6293A-ENU TrainerHandbook
6293A-ENU TrainerHandbook
6293A-ENU TrainerHandbook
M I C R O S O F T
L E A R N I N G
P R O D U C T
ii
Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. The names of manufacturers, products, or URLs are provided for informational purposes only and Microsoft makes no representations and warranties, either expressed, implied, or statutory, regarding these manufacturers or the use of the products with any Microsoft technologies. The inclusion of a manufacturer or product does not imply endorsement of Microsoft of the manufacturer or product. Links may be provided to third party sites. Such sites are not under the control of Microsoft and Microsoft is not responsible for the contents of any linked site or any link contained in a linked site, or any changes or updates to such sites. Microsoft is not responsible for webcasting or any other form of transmission received from any linked site. Microsoft is providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement of Microsoft of the site or the products contained therein. 2011 Microsoft Corporation. All rights reserved. Microsoft and the trademarks listed at http://www.microsoft.com/about/legal/en/us/IntellectualProperty /Trademarks/EN-US.aspx are trademarks of the Microsoft group of companies. All other marks are property of their respective owners.
iii
iv
vi
vii
viii
ix
Acknowledgments
Microsoft Learning would like to acknowledge and thank the following for their contribution towards developing this title. Their effort at various stages in the development has ensured that you have a good classroom experience.
xi
Contents
Module 1: Implementing a Troubleshooting Methodology
Lesson 1: Introduction to the EDST Job Role Lesson 2: Overview of Troubleshooting Steps 1-3 1-14
xii
Course Description
This course is designed for Information Technology (IT) professionals who have experience with Windows XP and Windows Vista who work as Windows 7 Enterprise Desktop Support Technicians (EDSTs) in Tier 2 support environments. The goal of this training is to enable these individuals to support the Windows 7 operating system and solve technical troubleshooting problems in a Windows 7 and Windows Server 2008 R2 networking environment. The course builds on skills attained in Course 6292A: Installing and Configuring Windows Course 6420B: Fundamentals of Windows Server 2008 .
7 Client and
This course will not cover deployment scenarios and Tier 3 escalations, including comprehensive Group Policy configuration, and domain administration and deployment. Course 6294A covers deployment scenarios and support. By the courses end, students will have been exposed to the process of establishing and using a troubleshooting methodology, and the EDST job role and responsibilities. Additionally, students will be exposed to various troubleshooting tools and techni ques that enable them to address the following Windows 7 issues in an ente rprise network environment: Startup Group Policy Hardware and device drivers Performance Network connectivity Remote connectivity User profile and logon Security Applications
Audience
Primary audience: DST in an Enterprise IT organization Secondary audience: DST in an upper MORG (medium organization) with approximately 475 personal computers
EDSTs are experienced IT profession als who focus on a broad range of issues that relate to desktop operating systems, desktop applications, mobile devi ces, networking, and hardware support. EDSTs must combine technical expertise with problem-solvin g and decision-making skills, and possess a deep understanding of their business and technical environments, so that they can resolve support issues quickly. They consider all variables, justify resoluti ons with a logical troubleshooting approach, and relate tradeoffs to business and technical requirements and constraints. EDSTs are resp onsible primarily for the maintenance and support of PC desktops, installing and testing line-of-business applications on end users computers, and making changes to user desktops or reimages, as necessary.
xiv
EDSTs have used previous versions of Windows desktop operating systems and may have experience with Windows Server operating systems. Their job requires them to stay knowledgeable and skilled with using new versions and updates of technology, as their business environment dictates. They conduct most server management tasks remotely by using Terminal Server or other administration tools installed on their local workstation.
Student Prerequisites
In addition to their professional experience, students technical knowledge: who attend this training should have the following
Networking fundamentals, including TCP/IP, User Datagram Protocol (UDP), and Domain Name System (DNS) Active Directory Domain Services (AD DS) principles and management Windows Server 2008 fundamentals Windows client fundamentals
Students who attend this training can meet the prerequisites by attending the following courses, or by obtaining equivalent knowledge and skills: Course 6292A: Installing and Configuring Windows Course 6420B: Fundamentals of Windows Server
7 Client
2008
Course Objectives
After completing this course, students will be able to: Describe the processes of establishing and using a troubleshooting methodology, and define the EDST job role and responsibilities. Troubleshoot startup issues on a Windows 7 computer. Troubleshoot client-configuration failures and Group Policy object (GPO) application issues. Troubleshoot hardware device and device driver issues. Troubleshoot network connectivity issues. Troubleshoot remote connectivity issues. Troubleshoot logon and resource access issues. Troubleshoot security system issues, such as Encrypting File Systems (EFS), BitLocker Encryption, and file permissions. Troubleshoot operating system and applications issues. Troubleshoot performance issues.
