SlideShare a Scribd company logo
WIN7 Troubleshooting
Playbook
IT
Troubleshooting Management
Printing
Components
Network
Components
Win7 Startup
Components
File Access
Components
Other
Components
Computername Look forduplicate names by pinging the computername while suspect
machineis turned off
DCHP value Compare valueand network settings;insertE4E and expecterror
DNS Compare valuewith model;E4E and expectnetwork errors
Domain Compare valuewith model; change computername and expecterror
Firewall Compare and simplifysettings
Gateway Compare settings with model
IP address Check duplicates by shutting down machineand pinging the same IP
Subnetmask Compare valuewith model
Networkinginterface Compare model;insertmodelto replace suspectobjectif possible;
connectto a nearestdomain ornetwork and compare resultwith a model
TCP Ports Compare valuewith model;close PORT and expectknown error
Components Isolation Task
Network Components
Authentication Testwith wrong username/password;then do same thing with a model
machine
Automatic login Do manuallogin;automate using existingornon-existing account
BootOptions Simplify bootoptions;compare bootsettings
BIOS Simplify BIOS or hardware settings; compare settings with model
Dependentservices Minimize dependentservices; stop service and expecterror;compare
setting with model
Device drivers comparefile profile;revertto old version and compare results with model;
use generic drivers if possible to simplify
Environmentvariables Simplify variable valueortype; manually entervalue instead;pass
variable to a modeland compare results
Firmware Compare firmware properties with model; downgradeversion and
comparewith model
Group Policy Simply group rules;compare rules with model
Guestaccount Simply accountby stripping all access to guestthen add permission
gradually
Components Isolation Task
Startup Components
Hard drive Insertknown modelHD to replace HD; Insert problem HD to a model
machine
Partitions Changeactive partition;use smalleractive partition and test; use a
modelHD or vice versa
PATH Simplify path;comparepath with model;shorten path;
Policies Simplify policies then incrementally add new rules;compare policies
with modelmachine;
POST (poweron self-test) Compare allhardware and settings with modelmachine;Insertbad
hardware and do E4E
Registry Compare model;insertmodelto replace suspectobject
Services Compare settings with model;Rename servicesfile forE4E; copy model
file to problem machine
UserAccount Simplify userpermission;add extra rights step by step then compare
results
Workgroup Create workgroup from modelmachine then compare
Win 7 core OS Simplify with safe mode;
Components Isolation Task
Startup Components
Printqueue Printfrom a differentmachine to that same queue and compare results;
compare queuesettings from model;
Printdrivers Compare driver file with model;Use generic driverand compare results
with model
Printersettings Compare printersetup with model
Spoolerservice Printto anotherprint queue;
Spoolerfile Compare and check version with model;Insertmodelfile
Registry Printersetting Compare and/orcopy workingmodel; HKLMSYSTEM
CurrentControlSetControlPrintPrinters<printername>
PrinterDriver folder Compare version;delete /rename file and expecterror; copy working
driverfile; C:..System32DriverStoreFileRepository ;
C:..System32spoolDRIVERSx643 (dllfiles)
PrinterConnectionUSB Use otherUSB port; use known working USB port;connectprinterto a
modelmachine
PrinterConnectionTCP Ping PrinterTCP; compare TCP settings
Components Isolation Task
Printing Components
Encryption Create a simple basic file to encryptthen decrypt;simplify file permission;
encrypta minimum numberof files;do manualinstead of automated
File backup Backupone file with basic file properties then restore;compare from model;
create one file for backup;Try manualinsteadof automated
File compression Compress one basic file orfolderto compare with model
File permissions Simplify file permissions;compare model;Applyfile permission ona simple file
and compare behaviorwith model
Read and Execute
permission
Assign permissionto one basic useraccount then admin account.Then
compareresults with model.Insertmodelfile to suspectfile.
File extensions compareextensionsettings with model;create custom extension association;
simplify applicationthatopens the extension
Removabledrives Simplify - save to local, remote then removable
Shared folders Share folderto local users then externalusers;Comparewith model
File (itself) Simplify file properties;compare properties with modelfile;insert modelfile
Components Isolation Task
File Access Components
3rd Party
applications(local)
Simplify application settings;compare modelsetup
Web application Compare web and networkenvironmentwith modelmachine
InternetExplorer Compare IE modelsettings;simplify setting;create new IE profile
Shared network
resources
Share locally then remotely;share to one person then group;compare folder
settings with modelfolder
URL
Accesslocalwebsite then remote website.Accessinternalwebsite then
external;use IP numberand compare results with model;E4E DNS
Components Isolation Task
Other Components
ntemena720@gmail.com

