Podcast
Questions and Answers
What tool should be used to verify connectivity on the management port?
What tool should be used to verify connectivity on the management port?
What is an essential step in ensuring management traffic can reach network devices?
What is an essential step in ensuring management traffic can reach network devices?
What should be done first when troubleshooting desktop performance issues?
What should be done first when troubleshooting desktop performance issues?
Which of the following actions can help resolve issues caused by corrupted application files?
Which of the following actions can help resolve issues caused by corrupted application files?
Signup and view all the answers
What is the purpose of the 'sfc /scannow' command?
What is the purpose of the 'sfc /scannow' command?
Signup and view all the answers
Which step is NOT recommended when troubleshooting Blue Screen of Death (BSOD) errors?
Which step is NOT recommended when troubleshooting Blue Screen of Death (BSOD) errors?
Signup and view all the answers
What should be done if applications are suspected of causing performance issues?
What should be done if applications are suspected of causing performance issues?
Signup and view all the answers
Which of the following is NOT a step to take when checking for malware on a desktop?
Which of the following is NOT a step to take when checking for malware on a desktop?
Signup and view all the answers
What should be done first if Defender detects malware but cannot remove it fully?
What should be done first if Defender detects malware but cannot remove it fully?
Signup and view all the answers
Which step is NOT part of troubleshooting when SentinelOne agent does not connect to the management console?
Which step is NOT part of troubleshooting when SentinelOne agent does not connect to the management console?
Signup and view all the answers
What is the first action to take if Webroot fails to update its virus definitions?
What is the first action to take if Webroot fails to update its virus definitions?
Signup and view all the answers
When Microsoft Defender is disabled by Group Policy, what is the crucial command to apply policy changes?
When Microsoft Defender is disabled by Group Policy, what is the crucial command to apply policy changes?
Signup and view all the answers
If real-time protection in Defender is disabled, what action should NOT be taken?
If real-time protection in Defender is disabled, what action should NOT be taken?
Signup and view all the answers
In which scenario should you consider manually deleting suspicious files or registry entries?
In which scenario should you consider manually deleting suspicious files or registry entries?
Signup and view all the answers
Which should be done if the SentinelOne agent still cannot connect after basic troubleshooting?
Which should be done if the SentinelOne agent still cannot connect after basic troubleshooting?
Signup and view all the answers
What must you ensure if Group Policy disables Microsoft Defender?
What must you ensure if Group Policy disables Microsoft Defender?
Signup and view all the answers
What is the first step to troubleshoot Kaspersky not initiating scans on external drives?
What is the first step to troubleshoot Kaspersky not initiating scans on external drives?
Signup and view all the answers
When troubleshooting a user who cannot access Outlook, which step is irrelevant?
When troubleshooting a user who cannot access Outlook, which step is irrelevant?
Signup and view all the answers
What should be verified if a user reports being unable to access a SharePoint site?
What should be verified if a user reports being unable to access a SharePoint site?
Signup and view all the answers
Which troubleshooting step is necessary when a device is not recognized correctly in the operating system while scanning with Kaspersky?
Which troubleshooting step is necessary when a device is not recognized correctly in the operating system while scanning with Kaspersky?
Signup and view all the answers
Which action should be taken if a user is not receiving MFA prompts during sign-in?
Which action should be taken if a user is not receiving MFA prompts during sign-in?
Signup and view all the answers
What is a potential reason a user may see a "Something went wrong" error when accessing Outlook?
What is a potential reason a user may see a "Something went wrong" error when accessing Outlook?
Signup and view all the answers
What is the correct step to troubleshoot if a user cannot access their SharePoint site?
What is the correct step to troubleshoot if a user cannot access their SharePoint site?
Signup and view all the answers
Which step should be taken last if Kaspersky isn't scanning external drives?
Which step should be taken last if Kaspersky isn't scanning external drives?
Signup and view all the answers
What is a necessary step to troubleshoot a user's inability to share files with external users in OneDrive or SharePoint?
What is a necessary step to troubleshoot a user's inability to share files with external users in OneDrive or SharePoint?