Drive
Course Outline
This section provides an outline of the course: Module 1 , Implementing a Troubleshooting Methodology describes the steps involved in establishing and using a typical troubleshooting methodology. It also covers the job role and responsibilities of the EDST. Module 2 , Troubleshooting Startup Issu es describes how to use Windows 7 recovery tools to troubleshoot startup problems. Additionally, it provides the information to configure and troubleshoot startup settings, and to troublesho ot operating system services. Module 3 , Using Group Policy to Centralize Configuration describes Group Policy application. It also covers steps to troubleshoot both client configuration failures and GPO application issues. Module 4 , Troubleshooting Hardware Device, Device Driver, and Performance Issues helps students troubleshoot issues related to hardware devices and device drivers by identifying basic hardware-related issues. Additionally, the module he lps students determine hardware failu re issues, and the problems that device drivers can cause. Finally, this module provides guidance on how to configure performance options in Windows 7, as well as monitor reliability and performance of Windows 7 computers. Module 5 , Troubleshooting Network Connecti vity Issues describes how to tr oubleshoot issues related to network connectivity by providing the steps to determine the network configuration of client computers, and then to troubleshoot network connections. Module 6 , Troubleshooting Remote Connectivity Issues describes how to troubleshoot remote connectivity issues. This module instructs students on how to configure and troubleshoot virtual private network (VPN) connections, as well as how to use Remote Desktop and Re mote Assistance to assist users. This module also covers the troubleshooting steps for Network Access Protection (NAP) and DirectAccess issues. Module 7 , Troubleshooting Logon and Resource Access Issues describes how to use troubleshooting tools and methods to troubleshoot user profile and lo gon scripts issues, and issu es with file and printer access. Module 8 , Troubleshooting Security Issues describes how to troubleshoot issues related to security systems such as EFS, BitLocker, an d file permissions. The module instructs students how to troubleshoot and recover files encrypted with EFS and BitLocker-protected drives. In this module, students also troubleshoot file permissions, content access issues, and Windows Internet Explorer issues. Module 9 , Troubleshooting Operating System and Application Issues describes how to troubleshoot issues related to operating system features and ap plications, including application installation and operation issues. This module also addresse s applying application and Windows updates.
xvi
Course Materials
The following materials are included with your kit: Course Handbook A succinct classroom learning guide that provides all the critical technical information in a crisp, tightly-focused format, which is just right for an effective in-class learning experience. Lessons : Guide you through the learning objectives and provide the key points that are critical to the success of the in-class learning experience. Labs : Provide a real-world, hands-on platform for in the module. Module Reviews and Takeaways knowledge and skills retention. you to apply the knowledge and skills learned
Lab Answer Keys : Provide step-by-step lab solution guidance at your finger tips when its needed.
Course Companion Content on the http://www.microsoft.com/learning/companionmoc/ Site: Searchable, easy-to-navigate digita l content with integrated premiu m on-line resources designed to supplement the Course Handbook. Modules : Include companion content, such as questions and answers, detailed demo steps and additional reading links, for each lesson. Additionally, they include Lab Review questions and answers and Module Reviews and Takeaways sections, which contain the review questions and answers, best practices, common issues and troubleshooting tips with answers, and real-world issues and scenarios with answers. Resources : Include well-categorized additional resources that give you immediate access to the most up-to-date premium content on TechNet, MSDN , Microsoft Press . : Includes the
Student Course files on the http://www.microsoft.com/learning/companionmoc/ Site Allfiles.exe, a self-extracting executable file that contains all the files required for the labs and demonstrations.
Course evaluation At the end of the course, you will have the opportunity to complete an online evaluation to provide feedback on the co urse, training facility, and instructor. To provide additional comments or feedback on the course, send e-mail to [email protected]. To inquire about the Mi crosoft Certification Program, send e-mail to [email protected].
Software Configuration
The following software is installed on each VM: Windows Server 2008 R2 Enterprise Windows 7 Enterprise
Classroom Setup
Each classroom computer will have the same set of virtual machines configured in the same way. All of the virtual machines are deployed on each student computer.
*Striped
1-1
Module 1
Implementing a Troubleshooting Methodology
Contents:
Lesson 1: Introduction to the EDST Job Role Lesson 2: Overview of Troubleshooting Steps 1-3 1-14
1-2
Module Overview
It is important that you understand the responsibilities of an Enterprise Desktop Support Technician (EDST), the benefits of developing a troubleshooting methodology, and the benefits of following the procedures that your methodology defines.
Objectives
After completing this module, you will be able to: Describe the job role of the EDST. Describe the steps of a typical troubleshooting methodology.
1-3
Lesson 1
As an EDST, your job is to act as an escalation point for problems that help-desk personnel cannot resolve; to support end users directly; and to troubleshoot various problems. However, an EDSTs responsibilities involve much more than simply fixing problems. An EDST must be able to: Listen, either to an end user or to the help-desk staff. Gather and interpret information. Diagnose and resolve problems, or escalate problems. Properly document a problems resolution in the manner that company policy dictates.
