39
Unit Notes ICASAS301A Run standard diagnostic tests Topic 2

Kingscliff & Murwillumbah IT › 2015 › 01 › icas… · Web viewAntivirus software 13 Firewalls 13 Keeping software updated 13 Checking integrity and performance 13 Determining

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Kingscliff & Murwillumbah IT › 2015 › 01 › icas… · Web viewAntivirus software 13 Firewalls 13 Keeping software updated 13 Checking integrity and performance 13 Determining

Unit NotesICASAS301A Run standard diagnostic tests

Topic 2

Page 2: Kingscliff & Murwillumbah IT › 2015 › 01 › icas… · Web viewAntivirus software 13 Firewalls 13 Keeping software updated 13 Checking integrity and performance 13 Determining

© Copyright, 2023 by TAFE NSW - North Coast Institute

Date last saved: 28 May 2013 by Tracy Norris Version: 1.2 # of Pages = 4

Copyright of this material is reserved to the Crown in the right of the State of New South Wales. Reproduction or transmittal in whole, or in part, other than in accordance with the provisions of the Copyright Act, is prohibited without written authority of TAFE NSW - North Coast Institute.

Disclaimer: In compiling the information contained within, and accessed through, this document ("Information") DET has used its best endeavours to ensure that the Information is correct and current at the time of publication but takes no responsibility for any error, omission or defect therein. To the extent permitted by law, DET and its employees, agents and consultants exclude all liability for any loss or damage (including indirect, special or consequential loss or damage) arising from the use of, or reliance on, the Information whether or not caused by any negligent act or omission. If any law prohibits the exclusion of such liability, DET limits its liability to the extent permitted by law, to the re-supply of the Information.

Third party sites/links disclaimer: This document may contain website contains links to third party sites. DET is not responsible for the condition or the content of those sites as they are not under DET's control. The link(s) are provided solely for your convenience and do not indicate, expressly or impliedly, any endorsement of the site(s) or the products or services provided there. You access those sites and use their products and services solely at your own risk.

Acknowledgements:

Graphic Design: Mark Keevers (Template design)

Page 2 of 31ICASAS301A Run standard diagnostic tests

Page 3: Kingscliff & Murwillumbah IT › 2015 › 01 › icas… · Web viewAntivirus software 13 Firewalls 13 Keeping software updated 13 Checking integrity and performance 13 Determining

Table of ContentsTable of Contents 3Getting Started 6Using these notes 6

Determine and carry out preventative maintenance 7Before you start 7

What is maintenance? 7Types of maintenance 7

Preventative maintenance 7

Reactive maintenance 8

Maintenance of software 8

Preventative maintenance 8Protecting critical hardware 9

Facility protection9

Redundancy 9

Protection from environmental conditions 10

Temperature 10

Humidity 10

Dirt and dust 10

Cigarette smoke 10

Electromagnetic interference 10

Protection of data — backup 11

Server backup options 11

Workstation backup 11

Types of backup 11

Protection of data from threats 12

Service packs, patches and operating system updates 12

Anti-malware software 12

Antivirus software 13

Firewalls 13

Keeping software updated 13

Checking integrity and performance 13

Determining your organisation’s maintenance requirements 13Organisational policies 14

External service level agreements 14

Page 3 of 31ICASAS301A Run standard diagnostic tests

Page 4: Kingscliff & Murwillumbah IT › 2015 › 01 › icas… · Web viewAntivirus software 13 Firewalls 13 Keeping software updated 13 Checking integrity and performance 13 Determining

Fixed service versus per-call cover 14

Software warranties and maintenance agreements 15

Equipment documentation 15

Procedures for internal clients 15

Preventative maintenance tasks 16Safety first 16

Common hardware maintenance tasks 16Cleaning 16

Whole system maintenance 17

Hard disk maintenance 17

Printers 17

Tape backup systems18

Low maintenance devices 18

Scheduling maintenance 19Developing a preventative maintenance schedule 19

Cost effectiveness 19

Minimise downtime 19

Practicality 19

Meet business needs 20

When should tasks be scheduled? 20

How often should tasks be scheduled? 20

What should be recorded? 20

Reporting problems 21

Summary 21Check your progress - Questions 22

Activity 1: Identify cost effectiveness of maintenance tasks 22

Activity 2: Determine the maintenance time for a device 23

Activity 3: Investigate Windows Backup 23

Activity 4: Investigate software maintenance tools 23

Activity 5: Check your computer’s vulnerability 24

Check your progress - Answers 25Activity 1: Identify cost effectiveness of maintenance tasks 25

Activity 2: Determine the maintenance time for a device 26

Activity 3: Investigate Windows Backup 26

Activity 4: Investigate software maintenance tools 26

Research 26Preventative maintenance and diagnostic testing 26

Page 4 of 31ICASAS301A Run standard diagnostic tests

Page 5: Kingscliff & Murwillumbah IT › 2015 › 01 › icas… · Web viewAntivirus software 13 Firewalls 13 Keeping software updated 13 Checking integrity and performance 13 Determining

Tech Republic 26

Windows IT Library 26

PCGuide 27

Diagnostic utilities 27

Download.com 27

Information on security and threats 27

Microsoft Support Centre 27

Computer active 27

a-squared27

Windows update 27

Online dictionaries 27

Terms 28Check your understanding - Questions 29Check your understanding - Answers 30

Page 5 of 31ICASAS301A Run standard diagnostic tests

Page 6: Kingscliff & Murwillumbah IT › 2015 › 01 › icas… · Web viewAntivirus software 13 Firewalls 13 Keeping software updated 13 Checking integrity and performance 13 Determining

Getting StartedThese unit notes have been developed to provide a learning pathway to competence in ICASAS301A Run standard diagnostic tests. The notes contain all the skills and knowledge learning required to achieve competence.

