Given a Scenario, Troubleshoot Common Personal Computer (PC) Security Issues: A Real-World Guide for CompTIA A+ Core 2 (220-1102)

Introduction: The High Stakes of PC Security Troubleshooting
Every IT pro knows the sinking feeling when an urgent ticket lands: “My computer’s acting weird, and I’m getting pop-ups about a breach!” Honestly, it doesn’t matter if you’re wrangling PCs at a doctor’s office, a hectic law firm, a school packed with students, or bouncing between clients for a managed services gig—when a security issue hits, it can flip your whole day on its head. We're talking about the difference between going home on time or staying late, and sometimes, whether your company keeps its good name (or even stays on the right side of the law).
Figuring out PC security isn’t just about zapping viruses or hitting the password reset button—trust me, there’s way more to it. At the end of the day, it’s about locking down private data, keeping users safe (sometimes from their own habits—no judgment, it happens to us all), and making sure you’re not up at night worrying about your company ending up in the news or getting slapped with a fine. I can’t tell you how many times I’ve watched one measly ransomware popup grind a business to a halt for days. And don’t even get me started on those innocent little mistakes—just one wrong click and suddenly the whole network is in meltdown mode. But here’s the good news: if you work with a solid process, know your go-to tools, and get your hands dirty in the right way, you’ll not only crush the CompTIA A+ Core 2 (220-1102) exam—you’ll be the person the team runs to when it hits the fan.
Think of this guide as your all-access pass for getting to grips with, sorting out, and actually fixing the PC security headaches you’ll run into—whether you’re prepping for the A+ exam or just dodging tickets in the real world. We're about to get right into the thick of it—I'll walk you through the biggest threats I bump into all the time, share the troubleshooting moves I've seen work in the real world, help you get your hands dirty with some practical labs, and toss in those little nuggets of advice that'll have you feeling extra confident when exam day rolls around. So honestly, whether you’re grinding toward that A+ or just want to be the help desk hero who actually fixes stuff, you’ll walk away with tips you can put to work right away—like, literally tomorrow when you get your next support ticket.
Understanding and Identifying Common PC Security Issues
Security tickets almost always start with symptoms, not diagnoses. Let’s be honest, nobody’s user is ever going to say, “Hey, I’m pretty sure someone’s exploiting SMBv1 for privilege escalation on my machine.” More likely, they’ll just mutter something about bizarre pop-ups, their computer running slower than a snail in molasses, or complain that they suddenly can’t open stuff they always could before. If you want to actually get good at this stuff, you kinda have to slip into detective mode and dig out what’s really behind all those weird symptoms. Let me break down the big security headaches you’re likely to see—what they look like in real life, what’s really going wrong under the hood, and a few ways I sniff them out.
- Malware (think of it as digital troublemakers out to ruin your day):
- Viruses: Malicious code attaching to files, spreading via user action. How do you spot one? You’ll see things like your system getting sluggish, files acting weird or going bad, or your antivirus suddenly throwing a fit.
- Worms: Self-propagating malware exploiting network vulnerabilities. Typical signs? Next thing you know, the whole network just slows to a crawl. Everyone starts grumbling because their stuff won’t load, and when you open up Task Manager, there’s this oddball process showing up over and over—honestly, it’s like that one guest who refuses to leave at the end of the night. At that point, honestly, you just want to throw your hands up and mutter, “Not this nonsense again…”
- Ransomware: Encrypts files, demands payment for decryption. Trust me, when ransomware shows up, it’s not subtle. You’ll know right away—no ‘maybe it’s nothing’ here. Out of nowhere, all your files pick up these weird, gibberish-looking extensions, every single folder sprouts a ransom note screaming for money, and you can forget about opening anything—nothing works anymore. Total chaos. It’s kind of like you come back to your desk, and all your stuff’s locked up tight, with a big ugly note demanding a ransom. Your files are basically being held hostage until you pay up.
- Spyware: Secretly monitors user activity, often stealing credentials or personal info. Ever notice your internet being weirdly slow, or all of a sudden you’ve got toolbars or shortcuts popping up that you don’t remember installing? Maybe your desktop starts looking haunted. Nine times out of ten, that’s spyware sneaking around.
