Understand
the tools and techniques used for technical support
1st line support- over the phone/investigate the
issue
2nd line support- analysing and exploring issue
to find solution
3rd line support- fixing the issue/ group
policies
Networks, servers, systems and configurations
-Maintaining the systems with an organization – for the user
to use the system effectively
Tools
VNC (Virtual Network Computing)
VNC is a desktop sharing system that uses the Remote
Frame Buffer protocol to take control of another computer remotely. Companies
use it to check computers which may have a faults or issues that require fixing
by having the user accept a prompt to let the company take control over the
computers mouse and keyboard controls, as well as relaying what’s happening on
the screen back to the company using a network. This allows the company to
analyse the problem without needing to drive out to the place with the computer
with an issue.
Multimeter
A multimeter is an electronic measuring instrument that merges
multiple measurement functions in one unit. An average multimeter can measure
voltage, current, and resistance. A multimeter can be a hand-held device useful
for finding basic faults and field service work, or a bench instrument which
can measure to a very high degree of accuracy.
A Toolkit
A toolkit is very self-explanatory in that it’s a kit
full of multiple useful tools that can be used for repairing various issues
with computers. An example of what could be in the toolkit is electrical tape
for fixing broken wires while still allowing a current through.
Control Panel
The Control Panel is a part of the Microsoft Windows GUI
which allows users to look through and change basic system settings and
controls via applets, such as adding hardware, adding and removing different
software, controlling the user accounts, and changing the accessibility
options.
Task manager
Task Manager is a system monitor and start up manager
that’s included with Windows. It provides limited information about many
multiple things, such as computer performance, what applications are running, the
processes and CPU usage, commit charge and memory information, network activity
and statistics, users that are currently logged-in, and system services.
Techniques
Direct question of users; recording faults and remedies e.g.
fault log, solution database
IT technician will ask questions to the users regarding what
problems they are having and what they have done to try and remedy the
situation at hand. The questions will usually be kept simple and easy
understand so that the person having the technical difficulties don’t get lost.
After questioning, the IT technician will attempt to remedy the problem from
the acquired information.
A fault log is used to record problems that the user has already
experienced so that the technician can check the log to see what problem the
user has experienced. The fault log should include the date, which equipment
had the fault, a brief description of the fault, what applications were being
used when the fault occurred, a note of any error messages generated, and a
record of any action taken to resolve the problem so that the user can be referred
back to the previous problem and how to fix it, which saves time and there will
be less hassle.
A solution database is a software that has information
regarding many problems that can occur, by giving user the solution that would
be necessary to fix the problem by using the database. It also offers the
ability to store, link and access problem symptoms and solutions. Because the
Solution Database stores custom information, the same information can be used
by many different types of companies in different business scenarios.
Types of faults:
Loss of service: connection failure, peripheral failure,
mouse and/or keyboard stop responding, a crash
Poor performance: The general slowing down of the system,
webpages taking longer to load, printer taking longer to print. The system
isn't running optimally.
Virus: Viruses are named viruses because they spread by
replicating themselves. They can erase data and corrupt files. PCs can be
attacked by viruses, having them arrive through an email or during access to
the Internet.
Error messages: An error message alerts users of a problem
that has already occurred. On the contrary, a warning message alerts users of a
condition that could cause a problem in the future. Error messages can show up
in various ways, like using modal dialogue boxes, in-place messages or
notifications.
Understand
how organisational policies and procedures influence technical support
Working procedures and policies:
Organisational guidelines:
Reporting of faults: In IT
support, reporting a fault as soon as it happens will give the opportunity to
deal with it faster and have there be a better chance to fix it. It will also
mean whatever has been affected, won't be disrupted for long. Reporting faults will
also allow the team leader to prioritise their faults, so the more important
ones can be addressed first. Should a fault occur, it should be reported to the
next in command so they can make the necessary decisions about how to solve it.
Internet use: Company computers
are only to be used for work related things like looking at research into what
work needs to be done. Companies must make sure that their employees are
following work guidelines and not ensuing things unrelated to the company such
as YouTube, illegal sites or games. Punishment for these acts will be within
company policies, this means people can lose their jobs, lose pay or have to
work over time.
Security: All companies must
have some sort of anti-virus that routinely checks the server and computers to make
sure no harmful viruses or malware has affected them. If any are found then
they must be removed to keep the security in top shape, otherwise other viruses
might use the same path to get into information stored. All companies must back-up
their information on not only the computer, but on the server as well so if
anything were to happen then there will be a backup of the work that can be
accessed and worked on like normal.
Service level agreements: This
is a legal binding contract between the company and the IT technicians that
states what the IT technicians must do, and what specifications they must meet while
at the company and when doing their job.