Using these notesIcons and symbols are used throughout this guide to provide quick visual references. They indicate the following:

Icon Meaning Icon Meaning

ACTIVITY: An activity is listed to be completed

ACTIVITY: A Learning activity requiring some physical action

WWW: A web link is listed REFLECTION: A point is to be considered and thought about more deeply

IMPORTANT: A pivotal point is detailed

SEARCH: A particular item / book etc needs to be found and applied

Page 6 of 31ICASAS301A Run standard diagnostic tests

Page 7: Kingscliff & Murwillumbah IT › 2015 › 01 › icas… · Web viewAntivirus software 13 Firewalls 13 Keeping software updated 13 Checking integrity and performance 13 Determining

Determine and carry out preventative maintenanceAn essential function of any IT department is to maintain its organisation’s IT infrastructure. This will include both critical and non-critical systems and cover both hardware and software requirements. This Learning Pack examines possible equipment and maintenance procedures and specific maintenance requirements of different equipment. We’ll also look at the types of preventative maintenance schedules you may be required to produce, to help avoid problems before they occur.

After completing this topic you will be able to: Explain the importance of following a regular maintenance schedule. Examine and review specified equipment and maintenance procedures, in order

to determine those procedures that can be handled internally. Determine the maintenance tasks and follow procedures that should be carried

out on specific equipment, as indicated by the equipment manufacturer and organisational guidelines.

Organise and undertake regular scheduled maintenance including, but not limited to, removal of dust and grease build up and replacing consumables and other components when required.

Inform appropriate persons when problems are identified by preventative maintenance.

Before you startYou should already be familiar with a range of IT hardware items, peripherals and consumables, and be able to access and use a variety of Help resources to solve problems.

What is maintenance?When we talk about maintenance, our aims are to:

preserve our IT systems in optimal condition

fix problems that occur

upgrade the existing systems to minimise future risks to the business.

This will require maintenance of hardware, software and data.

Types of maintenanceMaintenance falls into two broad categories:

preventative (or routine maintenance), and

reactive (or non-routine).

Preventative maintenanceFor example, you periodically have your car serviced, which involves changing the engine oil, air filter, spark plugs and so on. If you don’t do this, chances are at some later time your car’s performance will suffer, and you may even be stranded at a great inconvenience to you! This is preventative maintenance, and the situation is really quite similar with IT equipment. We

Page 7 of 31ICASAS301A Run standard diagnostic tests

Page 8: Kingscliff & Murwillumbah IT › 2015 › 01 › icas… · Web viewAntivirus software 13 Firewalls 13 Keeping software updated 13 Checking integrity and performance 13 Determining

need to carry out preventative maintenance on a periodic basis to prevent problems occurring in the future that may interrupt business continuity.

A simple example of IT preventative maintenance is changing the drum in a laser printer.

Reactive maintenance

Reactive maintenance refers to actions taken to fix problems after they have occurred. To continue with the car example, when you get a flat tyre and have to replace it, this is a simple example of reactive maintenance. You can probably think of many IT examples. Replacing a broken cable is one.

Apart from preventative and reactive maintenance, there is another type of maintenance that deals with upgrading the organisation’s infrastructure to minimise the level of risk to business continuity.

Maintenance of software

It’s not only the hardware in an organisation that needs to be maintained — software maintenance is also required. An organisation that has custom-built software needs programmers to maintain it. This will include:

preventative maintenance to detect and correct code that may cause future errors (eg to validate input data)

adaptive maintenance to adapt the software in line with changes to business requirements (eg to make it run on an Intranet)

perfective maintenance to simply improve the performance of the software

reactive maintenance to fix software bugs.

But apart from custom-built software, organisations need to maintain other software. There may be patches, version updates, driver updates, etc to be installed. Upgrading packaged software across an organisation to standardise software versions is a good way of helping to reduce the level of support and maintenance required.

Maintenance of a hard disk is really a form of software/data maintenance. A variety of tools are available for ‘cleaning up’ a disk, removing unwanted programs and data, backing up data and so on. Protecting the system from viruses and malware is also part of this sort of maintenance.

Preventative maintenance

Specific devices require different preventative maintenance procedures. However, there are a few broad areas that can be considered which require preventative maintenance practices. These include:

Protection of equipment due to changes in electrical supply: Surges and ‘brownouts’ cause major damage to computer devices. Un-interruptible power supplies (UPS), power conditioners and surge protection devices are all valuable preventative maintenance tools for any computerised device.

Page 8 of 31ICASAS301A Run standard diagnostic tests

Page 9: Kingscliff & Murwillumbah IT › 2015 › 01 › icas… · Web viewAntivirus software 13 Firewalls 13 Keeping software updated 13 Checking integrity and performance 13 Determining

Protection from environmental conditions: Humidity, temperature variation and dust are major causes of computer device failures. Actions taken to limit these factors in the workplace are valuable preventative maintenance tasks.

Protection of data using backups: It is vital that backups of both user data and system configurations are done regularly.

Protection of data from threats: Data needs to be protected from viruses, malware, hackers and so on, through the use of both hardware and software security measures.

Keeping software updated through service packs, patches and driver upgrades

Checking integrity and performance by using diagnostic tools: Routine running of any in-built diagnostics and/or checking for display of maintenance messages generated by the device.

Next we’ll look in more detail at some strategies for dealing with these.

Protecting critical hardwareFacility protection

Strategies must be in place to protect IT equipment from water damage, fire, contamination, power failure and theft. Some of these strategies include:

the implementation of early warning systems to detect water leaks, fire and air-borne contaminants

devices to continue power supply should there be a power failure such as a UPS (uninterruptible power supply) as well as on-site power generation

security access to computer facilities such as swipe cards or entry of a security number

recording serial numbers, asset numbers, location and allocation details of workstations.