More Related Content

Viewers also liked

RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocol
selvakumar_b1985
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1CAVC
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information ProtocolKashif Latif
 
Install Windows Server 2012 Step-by-Step
Install Windows Server 2012 Step-by-StepInstall Windows Server 2012 Step-by-Step
Install Windows Server 2012 Step-by-Step
Mehdi Poustchi Amin
 
Routers and Routing Configuration
Routers and Routing ConfigurationRouters and Routing Configuration
Routers and Routing Configuration
yasir1122
 
Introduction to DNS
Introduction to DNSIntroduction to DNS
Introduction to DNS
Jonathan Oxer
 
Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directorythebigredhemi
 
Active Directory Domain Services Installation & Configuration - Windows Ser...
Active Directory Domain Services  Installation & Configuration  - Windows Ser...Active Directory Domain Services  Installation & Configuration  - Windows Ser...
Active Directory Domain Services Installation & Configuration - Windows Ser...
Adel Alghamdi
 

Viewers also liked (9)

RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocol
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
 
Install Windows Server 2012 Step-by-Step
Install Windows Server 2012 Step-by-StepInstall Windows Server 2012 Step-by-Step
Install Windows Server 2012 Step-by-Step
 
Routers and Routing Configuration
Routers and Routing ConfigurationRouters and Routing Configuration
Routers and Routing Configuration
 
Introduction to DNS
Introduction to DNSIntroduction to DNS
Introduction to DNS
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directory
 
Active Directory Domain Services Installation & Configuration - Windows Ser...
Active Directory Domain Services  Installation & Configuration  - Windows Ser...Active Directory Domain Services  Installation & Configuration  - Windows Ser...
Active Directory Domain Services Installation & Configuration - Windows Ser...
 

Similar to ITTM: WIN 7 Troubleshooting Playbook

Deploy operating systems and drivers to PCs with a single process regardless ...
Deploy operating systems and drivers to PCs with a single process regardless ...Deploy operating systems and drivers to PCs with a single process regardless ...
Deploy operating systems and drivers to PCs with a single process regardless ...
Principled Technologies
 
Lamp Server With Drupal Installation
Lamp Server With Drupal InstallationLamp Server With Drupal Installation
Lamp Server With Drupal Installationfranbow
 
Chapter9 and10
Chapter9 and10Chapter9 and10
Chapter9 and10
Saurav
 
Chapter9and10
Chapter9and10Chapter9and10
Chapter9and10Saurav
 
Joomla! Day Chicago 2011 Presentation - Steven Pignataro
Joomla! Day Chicago 2011 Presentation - Steven PignataroJoomla! Day Chicago 2011 Presentation - Steven Pignataro
Joomla! Day Chicago 2011 Presentation - Steven Pignataro
Steven Pignataro
 
A Fabric/Puppet Build/Deploy System
A Fabric/Puppet Build/Deploy SystemA Fabric/Puppet Build/Deploy System
A Fabric/Puppet Build/Deploy System
adrian_nye
 
Advanced driver debugging (13005399) copy
Advanced driver debugging (13005399)   copyAdvanced driver debugging (13005399)   copy
Advanced driver debugging (13005399) copyBurlacu Sergiu
 
Practical solutions for connections administrators
Practical solutions for connections administratorsPractical solutions for connections administrators
Practical solutions for connections administrators
Sharon James
 
Applying software engineering to configuration management
Applying software engineering to configuration managementApplying software engineering to configuration management
Applying software engineering to configuration management
Bart Vanbrabant
 
Deploying opetus
Deploying opetusDeploying opetus
Deploying opetus
Gyani Feku
 
Stored-Procedures-Presentation
Stored-Procedures-PresentationStored-Procedures-Presentation
Stored-Procedures-PresentationChuck Walker
 
Automated server farm installation using psconfig and stsadm dm300 - curry ...
Automated server farm installation using psconfig and stsadm   dm300 - curry ...Automated server farm installation using psconfig and stsadm   dm300 - curry ...
Automated server farm installation using psconfig and stsadm dm300 - curry ...Vickey Bird
 