Signup and view all the answers
Which action should be taken first when a user encounters device compliance issues accessing Microsoft 365 resources?
Which action should be taken first when a user encounters device compliance issues accessing Microsoft 365 resources?
Signup and view all the answers
If a remote worker cannot sign into Microsoft 365 from a new location, which policy should be reviewed first?
If a remote worker cannot sign into Microsoft 365 from a new location, which policy should be reviewed first?
Signup and view all the answers
Which troubleshooting step is essential when a user’s account indicates a risky sign-in attempt?
Which troubleshooting step is essential when a user’s account indicates a risky sign-in attempt?
Signup and view all the answers
What should be confirmed regarding the user's device before accessing Microsoft 365 when compliance issues arise?
What should be confirmed regarding the user's device before accessing Microsoft 365 when compliance issues arise?
Signup and view all the answers
When advising a user who cannot share files externally, which consideration should be reviewed last?
When advising a user who cannot share files externally, which consideration should be reviewed last?
Signup and view all the answers
What is a recommended action if a user is blocked from signing in due to a Conditional Access policy?
What is a recommended action if a user is blocked from signing in due to a Conditional Access policy?
Signup and view all the answers
When reviewing external sharing settings in SharePoint, what should you primarily focus on?
When reviewing external sharing settings in SharePoint, what should you primarily focus on?
Signup and view all the answers
What is the first step to take when a device enrollment fails due to a Conditional Access policy blocking access?
What is the first step to take when a device enrollment fails due to a Conditional Access policy blocking access?
Signup and view all the answers
What should be verified to ensure a device can successfully enroll without conflicts?
What should be verified to ensure a device can successfully enroll without conflicts?
Signup and view all the answers
Which action is NOT recommended when troubleshooting a device enrollment failure due to Conditional Access?
Which action is NOT recommended when troubleshooting a device enrollment failure due to Conditional Access?
Signup and view all the answers
What should be done after confirming compliance requirements are met for device enrollment?
What should be done after confirming compliance requirements are met for device enrollment?
Signup and view all the answers
After reviewing a Conditional Access policy, which aspect should also be verified to resolve enrollment issues?
After reviewing a Conditional Access policy, which aspect should also be verified to resolve enrollment issues?
Signup and view all the answers
What is the first step to troubleshoot a non-compliant device due to missing BitLocker encryption?
What is the first step to troubleshoot a non-compliant device due to missing BitLocker encryption?
Signup and view all the answers
Which command can be used to manually evaluate compliance on a device?
Which command can be used to manually evaluate compliance on a device?
Signup and view all the answers
What should be checked first if an application fails to deploy through Intune?
What should be checked first if an application fails to deploy through Intune?
Signup and view all the answers
What action should be taken if using Microsoft Defender for antivirus?
What action should be taken if using Microsoft Defender for antivirus?
Signup and view all the answers
What is necessary to confirm device compliance regarding BitLocker?
What is necessary to confirm device compliance regarding BitLocker?
Signup and view all the answers
When troubleshooting a compliance policy issue, what should be checked regarding the device?
When troubleshooting a compliance policy issue, what should be checked regarding the device?
Signup and view all the answers
Which of the following is NOT a step in troubleshooting a failed app deployment via Intune?
Which of the following is NOT a step in troubleshooting a failed app deployment via Intune?
Signup and view all the answers
What should be done if the device lacks sufficient storage for an application?
What should be done if the device lacks sufficient storage for an application?
Signup and view all the answers
Study Notes
Network Troubleshooting
- Connectivity issues involve ping tests using tools like Wireshark
- Firewall policies, port blocking, and VPN connectivity issues are also addressed
- Website access problems are diagnosed through ping tests to verify IP connectivity, DNS resolution checks, and firewall checks.
- TCPing tests are used to see if website ports are open.
- Website access is confirmed or issues are identified and resolved with different browsers or by disabling extensions.