Redundancy

If part of a network is interrupted, critical business processes need to be stored as soon as possible. One way of doing this is by implementing and maintaining full or partially redundant systems.

This means having an identical hardware infrastructure that can be activated should the main hardware infrastructure fail. Redundant systems can range from the duplication of entire networks to the duplication of cabling runs. Where entire networks are duplicated, system backup facilities are not required. However, full network redundancy is extremely expensive and, as such, not a commonly used option.

Partial redundancy is a common option for critical IT hardware.

An organisation’s disaster recovery plan will include such procedures for recovering network systems.

Page 9 of 31ICASAS301A Run standard diagnostic tests

Page 10: Kingscliff & Murwillumbah IT › 2015 › 01 › icas… · Web viewAntivirus software 13 Firewalls 13 Keeping software updated 13 Checking integrity and performance 13 Determining

Protection from environmental conditionsTemperature

The tolerance of computer components for extremes in temperature is limited — subjecting them to temperatures outside this range is likely to reduce their life. The room environment as well as cooling and ventilation systems are, therefore, important in maintaining computer equipment in optimum operational condition.

Humidity

Computers are also sensitive to humidity and should be kept dry. Protective measures would include keeping them away from windows, and avoiding food and drinks spills. Ventilation systems also help prevent problems with humidity.

Dirt and dust

Computers should be kept in a clean environment. Dust build-up around fans and on electrical components becomes a problem because it tends to prevent heat dissipation, and interferes with the fan’s cooling function. Regular cleaning is, therefore, important. If the equipment is kept in an industrial environment, additional measures must be put in place to protect it — use of air cleaners is one useful strategy.

Cigarette smoke

The particles from cigarette smoke have the same effect as dust — they build up on the surface of equipment, causing the same sorts of problems.

Electromagnetic interference

All electronic devices are capable of producing electromagnetic interference that can cause data to be lost, problems with picture quality on monitors, and other problems.

Page 10 of 31ICASAS301A Run standard diagnostic tests

Page 11: Kingscliff & Murwillumbah IT › 2015 › 01 › icas… · Web viewAntivirus software 13 Firewalls 13 Keeping software updated 13 Checking integrity and performance 13 Determining

Protection of data — backupAll organisations need strategies in place to:

backup critical data, and

ensure that data backup is being undertaken according to organisational policies.

This will involve both server backup and workstation backup.

Server backup options

Backup option Benefits Limitations

Backup to tape using backup/restore software such as Windows: the tape backups from the server can be sent to an off-site backup storage facility for restoration if backup files on-site are destroyed.

Simple; software readily available in Windows

Additional risks in transportation and storage; time to restore in the event of loss of data, ie time to data, can be too long and very costly

Backup server data to a remote tape unit via a WAN

Time to data much shorter; risks reduced due to less manual handling

Can be expensive

Backup data to a remote mirrored disk via a WAN

Time to data instantaneous; risks lowered further

Costs are high

Workstation backup

Workstations in an organisation are often standardised with respect to operating system and common applications. An ‘image’ or ‘build’ is created, making it much easier to restore the workstation to a re-usable state. There is usually an IT policy that specifies a ‘Standard Operating Environment’ for workplace PCs. Uncommon, or specific, applications are usually installed separately after the standard image is loaded.

However, users tend to customise their PCs with shortcuts, background images and screensavers, taskbar options, mouse speed and a variety of other options. Also, though it may be against company policy, there may be company data lurking on a user’s PC. Therefore, before any changes are made to a workstation PC, the hard disk should be backed up.

As mentioned, staff in a client/server organisation are generally encouraged not to store data on their own hard drives. However, where an organisation’s data is stored on a workstation hard drive, there must be some procedure in place for regularly backing it up.

Types of backup

An organisation will have policies that relate to:

the frequency of backups (daily, weekly, monthly)

Page 11 of 31ICASAS301A Run standard diagnostic tests

Page 12: Kingscliff & Murwillumbah IT › 2015 › 01 › icas… · Web viewAntivirus software 13 Firewalls 13 Keeping software updated 13 Checking integrity and performance 13 Determining

the time of day backups are done

how long backups are kept

where backups should be stored.

Also, there are different types of backup. You may not need to back up all files every time you back up. Different options include:

backup of selected directories

incremental backup – backup of only files that have been created or changed since the last full or incremental backup

differential backup – backup of files that have been created or changed since the last full backup.

Backup scheduling is an important part of any preventative maintenance plan. Windows provides a backup and restore tool, and this type of software is also provided by third parties.

Protection of data from threatsBecause of the widespread interconnectivity of computers today, and the potential for intrusion, theft, damage, and so on, organisations need to have clear policies and procedures to be followed to minimise these threats. Central to this will be a number of preventative maintenance procedures, as outlined below.

Service packs, patches and operating system updates

It has become obvious in recent years that when operating systems are released, they are not finished products. Because they are so complex, even after a period of rigorous testing, security flaws are often discovered after distribution. Anti-virus and other security tools cannot protect the system from operating system holes.

For critical security holes, as soon as the flaw is discovered, the software manufacturer quickly develops and releases a patch, which is a small software update to eliminate the hole. A group of patches is sometimes released as a major update, or service pack.

Microsoft makes these updates available for free.

Anti-malware software

Malware has increased in significance over recent years. Included in this category are:

Trojans, which appear to be harmless programs, are actually designed to either do damage or carry out a range of malicious activities

Dialers, programs that change the number you use for a dial-up modem, causing increases in charges

Worms, generally spread as email attachments

Spyware, adware and browser hijackers collect information from your computer or change the Internet options in the browser.