NoCOUG Presentation on Oracle RAT
NoCOUG Presentation on Oracle RATNoCOUG Presentation on Oracle RAT
NoCOUG Presentation on Oracle RAT
HenryBowers
 
OpenERP Technical Memento V0.7.3
OpenERP Technical Memento V0.7.3OpenERP Technical Memento V0.7.3
OpenERP Technical Memento V0.7.3Borni DHIFI
 
Lap around .net 4
Lap around .net 4Lap around .net 4
Lap around .net 4Abdul Khan
 
RPG Program for Unit Testing RPG
RPG Program for Unit Testing RPG RPG Program for Unit Testing RPG
RPG Program for Unit Testing RPG
Greg.Helton
 
Graphing Nagios services with pnp4nagios
Graphing Nagios services with pnp4nagiosGraphing Nagios services with pnp4nagios
Graphing Nagios services with pnp4nagios
jasonholtzapple
 
Automated Deployment
Automated DeploymentAutomated Deployment
Automated Deployment
phpne
 

Similar to ITTM: WIN 7 Troubleshooting Playbook (20)

Deploy operating systems and drivers to PCs with a single process regardless ...
Deploy operating systems and drivers to PCs with a single process regardless ...Deploy operating systems and drivers to PCs with a single process regardless ...
Deploy operating systems and drivers to PCs with a single process regardless ...
 
Lamp Server With Drupal Installation
Lamp Server With Drupal InstallationLamp Server With Drupal Installation
Lamp Server With Drupal Installation
 
Chapter9 and10
Chapter9 and10Chapter9 and10
Chapter9 and10
 
Chapter9and10
Chapter9and10Chapter9and10
Chapter9and10
 
Joomla! Day Chicago 2011 Presentation - Steven Pignataro
Joomla! Day Chicago 2011 Presentation - Steven PignataroJoomla! Day Chicago 2011 Presentation - Steven Pignataro
Joomla! Day Chicago 2011 Presentation - Steven Pignataro
 
A Fabric/Puppet Build/Deploy System
A Fabric/Puppet Build/Deploy SystemA Fabric/Puppet Build/Deploy System
A Fabric/Puppet Build/Deploy System
 
Advanced driver debugging (13005399) copy
Advanced driver debugging (13005399)   copyAdvanced driver debugging (13005399)   copy
Advanced driver debugging (13005399) copy
 
Practical solutions for connections administrators
Practical solutions for connections administratorsPractical solutions for connections administrators
Practical solutions for connections administrators
 
Applying software engineering to configuration management
Applying software engineering to configuration managementApplying software engineering to configuration management
Applying software engineering to configuration management
 
Deploying opetus
Deploying opetusDeploying opetus
Deploying opetus
 
Stored-Procedures-Presentation
Stored-Procedures-PresentationStored-Procedures-Presentation
Stored-Procedures-Presentation
 
Automated server farm installation using psconfig and stsadm dm300 - curry ...
Automated server farm installation using psconfig and stsadm   dm300 - curry ...Automated server farm installation using psconfig and stsadm   dm300 - curry ...
Automated server farm installation using psconfig and stsadm dm300 - curry ...
 
NoCOUG Presentation on Oracle RAT
NoCOUG Presentation on Oracle RATNoCOUG Presentation on Oracle RAT
NoCOUG Presentation on Oracle RAT
 
OpenERP Technical Memento V0.7.3
OpenERP Technical Memento V0.7.3OpenERP Technical Memento V0.7.3
OpenERP Technical Memento V0.7.3
 
Lap around .net 4
Lap around .net 4Lap around .net 4
Lap around .net 4
 
RPG Program for Unit Testing RPG
RPG Program for Unit Testing RPG RPG Program for Unit Testing RPG
RPG Program for Unit Testing RPG
 
Graphing Nagios services with pnp4nagios
Graphing Nagios services with pnp4nagiosGraphing Nagios services with pnp4nagios
Graphing Nagios services with pnp4nagios
 
Its3 Drupal
Its3 DrupalIts3 Drupal
Its3 Drupal
 
Its3 Drupal
Its3 DrupalIts3 Drupal
Its3 Drupal
 
Automated Deployment
Automated DeploymentAutomated Deployment
Automated Deployment
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 