The goal of this lesson is to introduce you to the EDST role and describe how an EDST best supports end users, both directly and indirectly, in a Windows 7 environment.
Objectives
After completing this lesson, you will be able to: Describe the EDST job role. Describe the desktop support environment. Describe how to interact with end users. Explain the benefits of a troubleshooting methodology.
1-4
As an EDST, your job is to increase end-user productivity by troubleshooting and trying to solve the computer and system issues that end users experience. This requires that you understand your role in the support environment. An EDST must fulfill a number of roles in the support environment. A good EDST possesses technical expertise in addition to nontechnical aptitude, such as excellent interpersonal skills, that enable the EDST to build rapport with both end users and other members and users of the support environment. As an EDST, someone may describe you as: A good troubleshooter, who is able to isolate an issue quickly by performing specific diagnostic tasks. A knowledgeable resource, who is familiar with relevant products, and is able to perform hardware and software installation tasks, system monitoring, and maintenance. An effective communicator, because help-desk staff and end users typically are not calling you for social reasons. Rather, they may be distressed or upset, and you will need to manage these interpersonal and technical interactions simultaneously and effectively. An information source, because even if you do not know the answer, you need to know where to get the answer and when to escalate a problem.
1-5
As an EDST, your position is located in tier 2. The following table provides an overview of a typical technical support structure. Tier Tier 1, help desk Role Support Description Supports day-to-day client operating systems, applications, and hardware troubleshooting. Follows prescriptive guidelines, and provides end-user phone support. Provides day-to-day server and software troubleshooting. Manages and supports the organizations operating systems. Responds to help desk requests when problems are escalated. Analyzes and designs within a single technology and then implements the technology. Handles complex troubleshooting, including escalations from administrators. Analyzes and designs enterprises.
Operational
Tactical
Tier 4, architect
Strategic
Note Most organizations implement some form of help-desk incident management system; this database is often referred to as a help-desk ticketing system. The purpose of the help-desk ticketing system is to provide a single point for recording, tracking, and updating reported problems as support staff attempts to resolve them. If the issue is outside that scope, you should escalate it to a higher tier levelsystems engineers or architects, as appropriate. You must troubleshoot and provide information about many aspects of the Windows 7 operating system that is beyond the responsibility of the help desk, such as: Resolving more complex installation and connectivity issues. Configuring and troubleshooting desktop environments for end users. Troubleshooting multiple boot or multiuser computers. Installing, configuring, and troubleshooting more complex hardware.
As an EDST, you should use proper procedures to document the incident. You also must operate within the organizations Service Level Agreements (SLAs), such as resolving a problem within a certain timeframe or within a specific budget. In contrast, an EDST does not have to perform tasks that engineers typically perform, such as complex analysis or design.
1-6
1-7
You will encounter two types of networks in a corporate support environment: workgroups and domains. In both environments, end users can share common resources, such as files, folders, and printers. These environments also provide security measures to secure and protect end users personal data, and your organizations network resources and data, from outside forces. Despite their similarities, there are important differences between workgroups and domains, which this section details.
Workgroups
Workgroups, which are logical groupings of networked computers that share resources, are often referred to as peer-to-peer networks. The workgroup is the easiest network to set up and maintain, but it is the least secure. Each computer maintains its own local security database, which contains the valid user accounts for logging on to that computer. The user accounts secure the data on each computer, and protect the computer from unwanted access, but because no single computer provides centralized security of user accounts for all of the networks computers, the network is decentralized.
Note Workgroups typically are configured for home networks, small home offices, and small businesses in which the computers are in close proximity to one another and are sometimes connected by using a hub, switch, or router. Because workgroups are not the most secure option for a network, larger corporations typically do not use them.
Domains
Domains are logical groupings of networked computers that share a common database of users and centrally managed security on a single server, known as a domain controller, or a group of servers (domain controllers). A single domain must have one or more domain controllers, and these computers provide Active Directory Domain Services (AD DS), such as access to resources, security, and a single point of administration.
1-8
Domains are logical groupings, which you configure independent of the networks actual physical structure. Domains can span a building, city, state, country, or even the globe. You also can configure them for a small office, and you can connect a domains computers by virtual private network (VPN), Ethernet, broadband, satellite, or wireless connections.
Note Larger companies and corporations typically configure domains because they are the most secure option for a network, they offer centralized security and management, and they are extensible. Smaller companies generally do not use domains because domains are more expensive, and require more attention than workgroups.
1-9
The ability to interact effectively with both end users and the staff of the help desk is vital to an EDSTs success. You also must know how to talk to people with various levels of experience. For example, you need to know how to ask questions, how to interpret what end users say, and how to suggest changes. You must know where to search for answers to problems, and how to apply and document the solutions to those problems. End users must be satisfied with your solutions and believe that you treated them fairly and with respect. There are many types of end users. Each end user has expertise in different areas, and each end user has varying degrees of expertise. It is important that you can identify an end users expertise level when you are working in an EDST role to avoid alienating the end user. For example, reminding a technologically experienced end user to turn on the printer may cause the end user frustration. It is still necessary to ensure that the basics have been checked, however, because even technically experienced end users sometimes forget to turn on their printers.