Anti-malware software helps to prevent a computer from these attacks. However, installing it and forgetting about it provides insufficient protection. Regular updates need to be carried out.

Page 12 of 31ICASAS301A Run standard diagnostic tests

Page 13: Kingscliff & Murwillumbah IT › 2015 › 01 › icas… · Web viewAntivirus software 13 Firewalls 13 Keeping software updated 13 Checking integrity and performance 13 Determining

Antivirus software

Viruses have been around for a long while, and have been overtaken somewhat by other types of threat. However, using antivirus software which is regularly updated is still an important preventative maintenance measure for computer systems.

Firewalls

There are two types of firewalls — hardware and software firewalls. Hardware firewalls offer the best protection against intrusion, but they are expensive for small companies. Desktop or a software firewall is useful, but malicious software may find ways to bypass it.

Keeping software updatedToday’s IT equipment is complex, and so is the software that supports it. Often a device is purchased with a projected life of several years, but in the mean time, other equipment and operating systems that it is used with are updated. Sometimes this means that a perfectly good piece of equipment no longer works, or works unsatisfactorily.

So new software for these devices (drivers) is developed and released. Keeping abreast of these various driver updates is also important in preventing problems before they arise.

Checking integrity and performanceComputer operating systems are generally provided with an array of diagnostic tools that can be used to check whether there are either hardware or software problems with the machine, or whether steps can be taken to improve its performance.

For example, Disk Defragmenter and Disk Cleanup are tools available in Windows operating systems. A whole range of other utilities is also available from other software manufacturers. Visit a website like download.com (http://www.download.com) and browse the range of software available.

Determining your organisation’s maintenance requirementsWe have so far discussed some broad areas of preventative maintenance. From the point of view of an IT Support person, how do you determine exactly what maintenance should be done, and how often it should be done? What information should you refer to?

To start with, your organisation will have specific procedures that deal with maintenance and how it is scheduled. These procedures will be either as a result of, or in conjunction, with the following:

Organisational policies, for example, a particular procedure may be in place because of your organisation’s policy on the management of risk.

Equipment, in particular specialised equipment, is covered by warranties and maintenance contracts. These will often involve an agreed level of support for the equipment, also called a service level agreement (SLA).

Both equipment and software are provided with documentation regarding their handling and maintenance requirements.

Page 13 of 31ICASAS301A Run standard diagnostic tests

Page 14: Kingscliff & Murwillumbah IT › 2015 › 01 › icas… · Web viewAntivirus software 13 Firewalls 13 Keeping software updated 13 Checking integrity and performance 13 Determining

Support is also often provided by phone or website, and may even involve the provision of training.

If you work in IT Support within your own organisation, the service you provide to your internal clients will also be governed by a service level agreement.

Organisational policiesThe maintenance procedures in an organisation will be determined by a number of factors, including:

how critical the IT components and/or software are

cost constraints

the risk to business continuity

pre-existing commitments

expectations of service by the organisation’s business units.

External service level agreementsMaintenance agreements are a way of ensuring that the business is supported to an agreed level at a known cost.

As a result, the business may enter into an agreement with an IT support organisation. All critical hardware components and software should be covered by either a warranty or maintenance agreement. There are a number of things to consider:

1 New purchases. A warranty agreement comes automatically with the purchase of hardware components and software. You usually have the option of extending the warranty when you purchase the item.

2 Extension of warranty. You can enter into a maintenance agreement when the initial warranty expires rather than extending the warranty.

3 Type of cover. A maintenance agreement is an agreement negotiated between the organisation and the supplier to maintain the hardware or software. Maintenance agreements can be on a fixed service basis, eg 24 hours a day, 7 days per week (24/7); 8 hours a day, 5 days a week (8/5); 12 hours a day, 5 days a week (12/5) or on a per-call basis.

Fixed service versus per-call cover

The benefit of the fixed service type of maintenance agreement is that you receive a dedicated and, typically, faster response. Depending on the terms of the agreement, your maintenance costs are also likely to be covered.

A per-call basis means you receive maintenance services from the supplier as required. The problem with this type of agreement is that you have to wait until a technician is available and you are charged for labour and parts. A benefit is this cost can often be less expensive than a maintenance contract.

Page 14 of 31ICASAS301A Run standard diagnostic tests

Page 15: Kingscliff & Murwillumbah IT › 2015 › 01 › icas… · Web viewAntivirus software 13 Firewalls 13 Keeping software updated 13 Checking integrity and performance 13 Determining

Software warranties and maintenance agreements

Software should also be covered by a warranty or maintenance agreement. Software warranty only lasts for a short period of time, so a maintenance agreement for critical software should be in place. If customised software has been developed in-house, a maintenance agreement will not be necessary because it will be maintained internally.

A software maintenance agreement may include, for example, a free or discounted upgrade of packaged software.

Equipment documentationEach item of IT equipment should be accompanied by documentation. This may be provided in hard copy, as a manual, on CD, or on a support website. If original documentation provided as hard copy is missing, it can usually also be downloaded from the manufacturer’s website. IT Support staff need to be able to read and interpret all such technical documentation.

Documentation for a system should outline the manufacturer’s recommended maintenance procedures for the unit. The procedures should state:

how often maintenance procedures should be done

any equipment/material/consumables that are required

the actual steps to complete the maintenance task, including all relevant safety precautions for the task.

The system’s documentation should also identify any components of a system that should not have any preventative maintenance applied to it for safety reasons. Generally speaking, hardware manufacturers will include instructions for:

cleaning

care

consumables — handling, installing and disposing

making adjustments

troubleshooting.

Apart from documentation, the supplier’s website will supply software patches and driver updates as they become available.