Confidentiality: Confidentiality
is important in IT technical support as data about the company can be easily accessed
and stolen by employees if they so choose. Having a policy in place won’t stop
anyone from doing this, however, it may make them reconsider what they’re doing
when they consider the consequences of being caught. Confidentiality between
the company and the customers is also part of said policy. The company is not
allowed to give or display any of the customer’s personal information to anyone
without their consent, as legal action can be taken if they do.
Sensitivity of information: This
falls into the same category as confidentiality, because you cannot make personal
information of the company public to anyone, or share it with any unauthorised
people. Breaking this rule would be a breach in the company’s security and will
almost certainly lead to you getting fired and/or you will be required to pay a
fine. In IT support, leaking a company’s personal information can mean that
rival companies will have an edge in the competition, and that the company's
system will be at risk from hackers.
Organisational constraints:
Costs of resources required: You
can’t expect all companies to have millions of pounds to buy the best equipment
with, so IT support needs to find cheap but effective equipment, which still
allows them to do the job efficiently. This means that it might take more time
to do certain jobs because they don't have the necessary equipment, or they
might not be able to do the job at all without the correct software etc. In order for IT support to maintain efficiency
they need the correct resources to do the job, but if they’re running low on
something important it will delay certain jobs. For example, if they don't have
enough staff, or the correct software and hardware, they will have to find
alternate routes to get the job done.
Time: Things need to get done
quickly this day and age to be more effective and efficient to help support the
people with problems be it in or out of the company, when going into a bigger
company you will find that things are categorised and deadlines are set, this
gives the employees have a clear goal, but it also allows the work to be
processed and re-evaluate for a better rating.
User expertise: IT Support is
all about having a person able to assist you. If they are new at their job, they
will take longer and will be much more likely to make mistakes. The more
experienced employees will be able to do the job much quicker and much more
efficiently. Some key points that are needed to fix the problem will usually need
to be acquired through asking questions, which depending on the skill of the IT
technician, they may know the answer without even needing to ask.
Outsourcing of support services
+ advantages/disadvantages: Outsourcing of support services is a good way to
improve the company. The company that you get outsourced to will often time
have better equipment and experience, meaning the employees will be able to do
a better, faster job. However, outsourcing to other countries is often cheaper
than hiring new staff, which leads to a lot of foreign people picking up the
phone, but because of where they are the reception will be sub-par without the
right software and hardware, this may lead to the loss of customers which will
reflect badly on the company.
Companies will use inhousing to hire people into the company to do work instead of sending that work out to others in order to keep a close watch on the supplies being used. Doing this will cost extra at first but ultimately will save money on the companies supplies.
Companies will use inhousing to hire people into the company to do work instead of sending that work out to others in order to keep a close watch on the supplies being used. Doing this will cost extra at first but ultimately will save money on the companies supplies.
Discuss the
importance of keeping fault logs
A fault log is important because it’s used to
record problems that the user has already experienced so that the technician
can check the log to see what problem the user has experienced. Because the
fault log should include the date, which equipment had the fault, a brief
description of the fault, what applications were being used when the fault
occurred, a note of any error messages generated, and a record of any action
taken to resolve the problem, this allows IT technicians to have a good idea on
how to fix any reoccurring problems which cuts out most of the hassle of
figuring out how to fix the fault.
Fault records will be valid so
long as the people who are filling it in are consistent and accurate. If the
records are updated correctly and consistently it will stay valid and reliable.
However an issue with this is that if the record is failed to be updated or the
information it’s updated with correct it will stop being useful.
Review a
recent advance in support systems technology
Virtual private network (VPN)
A VPN makes it so a private
network is attached to a public one like the internet. This allows people to
send and receive data as if they were using a private network despite them
using a public or shared network, which gives them the benefits for using a
private network such as the security, functionality and management policies.
VPN suppliers have added
features and functionality to their products in recent years, these are aimed
at easing management issues, strengthening the security, and adding more
coverage for a wider range of communications mechanisms, devices and computer
operating systems. Because of this, a wave of new and improved VPN products
have been released.
Benefits: VPNs allow for a communication
at a much higher level of security in comparison to other remote communications.
The costs of operating a VPN within an organization are noticeably lower than
other configurations. VPNs are capable for scalability within the company
because of how flexible it is in that aspect, which allows for new users to be
add easily with having to add new components. This also applies for business
partners and gives remote employees the ability to safely check in/out.
Drawbacks:
A VPN can have a complex design and security implementation. Because of this it
needs someone capable of understanding at a professionally high level for the
best type of VPN configuration and so they can deal with the potential security
issues that can occur when using a VPN. If for some reason more infrastructures
need to be created the solutions may stop being compatible, causing technical
issues if a different product vendor is used than the one that was used for the
current infrastructure. On the other hand, depending on your product vendor, when
working with the same vendor the cost of deploying additional infrastructure can
potentially increase. When mobile devices are used to connect to the VPN there can
be issues with security, more so when the connection is wireless. Because of
this, an extra solution might be required to beef up the security when mobile
devices are being used to login to the VPN.