CompTIA A+ Exam  >  CompTIA A+ Notes  >   Core 2  >  IT Support Best Practices

IT Support Best Practices

Overview

This chapter covers professional communication, documentation practices, incident response procedures, and technical support workflows that CompTIA A+ Core 2 expects support technicians to demonstrate. These concepts appear in scenario-based questions testing your ability to handle user interactions, escalation protocols, change management, and ticketing systems. Mastering these best practices is essential for performance-based simulations involving help desk environments and user support situations.

Core Concepts

Communication Skills and Professionalism

Active listening means letting users explain issues completely without interruption, then restating their problem to confirm understanding. When a user says "my computer won't turn on," you ask clarifying questions like "Do you see any lights?" or "Did anything change recently?" rather than immediately assuming hardware failure.

Professional behavior guidelines:

  • Maintain a positive attitude regardless of user frustration or technical challenge complexity
  • Use plain language-avoid jargon when speaking with non-technical users
  • Never argue with customers or minimize their concerns
  • Set and meet realistic expectations for resolution timeframes
  • Follow up with users after resolving issues to confirm satisfaction
  • If you don't know the answer, admit it and escalate appropriately rather than guessing
  • Respect user privacy-never discuss confidential information in public areas or with unauthorized personnel
  • Be culturally sensitive and avoid assumptions about users' technical knowledge

Dealing with difficult situations: If a user becomes hostile, remain calm and professional. Acknowledge their frustration with phrases like "I understand this is frustrating" without accepting blame. If de-escalation fails, involve a supervisor rather than engaging in conflict. Never take technical problems or user emotions personally.

Ticketing and Documentation Systems

A ticket is a formal record of a support request tracked from creation through resolution. Ticketing systems maintain service accountability, track recurring problems, and provide metrics for IT performance analysis.

Essential ticket elements:

  • User contact information-name, department, phone, email for follow-up
  • Problem description-detailed symptom documentation including error messages, when issue started, and affected systems
  • Category/Priority-classification by type (hardware, software, network) and urgency (critical, high, medium, low)
  • Assigned technician-who owns the ticket currently
  • Status-new, in progress, waiting on user, waiting on vendor, resolved, closed
  • Resolution notes-exact steps taken to fix the problem for future reference
  • Time tracking-timestamps for creation, assignment, updates, and closure

Prioritization criteria: Critical issues affecting multiple users or business-critical systems receive highest priority (examples: email server down, payroll system offline). Low priority includes cosmetic issues or feature requests affecting single users with available workarounds.

Documentation best practices: Write clearly enough that another technician can understand what happened without asking you. Use complete sentences, include specific error codes or messages in quotes, document all troubleshooting steps attempted (even unsuccessful ones), and note the final solution. Avoid subjective terms like "seemed slow"-use measurable descriptions like "application took 3 minutes to launch."

Change Management

Change management is the formal process for approving, documenting, testing, and implementing modifications to IT systems. This prevents unauthorized changes from causing outages or security vulnerabilities.

Change management workflow:

  1. Request submission-Technician documents proposed change with justification and affected systems
  2. Risk assessment-Evaluate potential impact on business operations and security
  3. Approval-Change Advisory Board (CAB) or designated authority reviews and approves/denies
  4. Planning-Schedule implementation during maintenance window, prepare rollback procedures
  5. Testing-Verify change in non-production environment when possible
  6. Implementation-Execute change according to approved plan with all stakeholders notified
  7. Documentation-Record actual changes made, outcomes, and any deviations from plan
  8. Review-Post-implementation evaluation to verify success and document lessons learned

Backout plan (rollback plan) defines exact steps to reverse changes if problems occur. Before applying Windows updates to production servers, your backout plan might include restoring from a snapshot taken immediately before patching.

End-user notification informs affected users about upcoming changes, expected downtime, and alternative procedures. Send notifications well in advance-typically 48-72 hours for planned maintenance affecting business operations.

Incident Response and Problem Management

Incident refers to any unplanned interruption or reduction in service quality. A user unable to print is an incident. Problem is the underlying cause of one or more incidents-a faulty print server driver causing multiple users' printing failures is a problem.

Incident response process:

  1. Identification-Recognize and log the incident
  2. Categorization-Classify by type and assign priority
  3. Investigation and diagnosis-Determine root cause through systematic troubleshooting
  4. Resolution and recovery-Implement fix and restore normal service
  5. Closure-Document solution and confirm user satisfaction

Escalation transfers tickets to higher-tier support or management when issues exceed your scope, require specialized expertise, involve policy violations, or remain unresolved within SLA timeframes. First-level support handles password resets and basic troubleshooting; second-level tackles complex software issues; third-level involves vendor engagement or advanced system engineering.