Procedures for internal clientsSince your external suppliers and internal clients involve different service level agreements, procedures for handling them are usually different, but one may depend on the other. Some of these procedures detail:

the way service requests are reported

how fast you can respond to requests — how fast you respond to an internal client will depend on the agreed response time with an external supplier. For example, let’s say a workstation monitor needs replacing. If your external supplier says it will be done within two days, then you can’t do it any faster for your client!

Page 15 of 31ICASAS301A Run standard diagnostic tests

Page 16: Kingscliff & Murwillumbah IT › 2015 › 01 › icas… · Web viewAntivirus software 13 Firewalls 13 Keeping software updated 13 Checking integrity and performance 13 Determining

how requests are escalated — an external supplier will have specific, agreed escalation procedures, and these may be different from your own internal ones.

Preventative maintenance tasksHaving discussed the organisational factors and reference documents that help to determine an organisation’s maintenance procedures, we’ll now concentrate on those tasks that would be included in most preventative maintenance programs.

Don’t forget that highly specialised equipment will need specialised maintenance procedures and may require independent technical qualifications and personnel to maintain it. As you are now aware, this will involve an external maintenance agreement.

Safety firstRemember that ALL preventative maintenance must be carried out within the regulations associated with the Occupational Health and Safety Act, 2000 and relevant government licensing frameworks. Your own safety is far more important than the preventative maintenance of any device.

Common hardware maintenance tasksWhile it is beyond this topic to identify all types of maintenance across the range of devices available in the IT workplace, the following devices and preventative maintenance tasks are included here as common tasks.

CleaningThe following table gives suggestions for cleaning the parts of a computer.

Device Type of maintenance Resources

Keyboard Keyboard covers; regular ‘dusting’ with compressed air

Original system documentation will recommend cleaning material instructions

Mouse Cleaning mouse ball and rollers; replacing ball mice with optical mice will solve most problems

Original system documentation will recommend cleaning materials

Monitor Wiping of screen — be careful of the cleaning products used as some may damage the screen. Consult the manufacturer’s instructions for the monitor.

Original documentation will recommend cleaning materials

CD/DVD drives

Cleaning drives with CD/DVD cleaning kit CD/DVD cleaning kit documentation

Floppy disk drives

Cleaning drives with FDD cleaning kit FDD cleaning kit documentation

Page 16 of 31ICASAS301A Run standard diagnostic tests

Page 17: Kingscliff & Murwillumbah IT › 2015 › 01 › icas… · Web viewAntivirus software 13 Firewalls 13 Keeping software updated 13 Checking integrity and performance 13 Determining

Whole system maintenanceMaintenance of a computer system will also involve:

checking system event logs regularly

viewing POST results

routine checking using system monitoring utilities that track system temperatures, voltages and fan speeds

checking for dust accumulation, particularly around fans and vents

updating drivers for printers, modems, soundcards, video cards and so on, as needed

updating operating system and application software with the latest service packs; eg later versions of Windows allow updates to be automatically downloaded and installed, but this can be disabled

updating anti-virus software and virus definitions.

Hard disk maintenanceSoftware for carrying out hard disk maintenance is provided by the operating system utilities, as well as by third party software. Typical maintenance will include:

removal of unwanted files — this can include old files, temporary files, downloaded files, corrupt files, Internet cookies, and browser history

removal (uninstalling) of unwanted software

backup — this may be by means of standard backup/restore software, or through imaging software such as Norton Ghost

cleaning up the registry

defragmenting files

creating system restore/boot disks

scanning for viruses, spyware, adware, malware, and so on

disk checking using standard diagnostic tests.

Many of these activities can be scheduled to occur automatically. We’ll discuss scheduling in the next section.

PrintersMost maintenance on printers relates to print quality and paper handling. Maintenance on printers may include the following.

Component Type of maintenance Resources

Laser printer drum

Cleaning/replacement. Some printer replacement cartridges include the drum, requiring less maintenance. Others may require a separate

Printer documentation

Page 17 of 31ICASAS301A Run standard diagnostic tests

Page 18: Kingscliff & Murwillumbah IT › 2015 › 01 › icas… · Web viewAntivirus software 13 Firewalls 13 Keeping software updated 13 Checking integrity and performance 13 Determining

maintenance procedure for the drum. Consult the manufacturer’s instructions.

Ink print heads

Cleaning/replacement. Some printer replacement cartridges include the ink print heads, requiring less maintenance. Others may require a separate maintenance procedure. Some print heads also require alignment. Consult the manufacturer’s instructions.

Printer documentation, in-built printer cleaning utilities

Paper rollers and feed path

Purchasing quality paper, ensuring a dust free environment and regular cleaning. Consult the manufacturer’s instructions.

Printer documentation

Tape backup systemsTape backup systems are listed as a separate item here due to their importance in the IT workplace.

Device Type of maintenance Resources

Tape drive Cleaning drive heads. This should be done regularly. Consult the manufacturer’s instructions.

Head cleaning kit and original tape drive documentation

Backup software

Regular viewing of backup logs for errors Backup software documentation

Tape media

Checking media for errors and tape age against the recommended tape life. Perform test restores to confirm reliability of media and backup process.

Backup software documentation and media specifications

Low maintenance devicesMany devices such as hubs/switches, scanners and USB devices are normally considered ‘maintenance free’. However, these units may benefit from the following types of maintenance.