-
Intermittent connectivity issues are troubleshooted through Gateway ping tests, network cable/Wi-Fi signal checks and IP conflict verification using
arp -a
VPN Connectivity Issues
- Internal resource access problems are addressed by checking VPN IP addresses, pinging internal resources verifying firewall policy and DNS settings.
- Route table is checked to see if routes to internal subnets are present.
Network Latency Issues
- High latency issues in network applications are identified by ping tests.
- Traceroutes help pinpoint points of latency in the network path.
- TCPing specific ports is used to identify any delays in connection establishment.
- Bandwidth testing and QoS settings are verified.
File/Folder Permission Issues
- File server reachability is verified through ping tests.
- Port 445 (SMB) is checked for accessibility.
- DNS resolution to hostname is checked.
- User permissions for the network share are confirmed.
- File/folder ownership, permissions and encryption are checked if access to file/folder is restricted.
Slow Network Speeds
- Ping tests to confirm packet loss or high latency are performed.
- Network bandwidth usage is checked for bottlenecks.
- QoS settings and throttling policies are examined.
- Latency is measured using
tcping
to services/websites. - Device network adapter settings are verified.
User Can't Connect to Remote Desktop via VPN
- Connectivity to the remote machine’s IP address is checked
- Firewall policy is confirmed to allow RDP (usually on port 3389) through the VPN.
-
tcping
test on port 3389 is used to confirm that the RDP port is open. - Correct routing between the VPN subnet and internal network is confirmed.
- User has the correct permission to access remote desktop
Network Device Inaccessibility
- Device IP is confirmed to be reachable on the network.
- TCPing tests are performed on the management port.
- Firewall rules are checked to verify if traffic from the monitoring server to devices is allowed.
- SNMP/SSH settings are checked for enabling.
- Firmware is verified to be up-to-date.
Application Crashes or Freezes
- Application updates are checked for updates.
- Temporary files are cleared.
- Logs in Event viewer are checked for error codes.
- Applications are run in compatibility mode with older OS versions if necessary.
- Corrupted files are replaced by reinstalling the application.
Blue Screen of Death (BSOD)
- BSOD error code is recorded.
- Recent driver, hardware or update installations are checked.
- System files are scanned and repaired using the command
sfc /scannow
in the command prompt. - Drivers, especially graphics and chipset drivers, are updated.
- Windows memory diagnostic is run to check for faulty RAM.
Printer Not Responding
- Printer connection is checked
- Print Spooler service is restarted
- Printer drivers are updated.
- Default printer is verified to be correct.
- Printing from a different application is tested.
Network Connectivity Issues
- Physical connections to the network cable or Wi-Fi signal strength are checked.
- Network troubleshooter is run for automatic diagnostics.
- DNS is flushed.
- Firewall is disabled temporarily to see if blocking the connection.
- Testing with another device verifies the network and user's device compatibility for connection problems.
Account Lockout or Login Issues
- Checking password expiry, especially in domain environments.
- Resetting a user’s password if they are locked out
- Checking logs in Event Viewer for login attempts.
- Verifying Network Connection if login requires domain authentication
- Clearing Cached Credentials if there are conflicting credentials
File or Folder Permission Issues
- Checking File Properties and verifying permissions under Security.
- Taking ownership of the files or folders if access is restricted.
- Adjusting permissions to allow user full access if necessary.
- Checking for encryption and ensuring the user has the correct encryption key.
- Checking Network drive permissions.
Firewall and Security Troubleshooting
- Firewall rules, access issues, and threat logs are addressed.
- FortiClient VPN troubleshooting is mentioned.
Application Traffic Blocked
- Recent changes to firewall rules are reviewed.
- Logs are analyzed to check if application traffic is denied.
- Application ports are verified to ensure firewall rules permit application usage
- Temporary rules are created to verify if traffic flows correctly.
Unauthorized Access Attempts
- Source IP address is identified.
- Firewall rules are created to block incoming traffic from the suspicious IP.
- Existing vulnerabilities are checked
- Geo-IP blocking is enabled if needed.
- Continued monitoring of logs is performed to identify new access attempts.