Note Many organizations provide a script for help desk staff to use when performing initial problem classification. This will help you and the help desk progress through all the fundamental questions that can help to classify the problem. Ensure you check the incident record in the ticketing system before you question the end user yourself otherwise you might be repeating questions asked by the help desk.
1-10
Also, check the ticketing system to determine: Who has worked on this problem, or one like it, previously? Who has the same problem on another computer?
Note Bear in mind that the help-desk staff may know the problems cause, but may lack the administrative permissions to fix it.
Note The help-desk staff may have experienced similar or identical problems, and therefore may know the cause. As you work through these questions with the help desk, and where necessary, the end users, document the answers carefully in the incident record in the ticketing system, listen to everything said, be polite and professional, and make notes of possible solutions as they occur.
1-11
If necessary, leave the situation for a few minutes to digest the information, and then check company documentation, online support, or other resources for answers. It is likely that the end user with whom you work has spoken to the help desk before. If the end users expectations were not met, the end user may have lost trust in the desktop support process. As an EDST, you are in a unique position to determine if there is a value gap between what the end user expects and what the end user receives, and to ensure that each end users needs are met. In general, however, end users expect the EDST to: Diagnose the problem. End users expect you to grasp the nature of their problems quickly based on the information that they provide to the help desk and directly to you, regardless of the end users experience levels. Explain the plan of action. After you have diagnosed the problem, end users expect you to have a plan of action that entails a logical sequence of steps that either you or the end users can implement quickly. Keep end users informed about the troubleshooting process. End users want to know what you are doing to troubleshoot their problems, if the plan of action is working, and how close you are to solving their problems. Teach end users how to solve the problems and how to avoid them in the future. End users want to understand how their problems occur, and how they can solve the problem without desktop support in the future.
Note It may not be necessary to ask all these questions. In addition, the answers to preceding questions may determine the order of the subsequent questions.
1-12
The particulars of various troubleshooting methodologies can vary, and the processes involved in troubleshooting computer-related problems are not precise. Most methodologies share some common processes and procedures, which this topic aims to identify.
Classify
When an end user first discovers and reports a computer problem, a series of classification processes begins. During these processes, you gather information from the end user in an attempt to establish the problems nature and scope. The initial discussion might reveal information that results in an immediate resolution to the problem, but with more complex or serious problems, you must continue to troubleshoot the issue to arrive at a resolution. Problems that affect many end users, rather than a few, are more serious in terms of their impact on organizational productivity, and you must resolve them more quickly. Classification allows you time to determine the scope and impact of problems so that you can prioritize them. Even if you are immediately able to resolve the problem, you must log the problem by using the methodology that your organization has in place. Appropriate logging procedures ensure that you do not lose any incident reports. Access to detailed incident reports allows organizations to monitor their information technology (IT) systems more effectively and make informed decisions about those systems.
1-13
Test
When you have prioritized and logged a reported incident, the testing phase starts. During the testing phase, you use a number of processes to determine the probable cause of a reported problem. You might start by listing the possible causes. Typically, you might try to divide and isolate these possible causes. In computer systems, dividing and isolating possible causes might mean making a distinction between: Server and workstation-related issues. Hardware and software. Operating system and applications.
In this way, you can eliminate possible causes, which eventually enables you to determine probable causes. When you reduce the list of possible causes to a manageable number, you can start a testing process. The aim of the testing process is to determine the probable cause from your list of potential causes. One method you can use is to reproduce the problem in a test environment. If you can reproduce a problem easily, you likely can determine the probable cause. If a problem is more difficult to reproduce, you must study your results, and then you may need to modify your initial thoughts about the problems probable cause.
Escalate
In the event that you cannot find a resolution during the initial testing phase, you must either consult additional documentation or escalate the problem. If you suspect that the issue stems from a component, you can escalate the problem to the components manufacturer. For other issues, if have more internal resources to call upon, you can escalate the problem in your organization. Your organization should have an established process for handing off reported incidents to your organizations second-tier support staff. The second-tier support staff then asks questions to classify the problems scope and assign it a priority level.
Report
When you resolve an incident, you must document the resolution. It is important to record any changes to your IT systems configuration. Additionally, problems have a habit of occurring more than once, and when you document them properly, you can save time resolving subsequent occurrences of the same problem.
1-14
Lesson 2
Any sort of troubleshooting methodologyregardless of whether you are troubleshooting computers, plumbing systems, or automobile engineshas a common set of processes and procedures, including the following: Incidents pass through a series of processes that are designed to resolve problems as quickly and efficiently as possible. Classification, testing, escalation, and reporting provide the backbone of any troubleshooting methodology. The methodology evolves over time, as technologies change and new tools become available.