- Adware: Displays unwanted ads, often bundled with free software. So if windows are popping up left and right, or your web browser keeps dragging you to sketchy sites even though you’re just trying to check email, that’s a dead giveaway. Honestly, it feels like your PC’s got a mind of its own.
- Rootkits: Hide deep within the OS to avoid detection, sometimes gaining kernel-level access. Symptoms: AV disabled, system files hidden or locked, suspicious kernel drivers.Detection: Frequent pop-ups, sluggishness, disabled or outdated security software, unknown programs or processes.
- Unauthorized access? That’s just someone getting into parts of the system—or data—they’re absolutely not supposed to see. That’s just IT-speak for someone poking their nose into files and folders where they have no business being. Maybe somebody has swiped a user’s login info, accounts keep getting locked for no obvious reason, or users somehow wind up with admin rights that should absolutely not be in their hands—none of which is ever a good sign. Signs: Account lockout events (see Event ID 4740), failed logons (4625), privilege changes (4732), or users accessing resources they shouldn’t.
- Security Software Failures:You’ll sometimes spot the antivirus not updating, Microsoft Defender Antivirus (yeah, that’s what they call Windows Defender these days) mysteriously shut off, or your firewall not running when it should be. Sometimes it’s malware causing the mischief, sometimes a user stopped something accidentally, or maybe updates just didn’t go through. Signs: Alerts in Windows Security, services failing to start, multiple AV products conflicting.
- Permissions and Access Control Issues:“Access denied” errors when opening files/folders, usually due to NTFS or share permission misconfigurations. Signs: User is missing from Security tab, group membership errors, failed access in Event Viewer (Event ID 4663).
- Suspicious Behavior (the stuff that just feels off):Think pop-up overload, your homepage changing out of the blue, your PC crawling, or mysterious processes showing up in Task Manager. Signs: Browser homepage changed, fake AV alerts, resource spikes, or new startup items.
- Network Security Misconfigurations:Other times, it’s all about shaky network setups—like, someone left the Wi-Fi wide open, shared a folder with 'Everyone,' let data fly around the network without any encryption, or still has those ancient protocols like SMBv1 switched on. Signs: Unauthorized devices on the LAN, users able to access sensitive shares, or scan results showing open ports/services.
- Physical Security Breaches:Tailgating, unlocked workstations, misplaced devices. Signs: Activity from unauthorized users, missing equipment, or logs of badge access anomalies.
Exam Tip: On the A+ exam, symptoms are often “user language.” Practice mapping everyday complaints to potential security causes.
Structured Troubleshooting Methodology: A Four-Step Field Approach
The best techs work methodically, not reactively. My proven formula—Identify, Analyze, Resolve, Prevent—dovetails with incident response frameworks like NIST and is essential for the A+ exam and the real world.
- Identify: Gather facts. What, when, who, and how? Get specifics (error messages, screenshots, log times).
- Analyze: Correlate symptoms with logs, recent changes, running processes, and system/network state. Alright, real talk—before you start running after every single odd complaint, pause for a sec. Ask yourself: is this just one person having a bad tech day, or is there something bigger at play that could be hitting a bunch of folks?
- Resolve: Contain the issue (disconnect, disable, isolate), remediate (clean, restore, reconfigure), and validate (test fix).
- Prevent: Patch, educate, audit, document, and harden to reduce recurrence. Update procedures if needed.
Incident escalation: For serious breaches (e.g., ransomware, data loss, suspected internal threat), always follow your organization’s incident response policy. Oh, and honestly? Here’s one of the biggest things folks miss: Jot down every single move you make, keep a tight hold on any evidence (sometimes you need to grab a full disk image before you even think about fixing anything), and let your supervisor or compliance folks know ASAP. No exceptions.
