, which means that
they care about your business's growth. This is a tip-off that their feedback could really improve your product or
service.
It may suggest one or two improvements, but not a complete change.
This feedback isn't suggesting that you reconsider your entire company strategy, mission, or industry. Instead, the
customer is offering some opportunities for growth or improvement that can be easily tweaked within your
overarching company strategy.
It generally veers on the polite side.
This feedback is relayed in a fairly kind manner. The customer doesn't feel any need to attack your company or
be aggressive. They simply want to relay their thoughts in the hopes that you'll consider them for the future.
Useless Feedback
It doesn't have a clear pain point or problem.
This feedback doesn't have a specific issue for you to track and take into consideration. There is no way for you
to try to "solve" a problem for this customer and improve their experience.
It differs from the feedback others are giving.
This feedback is bringing up a brand-new point. It doesn't seem like any other customers or prospects are facing
a similar experience with your product or service.
It's on the shorter side.
This feedback could potentially be a short burst of angry typing. It doesn't include a lot of details on the situation
and doesn't show signs of clear-headed thought.
It suggests you change your entire company strategy.
This feedback advises you to make large-scale changes to your company. Implementing such changes would not
only be a huge financial investment for you, but it would also take an extended amount of time and require
rebranding.
It's rude.
This feedback is relayed in a harsh way. There doesn't seem to be a basic appreciation for your company. This
customer or prospect simply wants to criticize your business without being constructive.
We've compiled the following list of steps to take after receiving both negative and positive feedback.
Self-Check 3.
Part I. True False Questions
Issue management is the process of identifying and remedying challenges in the workplace. Workplace
issues include everything from team member communication failure to technical malfunctions, and if
you develop a strong issue management system, it can help you avoid these potential problems and
maintain the progress of your current project. If you're responsible for handling workplace issues or
interested in issue management, consider learning about what it is and how to use it in your workplace.
The following steps comprise a basic issue management system that you can use in your workplace:
Identify Issues
The first step in effective issue management is identifying the issue you're attempting to resolve. The
issue can be many different things, like a team member concern, miscommunication, a technical glitch or
the lack of proper equipment. It's important to understand exactly what the issue is so that you can form a
plan to resolve it as quickly and effectively as possible.
once you and your team have solved the problem and productivity in the workplace returns to normal, it's
beneficial to create a comprehensive issue report. In this report, be sure to include details about which
team member reported the issue, the impact, the steps taken to resolve the issue, when and how it
occurred and all staff involved in problem-solving. Creating reports like these after issue management
takes place allows you to develop plans to avoid similar issues in the future
References
Reference Books:
1. "A Guide to Service Desk Concepts" by Donna Knapp
2. "ITIL Foundation Essentials: The Exam Facts You Need" by Claire Agutter
3. "The Practice of System and Network Administration" by Thomas A. Limoncelli, Christina J.
Hogan, and Strata R. Chalup
4. "CompTIA A+ Certification All-in-One Exam Guide" by Mike Meyers