This lesson details the stages of a troubleshooting methodology, and how you can develop best practices for problem reporting, initial data collection, implementing a plan of action, and recording incident resolution.
Objectives
After completing this lesson, you will be able to: Identify the stages in a common troubleshooting methodology. Discuss elements of common troubleshooting methodologies. Describe the process of problem reporting. Describe the process of initial data collection. Determine and use best practices for developing an action plan.
1-15
Describe the process of implementing an action plan. Describe the process of recording the problem resolution. Discuss the benefits of using a methodology.
1-16
When you begin to troubleshoot a problem, you should define the steps clearly that you need to take resolve the problem.
Gather Information
It is possible that the support staff might resolve the reported problem during the initial reporting stage; this often happens with relatively simple problems. If it is not possible to resolve the issue immediately, support staff must gather more information about the problem in an effort to identify possible causes. You can use monitoring tools, examine event logs, or simply ask the end user additional questions in an effort to gather additional information.
1-17
The subtractive approach is a methodology in which you form a mental picture of the computers system components. Separate the components in two halves along a testable line. For example, is it a hardware component or a network component that is causing the problem? Then, test to see on which side of the line the problem falls, and then continue in the same manner until you isolate the problem component.
Whichever approach you take, the aim of this stage is to isolate the cause of the problem. When you feel you have determined the cause, you must test your assumptions. If the tests prove inconclusive, you must continue until you determine the real cause. After your tests prove the cause of a problem, you must plan your course of action. For instance, if the problem requires that you replace a disk in a server, you must order the new disk, determine a suitable time to perform the replacement, back up existing data on the old disk, shut down the server, physically install the new disk, and perform a restore of the data to the new disk.
1-18
Your instructor will assign you a role in your organization, and during this discussion, you will consider the benefits of a troubleshooting methodology for your role. The roles are: End users. Help-desk support staff. Desktop support staff. Managers and planners.
During your discussion, create a list of benefits for your organizational role. To help facilitate a useful discussion, you might consider how a troubleshooting methodology results in the following outcomes: Faster problem resolution Improved productivity Better accountability Improved communications Better update management
When you complete your discussion, share your conclusions with the class.
1-19
It is important to ensure that a well-understood process exists in your organization for the proper reporting of support problems.
Problem Detected
The process of reporting a support problem starts with an end user detecting a problem with the computer hardware, operating system, or an application. If the problem is intermittent, the end user may take no immediate action. If the problem occurs again, the end user may take further action. End users may attempt to resolve the problem themselves or contact the help desk for assistance.
Self-Help
Whenever possible, encourage end users to help themselves. You can help end users resolve some problems quickly if the end user stops and thinks about the event that just occurred. Always provide adequate training for your end users. Not only does this allow them to get the most from their applications, but it also means that they are less likely to encounter problems and are more likely to resolve many problems themselves, without contacting the help desk.
1-20
If you lack the skills necessary to resolve the reported problem, assign the problem to other individuals in your organization. For complex problems, you might assemble a specialist team to resolve the problem. Update the incident record in the ticketing database to help track information about activity that you, or others, have performed in relation to the reported problem.
During this phase, you might determine a probable cause of the reported problem, but be careful not to jump to a conclusion because you might waste a lot of time and resources. Your goal during this phase is to define the problem accurately.
Escalation
When a problem requires escalation between support tiers or to external vendors, ensure that you record an appropriate level of detail to pass to the next support level. It is very helpful to have an escalation procedure that is clearly defined to ensure that you can do this efficiently. The procedure may contain the following information: A precise description of the reported problem. A record of any error messages associated with the problem. A record of the resolution attempts that support staff make, and the results of each attempted fix. A record relating to any diagnostics tools that support staff use. The length of time that can elapse before you must escalate the problem.
You might consider escalation to external vendors when: You cannot resolve the problem. You have insufficient internal resources to resolve the problem. Your organization does not have the required skills to resolve the problem. You have identified the probable cause of the problem, and it lies with a specific third-party component.
Whenever you escalate a problem, always retain ownership of the problem, and use the database record to track progress toward a resolution. Also ensure that you provide any necessary assistance to other support tiers and external vendors.
1-21
Resolution
After you determine a probable cause and develop an action plan, you should perform an assessment of this plan. The assessment should include: Liaison with any specialist support staff involved in the plans implementation. Completion of any required requests according to change-management procedures. Analysis of the possible impact of the proposed changes on the IT infrastructure. Details of any testing of the proposed plan. Details of plans to roll back the changes in the event that they do not achieve the desired result.
After you assess the proposed action plan, you can execute it. In the event that the action plan does not resolve the problem, consider whether to roll back the changes you have made according to the action plan assessment. You also must revisit the classification phase, because it is possible that the initial diagnosis and classification were incorrect.