Here’s a quick troubleshooting roadmap I use to keep my head straight when things get hairy:
Symptom | Diagnostic Step | First Tool | Escalation? |
Pop-ups, slow performance | Check Task Manager, scan with AV | Microsoft Defender Antivirus, Malwarebytes | If AV can't remove, escalate |
Account lockout | Check Event Viewer, AD logs | eventvwr.msc, net user | If repeated, escalate to IT/security |
Access denied error | Check permissions, ownership | icacls, File Explorer | If sensitive data or suspected breach, escalate |
Unknown network activity | Analyze open connections, ARP table, AV scan | netstat -ano, Resource Monitor | If data exfiltration suspected, escalate |
Essential Tools and Configuration for PC Security Troubleshooting
You don’t need a massive security budget to do world-class troubleshooting. You really don’t need a massive budget or a fancy toolkit—just a solid combo of built-in Windows tools and a couple tried-and-true third-party apps, and you’ll be able to tackle pretty much any PC security mess that comes your way.
- Task Manager: Identify resource hogs, unknown processes, and startup items. Spot a sketchy process in Task Manager? Right-click it and hit “Open file location”—you’ll usually get a big clue about whether it’s legit or trouble.
- Event Viewer (eventvwr.msc): Analyze logs for system, security, application events. Useful Security Event IDs:
- 4624 – Successful logon
- 4625 – Failed logon
- 4740 – Account locked out
- 4720 – New user created
- 4726 – User deleted
- 4663 – Object access attempt
- Microsoft Defender Antivirus: (formerly Windows Defender) Default AV in Windows 10/11. You can fire off a quick scan, run a deep full scan, or do an offline scan—which to be honest, is my secret weapon when I think some stubborn malware is really digging in its heels and hiding out. Pro tip—don’t forget to check Protection History and make sure real-time protection’s actually running. You wouldn’t believe how many times I’ve found malware—or that one 'helpful' user—quietly switching off Defender in the background. It happens more than you’d think. Just a heads-up—when you run that offline scan, your PC’s going to reboot. So make sure you’re good to shut things down before you kick it off. Break out that offline scan any time you get the feeling something’s buried itself deep inside Windows, or if Defender just isn’t acting right.
- Malwarebytes: Excellent for catching PUPs/spyware missed by Defender. Note: The free version is for personal use only; businesses must use the paid version.
- MSCONFIG & Autoruns (Sysinternals): Manage startup items and services. Autoruns offers deeper insight into auto-starting code.
- Let’s be real, Command Prompt and PowerShell are like those Swiss Army knives in your toolbox—whenever I need to check for network oddities, look up user accounts, trace traffic, or double-check who has access to a folder, these are my go-tos.
netstat -ano
: List network connections and listening ports (cross-check PID with Task Manager for process name)ipconfig /all
: Check network configuration, DNS/DHCP settingsnet user [username]
: View account status and propertiesicacls [file/folder]
: View/set NTFS permissionstakeown /f [file/folder]
: Take ownership of files/folderssfc /scannow
andchkdsk
: System integrity checks- Backup/Restore Tools: File History, System Restore (be aware it can be disabled by Group Policy or malware; not a backup substitute), and full disk image solutions. Always test restores regularly.
- Browser Reset/Cleanup: Modern browsers (Edge, Chrome, Firefox) feature built-in reset options—vital after a browser hijack.
- Security Baseline Tools: Microsoft's official security compliance toolkit and baseline security analyzer provide auditing and best practice enforcement for Windows environments.
- Third-Party AV Uninstallers: Use vendor-specific removal tools to clean up failed/uninstalled AV products, reducing conflicts.
Note: Only one real-time antivirus should be enabled at a time to prevent conflicts and performance issues.
Let’s walk through how to get your key security tools set up, step by step, just like I do it in the real world:
- Here’s my little setup ritual for making sure Microsoft Defender Antivirus is all dialed in the way I like it:
- Open Windows Security → Virus & threat protection.
- Click Manage settings under "Virus & threat protection settings".
- Ensure Real-time protection, Cloud-delivered protection, and Automatic sample submission are ON.
- To run an Offline scan: Click Scan options → Select Microsoft Defender Offline scan → Scan now. (Heads up—it’ll reboot the PC for this. Sometimes malware blocks this option, so if you can’t click it, you may have a bigger battle.)
- Want to kick on BitLocker? Just a heads up—BitLocker and some of these other security goodies only work on Pro, Enterprise, or Education editions of Windows. If you’re on Windows Home, heads up—you’ll have to find another option since this one’s not available there.
- Open Control Panel → BitLocker Drive Encryption.
- Select the OS drive → Turn on BitLocker.