Chain of custody maintains documented control over evidence in security incidents. When investigating a compromised workstation, you record who handled the device, when, what actions they took, and where the device was stored. This preserves evidence integrity for forensic analysis or legal proceedings.

Licensing and Prohibited Content/Activity

Software licensing defines legal terms for using applications. Violating license agreements exposes organizations to legal liability, fines, and reputational damage.

Common license types:

  • Personal license-Single user on one device
  • Enterprise license-Organization-wide deployment with volume pricing
  • Open source-Free to use, modify, and distribute under specific terms (GPL, MIT, Apache licenses)
  • Subscription/SaaS-Ongoing payments for continued access (Microsoft 365, Adobe Creative Cloud)
  • Concurrent license-Limited number of simultaneous users (10 concurrent users can access software from a 100-person company)

DRM (Digital Rights Management) enforces licensing restrictions through technical controls. Activation codes, online verification, and hardware-locked licenses are DRM mechanisms.

Prohibited content and activities:

  • Installing unlicensed or pirated software
  • Using personal software on company devices without approval
  • Accessing inappropriate websites (adult content, gambling) from corporate networks
  • Downloading copyrighted material through torrents or file-sharing
  • Using company resources for personal business ventures
  • Installing unauthorized remote access tools
  • Circumventing security controls or monitoring systems

As a technician, you enforce Acceptable Use Policies (AUP) by reporting violations to management and implementing technical restrictions like content filtering and application whitelisting.

Knowledge Base and Script Usage

A knowledge base is a searchable repository of solutions to common problems. When users report "Outlook won't connect," you search the knowledge base for "Outlook connectivity" to find documented fixes before starting from scratch.

Knowledge base benefits:

  • Reduces resolution time through proven solutions
  • Ensures consistency across support team
  • Captures institutional knowledge when experienced technicians leave
  • Enables self-service for end users
  • Identifies recurring problems requiring permanent fixes

Creating knowledge base articles: Include clear problem description, step-by-step solution with screenshots if helpful, affected systems/software versions, and keywords for searching. Update articles when procedures change or new solutions emerge.

Support scripts provide standardized questions and responses for common scenarios. Scripts ensure consistent service quality and prevent technicians from skipping important diagnostic steps. However, you must adapt scripts to specific situations-blindly following scripts without listening to users creates frustration and misses unique problem details.

Regulatory and Compliance Considerations

Regulated data types requiring special handling:

  • PII (Personally Identifiable Information)-Names, addresses, Social Security numbers, birthdates
  • PHI (Protected Health Information)-Medical records, insurance information, treatment history governed by HIPAA
  • PCI DSS-Payment card data including credit card numbers and transaction records
  • GDPR-European Union data protection regulation requiring consent, data portability, and right to erasure

When handling devices containing regulated data, follow data handling policies: encrypt storage, restrict access to authorized personnel only, securely wipe drives before disposal or redeployment, and report potential breaches immediately through proper channels.

Troubleshooting

1. Symptom: User calls reporting they've been locked out of their account after multiple failed login attempts. They're frustrated and need immediate access to complete urgent work for a client deadline in 30 minutes.

Likely Cause: Account lockout policy triggered after exceeding maximum failed password attempts, typically configured in Active Directory Group Policy (default is often 5 attempts with 30-minute lockout duration).

Fix: Verify user identity through security questions or secondary contact method. Unlock the account using Active Directory Users and Computers (right-click user → Properties → Account tab → check "Unlock account") or PowerShell command Unlock-ADAccount -Identity username. Have user try their password again; if they genuinely forgot it, initiate password reset following organizational procedures. Escalate to supervisor if this is the user's third lockout this week, indicating possible security awareness training need or compromised credentials.

2. Symptom: Ticket submitted shows a user installed unapproved software for video editing on their workstation. When you investigate, you discover the software is unlicensed freeware from an unknown website that also installed browser toolbars and changed the homepage.

Likely Cause: AUP violation combined with malware bundled with the unapproved application download. User bypassed application whitelisting or it wasn't properly configured.

Fix: Document everything in the ticket including screenshots of unauthorized software and modifications. Uninstall the video editing software and bundled PUPs (potentially unwanted programs) through Control Panel or using tool like Revo Uninstaller. Run full antimalware scan with updated definitions. Reset browser settings to corporate defaults. Report AUP violation to user's supervisor according to organizational policy-this is mandatory, not optional. Verify application whitelisting is enabled through Group Policy. Follow up with user education about software requests through proper channels and security risks of downloading from untrusted sources.