1-22
Collecting information about a reported problem is vitally important. By following a precise, logical series of steps, you can define the nature of the problem clearly, and then work toward establishing a precise cause.
Question
The process starts when an end user follows a defined procedure to contact the help desk, typically by sending an e-mail or making a phone call. Members of the help desk team must question the end user clearly and precisely about the problems symptoms so that they can begin defining the cause of the problem.
Listen
When an end user reports a problem to you, listen carefully to what the user has to say. Often, as the user responds to your questions, and repeats the history of a problem, he or she might unwittingly reveal its cause. By asking users to start from the beginning and explain exactly what they were doing immediately prior to noticing the problem, and what they were doing when they noticed the problem, you may determine the problems cause.
Note It is important to record the problem, and any pertinent information that the user communicates to you, in a database. You will use the database record that you create throughout the problem life cycle to record progress toward a resolution.
1-23
Consult
When you record all of the pertinent information from the user, your next task is to determine the cause of the reported problem. Start by consulting existing documentation about known problems. It is quite possible that the problem has occurred before. If this is the case, you can move quickly toward a resolution, and then close the incident.
Research
If existing documentation does not reveal any probable causes, you must perform some research. You can perform this research using a variety of sources. For example, you might search the Microsoft Support Knowledge Base for information about the problem. You also may search online forums for related material to aid in problem resolution. If you are unable to determine probable causes from this initial research, you can also perform information gathering using the tools provided in the Windows 7 operating system, including those in the following table. Tool Remote Assistance Use With Remote Assistance, users can request and receive help by using just one mechanism. The administrator that is providing remote assistance uses Remote Assistance to take control of a problem computer remotely, while the user remains logged on while watching what the administrator is doing on the screen. You can use Remote Desktop to take remote control of a problem computer. The logged-on user is disconnected, and the console is locked. You can use Event Viewer as a single interface for viewing log files on the problem computer. These logs provide information about applications, system events, and security-related matters. With Device Manager, you can examine and change the configuration of hardware devices and device drivers. With Network Diagnostics, you can troubleshoot and diagnose network-related problems. With Windows System Information, you can examine a computers configuration with a single tool. You can also use the Microsoft Windows System Information tool to produce configuration reports. Provide access to a variety of command-line tools that you can use to assist with the research process, including ipconfig, netstat, winrm, and winrs.
Remote Desktop
Event Viewer
Command-Line Tools
Develop
After you determine a probable cause, you must develop an action plan, which the next topic describes.
1-24
Simple problems are easy to resolve quickly, and they might not require much consideration in terms of an action plan. For example, an end user reports that he has forgotten his password. Your action plan includes opening Active Directory Users and Computers, and resetting the password. However, more complex or serious problems require careful consideration.
Note Virtualization technologies (such as Windows Virtual PC) provide a convenient way to build test environments without having to invest significantly in additional hardware or software.
1-25
Note Although the steps for the action plan in the slide are numbered, you might not complete the steps in this order.
1-26
Keep in mind that the specific stages of your plan of action may vary because of the complexities or circumstances of a specific problem.
1-27
1-28
In most support organizations, a process exists to properly record and document a problem that a user reports. Typically, the help-desk staff records the reported incident into a database. When a problem is resolved, you must close the reported incident, and then communicate the resolution to the user who reported the problem.
1-29
Note Microsoft provides guidance in incident management within the Microsoft Operations Framework (MOF).
1-30
Your instructor will initiate a classroom discussion in the form of a brainstorming session. Please consider the stages of a troubleshooting methodology, and share your own experiences with the class. During the discussion, feel free to make practical recommendations on the following topics: How does your organization apply the troubleshooting stages? How much do self-help telephone and Web portals help users? Who does the data collecting, and how do they do it? How does your organization handle communications between the first- and second-tier support staff and the end user? How much can you achieve remotely? How do you typically communicate problem resolutions to other support staff to help resolve future problems?
2-1
Module 2
Troubleshooting Startup Issues
Contents:
Lesson 1: Overview of the Windows 7 Recovery Environment Lesson 2: Configuring and Troubleshooting Startup Settings Lesson 3: Troubleshooting Operating System Services Issues Lab: Troubleshooting Startup Issues 2-3 2-17 2-33 2-39
2-2
Module Overview
Corruptions in the system registry, or issues with device drivers or system services, often cause startuprelated problems. Therefore, systematic troubleshooting is essential so that you can determine the underlying cause of the problem quickly and efficiently. This module describes how to identify and troubleshoot issues that affect the operating systems ability to start, and how to identify problematic services that are running on the operating system. It also describes how to use the Microsoft Windows 7 operating system advanced troubleshooting tools, collectively known as the Microsoft Windows Recovery Environment (Windows RE).
Objectives
After completing this module, you will be able to: Use Windows 7 recovery tools to troubleshoot startup problems. Configure and troubleshoot startup settings. Troubleshoot operating system services.