- Just walk through the steps—it’s mostly clicking 'Next' a bunch—but whatever you do, don’t forget to save that recovery key somewhere safe. Seriously, make sure you print out that recovery key, stash it on a USB drive, or—if you’re on a business network—drop it into Active Directory. Seriously, don’t lose that recovery key—it’s a nightmare if you ever need it and can’t find it. Trust me on this—you’ll want that recovery key saved somewhere safe. The last thing you want is to lock yourself out and realize you’ve got no way to get back in.
- Note: BitLocker requires TPM or a USB key for pre-boot authentication. Not available on Home edition.
- Whenever I want to double-check that Windows Firewall isn’t letting anything sneak through, here’s how I button things up:
- Go to Control Panel → Windows Defender Firewall → Advanced settings.
- To block an app: Outbound Rules → New Rule → Program → Browse to .exe → Block connection → Name rule.
- To view status: Run
netsh advfirewall show allprofiles
in Command Prompt.
- Setting NTFS permissions is basically about making sure only the right folks have the keys to the castle—nobody extra.
- Right-click file/folder → Properties → Security tab.
- From there, you can add or take away users and groups, plus adjust what they can do—like switch them to ‘Full control’ or just ‘Modify’ depending on what they actually need.
- To check effective permissions: Use
icacls "C:\SensitiveFolder"
.
- Using Group Policy (Pro/Enterprise only):
- Run
gpedit.msc
. - Navigate to Computer Configuration → Windows Settings → Security Settings.
- Here’s where you get to play with all kinds of settings—lock in password policies, choose what gets logged, even control who can plug in USB drives and who can’t.
- Let’s chat about User Account Control for a sec—you know, that pop-up with the little shield that shows up whenever you or someone else tries to do something that needs admin approval. It’s there to keep things in check!
- Open Control Panel → User Accounts → Change User Account Control settings.
- Honestly, I usually recommend folks leave it set to 'Notify me only when apps try to make changes'—but if you want a little extra protection or you’ve got some high-risk users, feel free to crank it up a notch.
- Setting up Multi-Factor Authentication (MFA):
- For a regular Microsoft account, log in online and look for the '2-step verification' option in your security settings. Flip that switch and follow the prompts.
- Working somewhere with Azure AD or Office 365? Admins can force MFA for everyone from the Azure AD portal. Tip: Third-party solutions can provide MFA for local Windows logons as well.
Alright, now let’s take all that and walk through the sorts of troubleshooting cases you’ll really see—both at work and on the A+ exam.
Time to talk through the kind of scenarios you’ll actually get on the A+ exam and see every day in IT—let’s make this practical. For each situation, I’ll break down the main symptoms, what you should actually dig into, and exactly how to fix it—no fluffy stuff, just the steps that actually get results.
Let’s start with the classic: you hit a system that’s loaded down with pop-ups, malware, or a browser that’s acting like it’s been possessed.
Symptoms: Slow PC, constant pop-ups, browser redirects, missing/encrypted files, AV disabled, unknown processes or extensions.
Diagnostics:
- First thing’s first—get that computer off the network! Yank the Ethernet, switch off Wi-Fi, whatever it takes. And be careful with Safe Mode with Networking; some really stubborn malware can ride that connection, too.
- Now, crack open Task Manager and scan for anything fishy—random file names, stuff hogging CPU, or programs running from oddball folders.
- Hop into Microsoft Defender Antivirus to make sure real-time protection is actually switched on (I can’t tell you how often it gets turned off), and take a peek at Protection History to see if anything sketchy’s been caught already.
- Boot into Safe Mode (for Windows 10/11: Shift+Restart → Troubleshoot → Advanced → Startup Settings → Safe Mode; for older Windows: msconfig → Boot tab → Safe boot).
- Kick off a full scan with Defender, and if something still smells funny, go ahead and run the Microsoft Defender Offline scan—but heads up, your system’s going to reboot for that.
- Scan with Malwarebytes (on personal machines or business-licensed version only).
- Review Event Viewer (Security log) for failed logons, new user creation, or privilege changes.
- Check browser extensions and reset settings if hijacked.
Remediation:
- Quarantine/remove malware per AV instructions.
- Don’t forget to go hunting for any leftover junk—especially in %TEMP% or AppData—sometimes malware likes to leave souvenirs.