3. Symptom: Multiple users report the same application crashes every time they try to open a specific file type after yesterday's update. The application was working fine before the scheduled patch deployment. Users are blaming IT for breaking their productivity tools.

Likely Cause: Software update introduced compatibility issue or regression bug affecting specific file format handlers. This represents a failed change that requires backout plan execution.

Fix: Immediately notify change management team and supervisor about widespread impact. Stop deploying the update to additional systems. Check vendor knowledge base and support forums for known issues with this update version. Roll back affected systems to previous application version using deployment tool (SCCM, PDQ Deploy) or manual uninstall and reinstall of earlier version if backups exist. Document the issue thoroughly including affected users, exact error messages, and reproduction steps. Submit vendor support ticket if rollback succeeds-this provides them diagnostic data. Update original change ticket with post-implementation review notes about the failure. Schedule new change request to deploy alternate update or wait for vendor patch once vendor confirms fix availability.

Step-by-Step Procedures

Task: Creating and Documenting a Complete Support Ticket from Initial Contact Through Resolution

  1. Answer user contact (phone, email, chat, or walk-up) professionally: "IT Support, this is [your name], how can I help you today?"
  2. Listen without interrupting while user describes the issue; take brief notes on symptoms they report
  3. Ask clarifying questions to gather complete information: "When did this start?" "Does this happen with all documents or specific ones?" "Have you restarted the application?" "Did anything change recently?"
  4. Open your ticketing system and create new ticket
  5. Enter user's full name, department, contact phone number, and email address in designated fields
  6. Document the problem description in the ticket using user's own words for symptoms, then add your technical observations (example: "User reports Excel freezes when opening files. Files are stored on network drive. Last worked normally Friday. No error messages displayed, application becomes unresponsive and shows (Not Responding) in title bar.")
  7. Assign appropriate category (application issue) and subcategory (Microsoft Office)
  8. Set priority based on business impact: critical if affects multiple users or business-critical function, high for single user with no workaround, medium for issue with temporary workaround available, low for cosmetic issues or feature requests
  9. Document every troubleshooting step attempted with results (example: "Tested opening local file-successful. Tested opening network file-Excel hangs. Checked network connectivity with ping to file server-4ms average response. Opened same file with different user account-successful, indicating user profile issue not file corruption.")
  10. If you resolve the issue, document exact solution in resolution notes (example: "Deleted Excel resiliency registry keys at HKCU\Software\Microsoft\Office\16.0\Excel\Resiliency. Restarted Excel. User confirmed can now open all network files without freezing.")
  11. If issue requires escalation, document reason and assign to appropriate team/tier with complete context so they don't need to contact user for information you already gathered
  12. Update ticket status to "Resolved" when fix is confirmed working
  13. Contact user to verify issue is completely resolved and they're satisfied with service (even if different technician implemented fix)
  14. Change ticket status to "Closed" after user confirmation
  15. Review ticket for completeness-another technician reading it should understand problem, what was tried, and final solution without additional explanation

Practice Questions

Q1: A user calls the help desk extremely upset that they've lost an important presentation file. They're speaking loudly and blaming IT for their problem. What should you do FIRST?
(a) Explain that users are responsible for backing up their own files according to company policy
(b) Transfer the call to your supervisor since the user is being hostile
(c) Let the user explain the situation completely, then acknowledge their frustration before beginning troubleshooting
(d) Immediately ask technical questions about when they last saved the file and where it was stored

Ans: (c)
Active listening and acknowledging user emotions is the first step in professional communication before gathering technical details or taking other actions.

Q2: Which of the following are required elements of proper ticket documentation? (Select TWO)
(a) User's personal opinion about which technician should be assigned
(b) Detailed description of symptoms including specific error messages
(c) The technician's guess about what probably caused the issue
(d) Exact steps taken to resolve the problem for future reference

Ans: (b) and (d)
Symptom documentation and resolution steps are essential ticket elements while user assignment preferences and unconfirmed guesses are not appropriate.

Q3: A technician wants to install a new application on the company file server to improve backup performance. What should the technician do FIRST?
(a) Install the application during off-hours to minimize user impact
(b) Test the application on their own workstation to verify it works properly
(c) Submit a change request through the formal change management process
(d) Create a backup of the server in case the installation causes problems

Ans: (c)
Changes to production systems require formal change management approval before any testing or implementation occurs.

Q4: Performance-based task: You are working in a simulated ticketing system. A user has reported that Outlook continuously prompts for password even though they're entering it correctly. Using the provided interface: Create a new ticket with appropriate priority, document the issue including questions you would ask the user, escalate the ticket to the Exchange team with category "Email Services," and add resolution notes indicating this was escalated for server-side authentication troubleshooting.