Device Type of maintenance Resources

Hub/switch Checking systems log and port statistics for large error counts

Original manufacturer’s documentation

Scanner Glass cleaning with recommended products; ensuring a dust free environment

Viewing POST diagnostics test results

Other devices

Viewing POST diagnostics test results; running regular tasks to ensure the device is functional

Viewing POST diagnostics test results

Page 18 of 31ICASAS301A Run standard diagnostic tests

Page 19: Kingscliff & Murwillumbah IT › 2015 › 01 › icas… · Web viewAntivirus software 13 Firewalls 13 Keeping software updated 13 Checking integrity and performance 13 Determining

Scheduling maintenance Many organisations with a preventative maintenance program will have maintenance tasks organised on a schedule. The goal of a schedule is to ensure that regular maintenance occurs. Given the time pressures of working as an IT Support person, a schedule will assist you in organising your workload to ensure that the best possible service is provided to the client.

If a maintenance schedule does not exist, consider designing one. A schedule should simply include:

1 each preventative maintenance task that should be completed

2 how often the task should be repeated

3 an estimate of the time required to complete the task.

These tasks can then be allocated time in your schedule at the required intervals.

Developing a preventative maintenance scheduleIn developing a preventative maintenance schedule, it is important that as an IT Support person you are aware of the main aims of preventative maintenance. They are:

to meet the needs of the business

to extend the working life of equipment

to reduce the amount of emergency downtime caused by faults that can be prevented

to be practical

to make the IT system more cost effective.

Cost effectiveness

It is important that any preventative maintenance be cost effective. It is possible to spend significant amounts of time cleaning and testing devices such as keyboards and mice to extend their life. However, the replacement cost of those devices, including the cost of having an inventory of such items on hand, may mean that it is cheaper to purchase new devices rather than extend the life of the existing devices.

Every maintenance issue must be examined from a cost point of view.

Minimise downtime

It is important that preventative maintenance focuses on items that may cause significant downtime and cost to the business if they were to fail. Such items may include hard disk drives (HDD) of servers. Should they fail, emergency downtime may occur at a significant cost to the business. As a result, such devices should be considered high priority in a maintenance schedule.

Page 19 of 31ICASAS301A Run standard diagnostic tests

Page 20: Kingscliff & Murwillumbah IT › 2015 › 01 › icas… · Web viewAntivirus software 13 Firewalls 13 Keeping software updated 13 Checking integrity and performance 13 Determining

Practicality

Preventative maintenance must be practical within the working of a business. If the process of preventative maintenance causes a major interruption to the daily working of a business, the maintenance program will fail. Always try to consider the impact on the users of the computers when considering a preventative maintenance program.

Meet business needs

Any maintenance program must meet the needs of the business if it is going to be successful. While this should have been considered when an SLA was written, the maintenance work must be carried out within the organisation’s guidelines and requirements.

When should tasks be scheduled?Scheduled maintenance should obviously impact as little as possible on normal business operations, and should therefore be carried out at periods of low activity, such as during the night, at weekends or holiday periods. It is possible to carry out many tasks with very little client awareness or involvement.

If client involvement is required, they should be informed in advance of when they will be affected, for how long, and how it will impact them. You may need to give them instructions, such as logging out of their PC, leaving it on, rebooting, and so on.

There are some useful operating system or third-party tools which allow maintenance tasks to be automatically scheduled. This is the case with later versions of Windows.

How often should tasks be scheduled?To determine how frequently maintenance tasks should be done, you should first refer to the types of documentation mentioned earlier in this topic. The preventative maintenance strategies in place would also help determine the frequency of tasks. You should also bear in mind the principles listed above. However, if your organisation is small and you are in the process of developing your own schedule, you’ll need carry out research and then make these decisions yourself.

For example, how often should a hard disk be defragmented? You’ll find opinion divided on this one, as it depends on a number of different factors such as hard disk size, how much space is on the disk, and how much disk and file activity there is. Suggestions range from daily, to three monthly! If it can be scheduled to run automatically during a period of non-activity, a more frequent schedule can do no harm.

Similar decisions need to be made with respect to the scheduling of backups.

What should be recorded?Scheduling can be a formal process, where preventative maintenance is carefully scheduled for various business units within the organisation and formally documented and signed off. It can also be an informal process.

The following should be documented in a preventative maintenance schedule:

1 dates for maintenance to occur

2 business unit/floor/building/computer facilities where the maintenance will occur

Page 20 of 31ICASAS301A Run standard diagnostic tests

Page 21: Kingscliff & Murwillumbah IT › 2015 › 01 › icas… · Web viewAntivirus software 13 Firewalls 13 Keeping software updated 13 Checking integrity and performance 13 Determining

3 the IT staff member responsible for completing the maintenance

4 dates for completion

5 notification that maintenance has been completed

6 comments or notes where problems are detected.

Reporting problemsYour preventative maintenance schedule will occasionally alert you to potential problems. When this happens, you should be aware of the appropriate person to inform. Your organisational guidelines and/or service level agreements should indicate who this is. It may be your supervisor, authorised business representative, external supplier, or client.

SummaryPreventative maintenance is an important component of many IT Support positions. A preventative maintenance program should be a common sense schedule that aims to provide the regular maintenance required for devices in an IT installation.

Page 21 of 31ICASAS301A Run standard diagnostic tests

Page 22: Kingscliff & Murwillumbah IT › 2015 › 01 › icas… · Web viewAntivirus software 13 Firewalls 13 Keeping software updated 13 Checking integrity and performance 13 Determining

Check your progress - QuestionsActivity 1: Identify cost effectiveness of maintenance tasks

Identify the most cost-effective maintenance tasks that you could do as an IT Support person by doing the following activity:

Cost effectiveness

Maintenance tasks are listed in the table below. Each task has listed with it the amount of time taken to service it, how often that servicing should be done and the replacement cost of the item.

As an IT Support person (who would perform these maintenance tasks) you are costing the company $60.00 per hour.

List four of these preventative maintenance tasks under Schedule that you believe are the most cost effective.