2-3
Lesson 1
To recover computers that are running Windows 7 and that will not start, or which are starting with errors, you must recognize what the operating system looks like when it is starting properly. Additionally, a good working knowledge of the recovery tools that Windows 7 provides should enable you to identify and resolve problems that relate to startup issues.
Objectives
After completing this lesson, you will be able to: Describe the Windows 7 startup architecture. Explain the repair and recovery options available in Windows 7. Describe the recovery tools available at the command prompt in Windows RE. Describe how to use Windows RE to check and fix the startup environment. Describe the System Restore process in Windows. Access System Restore to fix the startup environment.
2-4
The Windows 7 boot loader architecture provides a quick and secure mechanism for starting the Windows operating system. The boot loader architecture has three main components: The Windows Boot Manager (Bootmgr.exe) The Windows operating system loader (Winload.exe) The Windows resume loader (Winresume.exe)
Note The BCD provides a firmware-independent mechanism for manipulating boot environment data for any type of Windows system. Windows Vista and later versions of Windows use the BCD to load the operating system or to run boot applications such as memory diagnostics. Its structure is very like a registry key, although it should not be managed with the registry editor. Bootmgr.exe replaces much of the functionality of the NTLDR bootstrap loader that Windows XP and earlier versions of the Windows operating system use. Bootmgr.exe is a separate entity, and it is unaware of other startup operations of the operating system; it switches the processor into 32-bit or 64-bit protected mode, prompts the user for which operating system to load (if multiple operating systems are installed), and it can start NTLDR if you have Windows XP or earlier installed.
2-5
Note Boot-class device drivers have a start value of zero in the registry.
2.
3. 4.
5.
6. 7.
Note Until a user has logged on, startup is not considered successful.
2-6
If your computer fails to start correctly, you can use a number of tools to help resolve the problem.
Accessing Windows RE
To access Windows RE: 1. 2. 3. Insert the Windows 7 DVD, and then start the computer. When prompted, run the Windows 7 DVD Setup program. After you configure language and keyboard settings, select the Repair your computer option, which scans the computer for Windows installations and then presents you with a troubleshooting tools menu.
Note Windows RE is also accessible from the hard disk. This is a more convenient method for accessing Windows RE. However, bear in-mind that with certain failed startup conditions, Windows RE is not available from the hard disk.
2-7
Automatic Failover
Windows 7 provides an on-disk Windows RE. A computer that is running Windows 7 can fail over automatically to the on-disk Windows RE if it detects a startup failure. During startup, the Windows loader sets a status flag that indicates when the boot process starts. The Windows loader clears this flag before it displays the Windows logon screen. If the startup fails, the loader does not clear the flag. Consequently, the next time the computer starts, Windows loader detects the flag, assumes that a startup failure has occurred, and then launches Windows RE instead of Windows 7. The advantage of automatic failover to Windows RE Startup Repair is that you may not need to check the problematic computer when a startup problem occurs. Note that the computer must start successfully for the Windows loader to remove the flag. If the computers power is interrupted during the startup sequence, the flag is not removed, and automatic Startup Repair is initiated. Bear in-mind that this automatic failover requires the presence of both the Windows boot manager and the Windows loader. If either of these elements of the startup environment is missing or corrupt, automatic failover cannot function, and you must initiate a manual diagnosis and repair of the computers startup environment.
2-8
Windows RE provides access to five tools that you can use to help recover your computers startup environment.
Startup Repair
The Startup Repair tool in Windows RE provides a simple and effective way for you to resolve most common startup problems. The following sections describe Startup Repair tool functions. Replace or Repair Disk Metadata. Disk metadata consists of several components, including the boot sector and the MBR. If these files are missing or corrupt, the startup process fails. If you suspect that an issue has damaged or deleted these files, use Startup Repair to check for problems with the disk metadata. Startup Repair automatically checks and, if necessary, repairs the disk metadata. Damage to the disk metadata often occurs because of unsuccessful attempts to install multiple operating systems on a single computer. Another possible cause of metadata corruption is a virus infection. Repair Boot Configuration Settings. Windows XP and earlier Windows operating system versions stored the boot configuration information in Boot.ini, a simple text file. However, Windows 7 uses a configuration store that is in the C:\Boot. If the boot configuration data is damaged or deleted, the operating system fails to start. The Startup Repair tool checks and, if necessary, rebuilds the BCD, by scanning for Windows installations on the local hard disks, and then storing the necessary BCD.
2-9
Resolve Incompatible Driver Issues. Installing a new hardware device and its associated device driver often causes Windows to start incorrectly. The Startup Repair tool performs device driver checks as part of its analysis of your computer. If Startup Repair detects a driver problem, it uses System Restore points to attempt a resolution, by rolling back configuration to a known working state.
Note Even if you do not manually create restore points in Windows 7, installing a new device driver automatically causes Windows 7 to create a restore point prior to the installation.