FortiClient VPN Problems
- VPN gateway reachability is confirmed through ping tests.
- Required VPN ports are checked (e.g., 443, 500, 4500).
- VPN credentials are confirmed to be correct
- Firewall policy allowing VPN traffic is confirmed.
-
tcping
tests are performed on the VPN port to confirm connectivity to the gateway.
Remote User Cannot Connect to VPN
- Configurations for VPN server address, username and password are verified.
- User VPN permissions are verified.
- Necessary firewall ports are confirmed to be open (example 443 or 500/4500 for IPsec).
- Logs are reviewed for any errors.
- Latest FortiClient version is verified
Internal Service Unreachable
- Recent rule changes are reviewed to see if they are causing an issue.
- Required ports for the internal service are confirmed to be allowed.
- Network segmentation is confirmed and restrictions, if any, are addressed.
- Internal traffic is tested to check service reachability.
High Traffic from Unusual IP
- Source IP address details are identified and checked for malicious sources.
- Temporary block rule for the IP address is created.
- Traffic patterns are analyzed.
- Internal device compromises and unusual traffic are checked.
- Permanent block of the IP is implemented if necessary.
New Server Failing to Connect to the Internet
- IP and Gateway settings are checked.
- Outbound rules are verified to permit internet access for server's subnet.
- NAT configuration is checked for correct routing of internet-bound traffic.
- Firewall logs are checked for any blocked traffic.
- Connectivity is checked with
ping
andtraceroute
to diagnose connection failures.
User Account Locked
- Checking password expiry in domain environments
- Resetting the user’s password if locked out
- Reviewing logs for login attempts.
- Checking network connection if domain authentication is required.
- Checking and clearing cached credentials
Failed Open Ports/Services Audit
- Identified open ports are reviewed in the firewall configuration.
- Validation if ports are essential to applications/services.
- Ports that are not necessary are closed.
- Logging for open ports is enabled.
- Routine port scans are scheduled for future unexpected open ports
Microsoft 365 issues
- OneDrive Sync Issues: Checking user login, disk space, cache clearing and checking the correctness of user account names/passwords.
- OneDrive Permissions Issues: Validating sharing permissions, email addresses, file restrictions and re-sharing files with correct permissions.
- SharePoint Access Denied: Verifying user permissions, validating account activity, clearing cache and checking for compliance policies.
- SharePoint Synchronization Issues: Confirming OneDrive installation, checking SharePoint permissions and clearing cached data.
- Email delivery failure: Checking for email policy restrictions, ensuring the email address is valid, testing with other external domains and checking if external domains are blocked.
- Email Attachment Issues: Checking file size limits, file sharing via other means such as links and confirming that the email client is updated.
Device Management
- Device enrollment failure: Checking user licenses, network connectivity, enrollment status page, enrollment restrictions and compliance policies.
- Autopilot Enrollment Issues: Verifying profile assignment, resetting device, checking internet connectivity, checking logs for errors
- Device non-compliance: Checking antivirus, compliance policy settings, syncing the devices and checking firewall settings
- Application Deployment Failures: Confirming App assignment and checking installation requirements.
- Security compliance policy warnings: Confirming compliance policy requirements and manually triggering a compliance check.
- Autopilot stuck in Identifying phase: Checking Network Access, reviewing Autopilot profile and resetting the device if needed..
Additional Notes
- Best practices and troubleshooting tips for ongoing management are discussed.
- Information is provided on resolving synchronization issues related to specific Microsoft 365 services (OneDrive and SharePoint), network connectivity, and device management.
- Best practices for resolving common email issues, like large file attachments, external domain problems, and bounce-back issues, are noted.
- Using tools like
gpupdate /force
,sfc /scannow
,chkdsk /f
,ipconfig /flushdns
,netsh int ip reset
,arp -a
,tcping
and others may help with troubleshooting different errors.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on network troubleshooting techniques, including connectivity issues, VPN connectivity, and network latency problems. This quiz covers various methods and tools such as ping tests, firewall checks, and DNS resolution to diagnose and resolve network problems.