Schedule Maintenance task: Time taken:

(How often)Repeat every:

Replacement cost of item protected:

Keyboard cleaning 15 minutes

Month $25

Mouse cleaning 10 minutes

Fortnight $15

File server system log 5 minutes Week $5000

Floppy disk drive cleaning

5 minutes Week $15

Tape drive cleaning 20 minutes

Fortnight $4000

Backup software media error log

5 minutes Each backup $10

Monitor cleaning 5 minutes Week $500

Installing surge protection on computers

5 minutes Once $1000 to $5000

Page 22 of 31ICASAS301A Run standard diagnostic tests

Page 23: Kingscliff & Murwillumbah IT › 2015 › 01 › icas… · Web viewAntivirus software 13 Firewalls 13 Keeping software updated 13 Checking integrity and performance 13 Determining

Activity 2: Determine the maintenance time for a device

Identify a printer you have access to and check the original documentation of the device — for the recommended periodic maintenance procedures. If the original documentation is not available, use the manufacture’s website to access a copy of this documentation.

List each preventative maintenance procedure, estimate the time taken to complete each task and identify how often the task should be repeated. Use this to calculate the maintenance time required for this device on a yearly basis.

_____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Activity 3: Investigate Windows Backup

If you are using a Windows computer, investigate the version of Windows Backup on your machine. It will usually be located as one of the system tools in the Accessories group. Try the following:

Learn about the software using the Help available, and browse the various sections. Try carrying out a variety of backup types. Create one or two backup files Move some unwanted files into a folder, back up the folder, then delete it. See whether

you can restore the folder from your backup.

Activity 4: Investigate software maintenance tools1. Locate any software maintenance tools available on the computer you are using. Look

for tools such as: a. Disk defragmenter b. Disk cleanup c. Virus scanning software d. Disk checking software.

2. Download software maintenance and diagnostic tools from the Internet, using a site such as Download.com at: http://www.download.com/

Investigate these tools using any instructions or Help available, and try them out on your computer.

Page 23 of 31ICASAS301A Run standard diagnostic tests

Page 24: Kingscliff & Murwillumbah IT › 2015 › 01 › icas… · Web viewAntivirus software 13 Firewalls 13 Keeping software updated 13 Checking integrity and performance 13 Determining

Activity 5: Check your computer’s vulnerability

If using a Windows system:

1. Check your System Properties in the Control Panel. Look at the version of the operating system you are using, and any service pack that may be installed. Do you have the latest service pack? Do you know whether you have the latest service pack installed?

2. Depending on your version of Windows, also have a look at the ‘Automatic updates’ facility. Investigate it further using the Windows help or the online support site.

3. Use the free tool on the Symantec website to check your home computer’s vulnerability: visit http://security.symantec.com and follow the appropriate links.

Page 24 of 31ICASAS301A Run standard diagnostic tests

Page 25: Kingscliff & Murwillumbah IT › 2015 › 01 › icas… · Web viewAntivirus software 13 Firewalls 13 Keeping software updated 13 Checking integrity and performance 13 Determining

Check your progress - AnswersActivity 1: Identify cost effectiveness of maintenance tasks

While it is not possible with the information provided to complete a full cost benefit analysis, you should be able to identify the four most cost effective items to maintain (versus replacement). Many of the most labour intensive items (to maintain) have the lowest replacement cost and so are the least cost effective.

Schedule Maintenance task:

Time taken:

(How often)Repeat every:

Replacement cost of item protected:

File server system log

Keyboard cleaning

15 minutes Month $25

Tape drive cleaning

Mouse cleaning

10 minutes Fortnight $15

Backup software media error log

File server system log

5 minutes Week $5000

Installing surge protection on computers

Floppy disk cleaning

5 minutes Week $15

Tape drive cleaning

20 minutes Fortnight $4000

Backup software media error log

5 minutes Each backup $10

Monitor Cleaning

5 minutes Week $500

Installing surge protection on computers

5 minutes Once $1000 to $5000

Page 25 of 31ICASAS301A Run standard diagnostic tests

Page 26: Kingscliff & Murwillumbah IT › 2015 › 01 › icas… · Web viewAntivirus software 13 Firewalls 13 Keeping software updated 13 Checking integrity and performance 13 Determining

Activity 2: Determine the maintenance time for a device

The purpose of this activity is to start you thinking about the ongoing time commitment to a device once it is installed in the workplace.

Activity 3: Investigate Windows Backup

You have probably been introduced to backup software before, but this activity should be a useful revision exercise for you. In particular, you need to make sure that you can restore files from a backup, otherwise there is very little point in doing it!

Activity 4: Investigate software maintenance tools

Use caution with any tools you download. Make sure you read instructions thoroughly, checking the requirements of the software. You don’t want to do the opposite of what you are trying to achieve by damaging your computer system!

ResearchFor resources that relate to your computer’s operating system you can:

search manufacturer’s and/or vendor’s websites find textbooks specialising in the configuration of your chosen operating system

(in libraries and at booksellers) access the original documentation that came with the system you are using.

For device-specific maintenance information:

access the original documentation that came with the device access the support sections of the manufacturer’s website. Note that many forms of device documentation may refer to preventative

maintenance as either ‘periodic maintenance’ or simply as ‘maintenance’.

Preventative maintenance and diagnostic testingBooks on A+ Certification are a useful source for information on these topics, and you’re likely to find plenty of information on the Web a well. Below are a few suggestions. Home page links are provided — you’ll have to use the site’s search tool to look for specific information on preventative (or preventive, as it’s often called maintenance.