System Restore
Windows 7 provides System Restore capabilities that you can access from the System Tools folder. If you have a system failure or another significant problem with your computer, you can use System Restore to return your computer to an earlier state. The primary benefit of System Restore is that it restores your system to a workable state without reinstalling the operating system or causing data loss. Additionally, if the computer does not start successfully, you can use System Restore by booting in Windows RE from the product DVD.
Command Prompt
Windows 7 uses a Command Prompt tool from the Windows RE tool set as its command-line interface. The Command Prompt tool is more powerful than the Recovery Console, and its features are similar to the command prompt that is available when Windows 7 is running normally. Resolve Problems with a Service or Device Driver. If a computer that is running Windows 7 experiences problems with a device driver or Windows service, use the Command Prompt tool to attempt a resolution. For example, if a device driver fails to start, use the command prompt to install a replacement driver, or disable the existing driver from the registry. If the Netlogon service fails to start, type Net Start Netlogon at the command prompt. You also can use the SC tool (SC.exe) command-line tool to start and stop services. Recover Missing Files. The Command Prompt tool also enables you to copy missing files to your computers hard disk from original source media, such as the Windows 7 product DVD or USB memory stick.
2-10
Access and Configure the BCD. Windows 7 uses a BCD store to retain information about the operating systems that you install on the local computer. You can access this information by using the BCDEdit.exe tool at the command prompt. You also can reconfigure the store, if necessary. For example, you can reconfigure the default operating system on a dual-boot computer with the BCDEdit.exe /default id command. Repair the Boot Sector and MBR. If the boot sector or MBR on the local hard disk is damaged or missing, a computer that is running Windows 7 will fail to start successfully. You can launch the Bootrec.exe program at the command prompt to resolve problems with the disk metadata. Run Diagnostic and Troubleshooting Tools. The Command Prompt tool provides access to many programs that you can access from Windows 7 during normal operations. These programs include several troubleshooting and diagnostics tools, such as the registry editor (Regedit.exe), a disk and partition management tool (Diskpart.exe), and several networking configuration tools (Net.exe, Ipconfig.exe, and Netcfg.exe). Another option is to load Task Manager (Taskmgr.exe), which you can use to determine which programs and services are running currently.
Note Windows PE is not a complete operating system. Therefore, when you use the Command Prompt tool in Windows RE, remember that not all programs that work in Windows will work at the command prompt. Additionally, because there are no logon requirements for Windows PE and Windows RE, Windows restricts the use of some programs for security reasons, including many that administrators typically run.
2-11
In this demonstration, you will see how to examine the Windows 7 startup environment. To perform this procedure, the instructor must start the computer from the product DVD, and then select the Repair your computer option. The instructor will demonstrate how to use the command prompt and startup repair tools.
Demonstration Steps
1. 2. 3. 4. 5. 6. 7. 8. Use the Hyper-V Manager console to mount the product DVD. Restart the virtual machine. Boot into the setup program, and then select Repair your computer. Open the recovery Command Prompt. Determine where the C drive files are stored. Test some typical command-line tools, such as net start. Use Regedit.exe, sc.exe, and bootrec.exe. Close the command prompt, and then restart the computer.
2-12
Windows 7 enables System Restore features automatically. System Restore takes snapshots of your computer system, and then saves them as restore points. These restore points represent a point in time for the computers configuration when it was running successfully. Once you enable System Restore points, Windows 7 creates them automatically when the following actions occur: You install a new application or driver You uninstall or install certain programs You install updates
Windows 7 also creates them: Once daily. Manually, whenever you choose to create them. Automatically, if you choose to use System Restore to restore to a previous restore point. In this instance, System Restore creates a new restore point before it restores the system to a previous state. This provides you with a recovery option should the restore operation fail or result in issues. Windows RE does not create a restore point for the current state if you are in Safe mode and you restore to a previous state.
Note To create a restore point manually, go to the System Protection tab on the Computer property sheet, and then click the Create button.
2-13
Note If you disable System Restore, Windows deletes all existing restore points.
2-14
In this practice, you will create a system restore point. You then will use both Windows 7 and Windows RE to apply the restore point.
Instructions
For this practice, you will use the available virtual machine environment. Both 6293A-NYC-DC1 and 6293A-NYC-CL1 should be running. Before you begin the practice, you must complete the following steps: 1. 2. 3. 4. On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager. In Hyper-V Manager, click 6293A-NYC-DC1, and then in the Actions pane, click Start. In the Actions pane, click Connect. Wait until the virtual machine starts. Log on by using the following credentials: 5. User name: Administrator Password: Pa$$w0rd Domain: Contoso
2-15
Click Start, right-click Computer, and then click Properties. In System, click System protection. In the System Properties dialog box, click Local Disk (C:) (System), and then click Configure. In the System Protection for Local Disk (C:) dialog box, click Restore system settings and previous versions of files, and then click OK.