Fixing Common Security Problems
Security problems
can be caused by pretty much anything and can include all manner of
issues, from Windows reporting that it isn’t genuine
(which is normally fixed by a simple reboot) to users being unable to
access their files for some reason, or there is some type of encryption
such as Microsoft BitLocker in place which has decided to lock you out
of your files or even the whole computer.
Caution
It is normally a good idea when travelling with a BitLocker-encrypted
laptop or tablet that you also have with you, but kept separately from
the device, a USB pen drive containing the encryption key(s).
Other security problems can be caused by a malware infection, which can be trickier to resolve.
Generally, security problems can usually be solved by refreshing the
computer or running a System Restore. After all, if the configuration
was worked well earlier, then restoring those settings should work
again. And as previously mentioned, if it’s a refresh that you’re
suggesting, you can sometimes talk the user through performing this on
her own.
Fixing Common Configuration Problems
Nine times out of ten, configuration
problems are caused by the installation of new software or updates to
existing software, a new hardware device, updates to existing drivers,
or by a Windows Update.
If you have a configuration problem on the computer, then you (or any
other person using the computer) have just done something that perhaps
you shouldn’t have. This can include, for example, updating the computer
in a managed environment where the IT department has already determined
that Windows Update KB966706 causes a conflict with the bespoke
software that’s needed to run weekly reports.
If you have a configuration problem, then usually this can be solved
by undoing what it is that’s just been done: uninstalling software,
rolling back a hardware driver , or performing a System Restore again to rectify a Windows Update.
These actions will usually require being at the computer that’s
faulty and will also require the user who encountered the problem to be
honest about what he was doing right before it occurred.
Other configuration problems can manifest themselves as USB devices that no longer work. The best way to fix this is to unplug the device and then plug it into a different USB port. This will force Windows to reload the drivers for that device.
If you have a custom image set, Refresh
will keep your desktop software, as well. But how do you use it and why
do I say an IT department can talk a user though it? Let’s have a look
at this now, step by step.
-
Open the Start screen by using one of three methods: swipe in from
the right edge of the screen with your finger, move your mouse to the
lower right of the screen, or press Windows logo key+C on your keyboard.
-
With the Start screen open (see Figure 5), click the Settings charm.
-
In the panel that appears, click Change PC Settings at the lower right, as shown in Figure 6.
The new PC Settings screen appears,
-
On the left side of the screen shown in Figure 7, click General.
-
In the right side panel, in the Refresh Your PC Without Affecting Your Files section, click Get Started.
The dialog box shown in Figure 8 appears, explaining what Refresh Your PC is and what it does.
-
Click Next to refresh the PC.
There is always truth in the old system
administrator’s adage that the best and quickest way to repair any
problem with Windows is to re-image the computer. This can take time,
though, and will certainly require the support technician to be present.
The new tools in Windows 8 and the addition of Startup Repair, which
you might not have seen before if you are upgrading from Windows XP, are
extremely useful, extremely simple and easy to use, and usually
extremely quick, as well.
Armed with this knowledge you not only can repair problems more
quickly and simply than ever before, but it’s a simple matter to train
users, friends, and family to perform these actions themselves, without
even needing to contact you.
And what enthusiast, IT professional, or system administrator doesn’t want that?