ITTM: WIN 7 Troubleshooting Playbook

  • 3. Computername Look forduplicate names by pinging the computername while suspect machineis turned off DCHP value Compare valueand network settings;insertE4E and expecterror DNS Compare valuewith model;E4E and expectnetwork errors Domain Compare valuewith model; change computername and expecterror Firewall Compare and simplifysettings Gateway Compare settings with model IP address Check duplicates by shutting down machineand pinging the same IP Subnetmask Compare valuewith model Networkinginterface Compare model;insertmodelto replace suspectobjectif possible; connectto a nearestdomain ornetwork and compare resultwith a model TCP Ports Compare valuewith model;close PORT and expectknown error Components Isolation Task Network Components
  • 4. Authentication Testwith wrong username/password;then do same thing with a model machine Automatic login Do manuallogin;automate using existingornon-existing account BootOptions Simplify bootoptions;compare bootsettings BIOS Simplify BIOS or hardware settings; compare settings with model Dependentservices Minimize dependentservices; stop service and expecterror;compare setting with model Device drivers comparefile profile;revertto old version and compare results with model; use generic drivers if possible to simplify Environmentvariables Simplify variable valueortype; manually entervalue instead;pass variable to a modeland compare results Firmware Compare firmware properties with model; downgradeversion and comparewith model Group Policy Simply group rules;compare rules with model Guestaccount Simply accountby stripping all access to guestthen add permission gradually Components Isolation Task Startup Components
  • 5. Hard drive Insertknown modelHD to replace HD; Insert problem HD to a model machine Partitions Changeactive partition;use smalleractive partition and test; use a modelHD or vice versa PATH Simplify path;comparepath with model;shorten path; Policies Simplify policies then incrementally add new rules;compare policies with modelmachine; POST (poweron self-test) Compare allhardware and settings with modelmachine;Insertbad hardware and do E4E Registry Compare model;insertmodelto replace suspectobject Services Compare settings with model;Rename servicesfile forE4E; copy model file to problem machine UserAccount Simplify userpermission;add extra rights step by step then compare results Workgroup Create workgroup from modelmachine then compare Win 7 core OS Simplify with safe mode; Components Isolation Task Startup Components
  • 6. Printqueue Printfrom a differentmachine to that same queue and compare results; compare queuesettings from model; Printdrivers Compare driver file with model;Use generic driverand compare results with model Printersettings Compare printersetup with model Spoolerservice Printto anotherprint queue; Spoolerfile Compare and check version with model;Insertmodelfile Registry Printersetting Compare and/orcopy workingmodel; HKLMSYSTEM CurrentControlSetControlPrintPrinters<printername> PrinterDriver folder Compare version;delete /rename file and expecterror; copy working driverfile; C:..System32DriverStoreFileRepository ; C:..System32spoolDRIVERSx643 (dllfiles) PrinterConnectionUSB Use otherUSB port; use known working USB port;connectprinterto a modelmachine PrinterConnectionTCP Ping PrinterTCP; compare TCP settings Components Isolation Task Printing Components
  • 7. Encryption Create a simple basic file to encryptthen decrypt;simplify file permission; encrypta minimum numberof files;do manualinstead of automated File backup Backupone file with basic file properties then restore;compare from model; create one file for backup;Try manualinsteadof automated File compression Compress one basic file orfolderto compare with model File permissions Simplify file permissions;compare model;Applyfile permission ona simple file and compare behaviorwith model Read and Execute permission Assign permissionto one basic useraccount then admin account.Then compareresults with model.Insertmodelfile to suspectfile. File extensions compareextensionsettings with model;create custom extension association; simplify applicationthatopens the extension Removabledrives Simplify - save to local, remote then removable Shared folders Share folderto local users then externalusers;Comparewith model File (itself) Simplify file properties;compare properties with modelfile;insert modelfile Components Isolation Task File Access Components
  • 8. 3rd Party applications(local) Simplify application settings;compare modelsetup Web application Compare web and networkenvironmentwith modelmachine InternetExplorer Compare IE modelsettings;simplify setting;create new IE profile Shared network resources Share locally then remotely;share to one person then group;compare folder settings with modelfolder URL Accesslocalwebsite then remote website.Accessinternalwebsite then external;use IP numberand compare results with model;E4E DNS Components Isolation Task Other Components