- If the browser got hijacked, reset it and kick out any extensions you don’t recognize.
- Restore files from backup or File History if needed.
- Re-enable and update all security software.
- After you’re sure everything’s clean, and only then, reconnect that PC to the network.
Prevention: Keep AV updated, use standard (non-admin) accounts, enable SmartScreen/browser phishing filters, and train users on safe downloading.
Scenario two: The user can’t log in, their account keeps locking, or they’re suddenly locked out entirely. Sometimes it’s an honest mistake, sometimes it’s something sneakier.
Symptoms: “Can’t log in,” “Account locked,” or “Password expired.” Sometimes repeated lockouts.
Diagnostics:
- Review password policy and recent changes.
- Time to dive into Event Viewer—look for event 4740 (lockouts), 4625 (failed logons), or 4624 (successful logons). They’ll tell you the story.
- For domain users, check Active Directory Users and Computers (ADUC) or
net user [username]
. - Don’t forget those pesky cached credentials. Check Windows Credential Manager, old mapped drives, Outlook or email profiles, even phones that might still be trying to sign in with the old password.
Remediation:
- Unlock the account or reset password in AD or Local Users & Groups.
- Force logoff from all sessions (use
logoff
command or AD tools). - Update stored credentials everywhere (Credential Manager, mail clients, mapped drives, mobile devices).
- And if the lockouts keep happening, start thinking about the ugly stuff—could be brute force attacks or malware in the mix.
Prevention: Enforce strong password and lockout policies, enable MFA where possible, and educate users about password hygiene.
Scenario three: The dreaded “Access Denied” pop-up. Maybe files have vanished or people can’t save their work—it’s almost always a permissions snafu.
Symptoms: “Access Denied” errors on files/folders, missing files, or inability to save.
Diagnostics:
- Right-click folder → Properties → Security tab to review permissions.
- Use
icacls "C:\Folder"
to check effective permissions and inheritance. - Check ownership via Properties → Security → Advanced → Owner.
- You’ll want to check Event Viewer for 4663 events too—those record failed access attempts, which can be a goldmine for tracking down what’s really going on.
Remediation:
- Modify permissions so the correct user/group has access (preferably using security groups, not individual user entries).
- Re-take ownership as needed (
takeown /f "C:\Folder"
). - Be aware: Effective permissions are the most restrictive of NTFS and share settings.
Prevention: Use groups for permissions, regularly audit shared resources, and document permission changes.
Scenario 4: Security Software or Firewall Not Running
Symptoms: Microsoft Defender Antivirus or firewall reports disabled, unable to update, or errors starting services.
Diagnostics:
- Check Windows Security dashboard → Virus & threat protection.
- Open
services.msc
, verify “Microsoft Defender Antivirus Service” and “Windows Defender Firewall” are running. - Review Event Viewer for service errors.
- Check for multiple AVs (uninstall using vendor tools if needed).
Remediation:
- Restart services, reset settings, or repair/reinstall AV/firewall.
- If malware blocks repairs, run Defender Offline or use a bootable AV rescue disk.
- Ensure only one real-time AV is enabled.
Prevention: Schedule regular definition updates and scans; don’t use expired trial AVs; prefer Microsoft Defender Antivirus if no current subscription exists.
Scenario 5: Suspicious Network Activity or Rogue Devices
Symptoms: Sluggish internet, high bandwidth use, unknown devices on network, or alerts for data exfiltration.
Diagnostics:
- Run
netstat -ano
to view open connections; match PIDs with Task Manager processes. - Check Resource Monitor, Network tab for bandwidth usage.
- Review router or ARP tables for unauthorized devices.
- Run
ipconfig /all
for DHCP/DNS anomalies. - Analyze firewall logs for unexpected inbound/outbound connections.
Remediation:
- Kill suspicious processes; block unwanted IPs at firewall.
- Scan for malware/rootkits.
- Change Wi-Fi passwords, enable WPA2/3, disable WPS, segment networks with VLANs (separate guest from main network).
- Disable or reconfigure open shares (use “Authenticated Users” instead of “Everyone”).
Prevention: Use strong router passwords, enable network segmentation, and regularly audit connected devices and firewall rules.