Tech Republic

This is comprehensive source of information on computer related technical issues: http://techrepublic.com

Windows IT Library

http://www.windowsitlibrary.com

Page 26 of 31ICASAS301A Run standard diagnostic tests

Page 27: Kingscliff & Murwillumbah IT › 2015 › 01 › icas… · Web viewAntivirus software 13 Firewalls 13 Keeping software updated 13 Checking integrity and performance 13 Determining

PCGuide

This site has a comprehensive section titled ‘System Care Guide’: http://www.pcguide.com/

Diagnostic utilitiesDownload.com

Browse this site for a range of preventative maintenance utility software — utilities, drivers, anti-spyware, and so on: http://www.download.com/

Information on security and threatsApart from the few suggestions made below, visit the home pages for popular virus protection software such as Symantec anti-virus, McAffee, Sophos, Vet and so on.

Microsoft Support Centre

Comprehensive support site for Microsoft products. Navigate to the Security Help section for guidance and support on security issues: http://www.support.microsoft.com/

Computer active

This site boasts ‘simple, clear advice’ on all aspects of computing. There is a section titled ‘A guide to Microsoft.com’ which is a guide to finding what you want on the Microsoft support websites: http://www.computeractive.co.uk/

a-squared

This is a useful source of information on security threats. It is a commercial software site, but does have some well written and concise information on security. Look for the topic: ‘Security-Guide – The Basics’: http://www.emsisoft.com/en/

Windows update

To install items from Windows Update, you must be logged on as an Administrator or a member of the Administrators group. If your computer is connected to a network, network policy settings may also prevent you from completing this procedure: http://windowsupdate.microsoft.com

Online dictionariesIt is always useful to have a link to a good PC dictionary. For example:

http://www.webopedia.com http://www.techweb.com/encyclopedia

Page 27 of 31ICASAS301A Run standard diagnostic tests

Page 28: Kingscliff & Murwillumbah IT › 2015 › 01 › icas… · Web viewAntivirus software 13 Firewalls 13 Keeping software updated 13 Checking integrity and performance 13 Determining

Terms

Booting derives from the ‘Boot Strap Code’ that referred to a small piece of programming code built into computers that instructed the machine on what to do when turned on; booting now generally refers to the processes automatically attempted when power is provided to a computer

Conditioner, Power a device which reforms the quality of mains electrical power entering the building; it can be very useful in prolonging the life of electrical devices such as power supplies

Device any piece of hardware attached to a computer system; it normally has a corresponding piece of software called a driver

Driver a piece of software written to be a ‘go-between’ the operating system and the hardware device; normally has a revision number or date that allows you to find updated versions of the software

FDD normally refers to a 3.5 inch floppy disk drive found on most PC systems

HDD the hard disk drive of a computer system; normally based on the IDE interface, but may also be based on SCSI or USB interfaces

IDE Integrated Drive Electronics; this is the most common, but not the only, way of attaching a hard disk to your system; it is the default drive interface on most PC systems; other interfaces for drives include SATA, SCSI and USB

Motherboard the main system board of a computer; holds input/output interfaces, the CPU and the BIOS/CMOS system

POST Power On Self Test; an in-built diagnostic program that is run when a device is turned on; it will often report errors as flashing lights or beeps, depending upon the device; most computing devices have a POST procedure

RAM main system memory known as Random Access Memory

SLA Service Level Agreement; a contract between a client who requires a service and a service provider; in the IT industry, SLAs are a common occurrence as they define the obligations of the service provider and the value of that service to the client

Surge protector a device that is designed to protect a device from peaks of over-voltage; normally plugged into a power point and then the device is plugged into it; the surge protector is often damaged in the process of protecting the device from a power surge

Page 28 of 31ICASAS301A Run standard diagnostic tests

Page 29: Kingscliff & Murwillumbah IT › 2015 › 01 › icas… · Web viewAntivirus software 13 Firewalls 13 Keeping software updated 13 Checking integrity and performance 13 Determining

UPS Un-interruptable Power Supply; a device used to provide short term power in the event of a blackout; the capacity of a UPS must be carefully matched to the power requirements of the systems attached to it

USB Universal Serial Bus; a common interface used for connecting a range of devices to the motherboard

Check your understanding - QuestionsDo you think you already have the knowledge covered in this topic? Try and answer the following questions to check your understanding.

Question 1

SLA stands for:

A. Synchronous language algorithmB. Service level agreement

C. Standard language acronym

D. Serial line authentication.

Question 2

A preventative maintenance program is used by a business to:

A. Extend the warranty on equipment purchased.B. Gain extra performance from a piece of equipment

C. Ensure that a piece of equipment meets their needs

D. Maximise the life of equipment in a cost effective manner

Question 3

Answer true or false for the following statement.

An un-interruptible power supply (UPS) does not form part of a preventative maintenance program.

Page 29 of 31ICASAS301A Run standard diagnostic tests

Page 30: Kingscliff & Murwillumbah IT › 2015 › 01 › icas… · Web viewAntivirus software 13 Firewalls 13 Keeping software updated 13 Checking integrity and performance 13 Determining

Question 4

Answer true or false for the following statement.

The protecting environment that a computer works in should be part of a preventative maintenance program.

Page 30 of 31ICASAS301A Run standard diagnostic tests

Page 31: Kingscliff & Murwillumbah IT › 2015 › 01 › icas… · Web viewAntivirus software 13 Firewalls 13 Keeping software updated 13 Checking integrity and performance 13 Determining

Check your understanding - AnswersQuestion 1

B: SLA stands for ‘service level agreement’.

Question 2

D: A preventative maintenance program is used by a business to maximise the life of equipment in a cost effective manner.

Question 3

False: This is a false statement. An un-interruptible power supply (UPS) does form part of a preventative maintenance program.

Question 4

True: This is a true statement. The protecting environment that a computer works in should be part of a preventative maintenance program.

Page 31 of 31ICASAS301A Run standard diagnostic tests