Expected steps:

  1. Click "New Ticket" or equivalent button in simulated interface
  2. Fill in user contact information fields (name, phone, email, department)
  3. Enter problem description: "User reports Outlook repeatedly prompting for password. Credentials are correct but not accepted."
  4. Set priority to "Medium" or "High" (user can work via webmail temporarily)
  5. Set category to "Email Services" and subcategory to "Authentication" or similar
  6. In notes/comments field, add: "Questions for user: When did this start? Recent password change? Any error codes displayed? Can you access email via OWA? Affects only Outlook or mobile devices too?"
  7. Assign or escalate ticket to "Exchange Team" or "Email Support" team
  8. Add resolution notes: "Issue requires server-side investigation. User credentials verified correct locally. Escalated to Exchange team for authentication troubleshooting and mailbox connectivity analysis."
  9. Update status to "Escalated" or "Waiting on Exchange Team"
  10. Save/submit ticket

Q5: A user has been downloading movies through a torrent client on their company laptop. What policy does this violate, and what should you do?
(a) This violates the software licensing policy; uninstall the torrent client and document the incident
(b) This violates the AUP; document the violation, report to management, and remove unauthorized software
(c) This violates change management procedures; submit a change request to allow the software
(d) This doesn't violate policy if the user downloaded the movies outside business hours

Ans: (b)
Downloading copyrighted content and using unauthorized file-sharing applications violates Acceptable Use Policy, requiring documentation and management notification regardless of when it occurred.

Q6: Which command would you use to unlock a user account in Active Directory after they exceeded failed login attempts?
(a) net user username /unlock
(b) Unlock-ADAccount -Identity username
(c) dsmod user username -unlock
(d) Set-ADUser -Identity username -Unlock $true

Ans: (b)
Unlock-ADAccount is the correct PowerShell cmdlet for unlocking Active Directory accounts after lockout policy triggers.

Q7: You're troubleshooting a problem that you've never encountered before and can't find in the knowledge base. The user needs a resolution urgently for a business-critical system. What is the BEST approach?
(a) Try different solutions until something works, documenting successful steps afterward
(b) Tell the user you don't know how to fix it and they should call vendor support directly
(c) Research the issue using vendor resources, consult with senior technicians, and escalate if it exceeds your expertise while keeping the user informed
(d) Reimage the system since that will definitely resolve any software-related issue

Ans: (c)
Professional support combines research, collaboration, appropriate escalation, and communication rather than guessing or giving up, especially for critical systems.

Quick Review

  • Communication best practices: Listen actively without interrupting, use plain language with non-technical users, set realistic expectations, follow up after resolution, and never argue with users
  • Ticket documentation must include: User contact info, detailed symptom description with error messages, category/priority, assigned technician, status, all troubleshooting steps attempted, and final resolution
  • Priority levels: Critical = multiple users or business-critical systems down; High = single user, no workaround; Medium = workaround available; Low = cosmetic/feature requests
  • Change management sequence: Request → Risk assessment → Approval → Planning with backout plan → Testing → Implementation → Documentation → Post-implementation review
  • Escalation triggers: Issue exceeds your technical knowledge, requires specialized tools/access, involves policy violations, or remains unresolved within SLA timeframes
  • Unlock-ADAccount -Identity username unlocks Active Directory accounts after failed login attempts trigger lockout policy
  • Chain of custody documents who handled evidence, when, what actions taken, and storage location for security incidents requiring forensic analysis
  • Regulated data types: PII (personal identifiable information), PHI (protected health information under HIPAA), PCI DSS (payment card data), GDPR (EU privacy regulation)
  • AUP violations must be documented and reported to management-examples include unlicensed software, inappropriate website access, unauthorized remote access tools
  • Knowledge base benefits: Reduces resolution time, ensures consistency across support team, preserves institutional knowledge, enables self-service, identifies recurring problems requiring permanent fixes
The document IT Support Best Practices is a part of the CompTIA A+ Course CompTIA A+ Core 2.
All you need of CompTIA A+ at this link: CompTIA A+
Explore Courses for CompTIA A+ exam
Get EduRev Notes directly in your Google search
Related Searches
video lectures, IT Support Best Practices, Extra Questions, ppt, Free, Previous Year Questions with Solutions, Summary, study material, mock tests for examination, pdf , practice quizzes, Exam, shortcuts and tricks, Semester Notes, IT Support Best Practices, Objective type Questions, MCQs, IT Support Best Practices, Important questions, Viva Questions, past year papers, Sample Paper;