Scenario 6: MFA, Phishing, and Modern Authentication Issues
Symptoms: Users locked out due to failed MFA, reporting phishing emails, or unable to use biometric logins.
Diagnostics:
- Check MFA device enrollment, time sync, and backup codes for accounts (especially cloud-based accounts).
- Identify phishing attacks via user reports: look for suspicious links, urgent requests, or fake login pages.
- If using Windows Hello, verify device compatibility and account settings.
Remediation:
- Reset MFA (admin action may be required), provide recovery codes, or re-enroll devices.
- For phishing: Instruct users not to click or reply, reset passwords if credentials entered, scan for malware, and report incident per policy.
- Reconfigure/retrain for Windows Hello or biometric login failures.
Prevention: Train users using phishing simulation tools, enable MFA on all compatible accounts, and keep authentication settings up to date.
Configuring and Verifying Security Settings: Security Baseline Checklist
Securing PCs isn’t a one-off task. Use this baseline checklist for new deployments and regular audits.
- Antivirus/Antimalware: Microsoft Defender Antivirus enabled, updated, and running scheduled scans. (For business: consider central management via Intune or Group Policy.)
- Firewall: Windows Defender Firewall enabled for all profiles. Only required apps/ports allowed through. Regularly review rules and audit logs.
- UAC (User Account Control): Set to default or higher. Don’t disable except for rare troubleshooting (re-enable immediately after).
- NTFS/Share Permissions: Securely configured, using security groups, and never “Everyone” for sensitive data. Regular audits via
icacls
and SMB share settings. - Group Policy (GPO): Enforce password, lockout, audit, and removable media policies. Only on Pro/Enterprise editions.
- Encryption: Enable BitLocker (Pro/Enterprise/Education), store recovery keys securely; consider third-party tools for Home edition or portable drives. EFS available on Pro/Enterprise—not Home.
- Patch Management: Automatic Windows Updates ON, third-party tools patched, and WSUS or RMM for businesses.
- Physical Security: BIOS/UEFI password, Secure Boot enabled, lock screens auto-activate, cable locks for laptops, and secure device disposal procedures.
- Modern Authentication: Windows Hello (facial/fingerprint) enabled where hardware supports; MFA enabled on all cloud accounts.
- Remote Desktop Security: RDP disabled if not needed, Network Level Authentication (NLA) enforced, and access limited to VPN or trusted IPs.
- Network Segmentation: Use VLANs to separate guest, IoT, and sensitive business devices.
- Backup: Scheduled, automated, and tested restores; offsite or cloud replication preferred.
Security Baseline Implementation Table:
Setting | Location | Notes |
---|---|---|
Antivirus | Windows Security → Virus & threat protection | Check scheduled scans and updates |
Firewall | Control Panel → Windows Defender Firewall | Advanced settings for custom rules |
BitLocker | Control Panel → BitLocker | Requires Pro/Enterprise; store keys securely |
UAC | Control Panel → User Accounts | Set to default or higher |
Group Policy | gpedit.msc | Not on Home, use Local Security Policy instead |
Updates | Settings → Update & Security | Verify last update successful |
Advanced Troubleshooting and Diagnostics
When standard steps aren’t enough, deeper diagnostics may be required:
- Rootkit Detection: Use bootable AV tools to scan outside the OS. Always image drives before cleaning if legal/evidence is needed.
- AV Conflicts: If you suspect multiple AVs are interfering, fully uninstall all but one using vendor removal tools. Symptoms: slowdowns, failed updates, or real-time protection errors.
- Account Lockouts: Use
eventvwr.msc
with filters for lockout (4740) and failed logon (4625) events. Correlate timestamps with user activity and check all devices using the affected credentials. - Network Analysis: For advanced cases, use Wireshark to capture suspicious traffic, or
netstat -ano
in combination withtasklist /fi "PID eq [number]"
to identify offending processes. - SIEM Integration: In larger environments, connect endpoint logs to a Security Information and Event Management (SIEM) platform for correlation and alerting.
Special Topics and Practical Labs
Lab 1: Diagnosing and Cleaning a Malware Infection (with EICAR Test File)
- Objective: Practice malware detection and removal.
- Tools: Microsoft Defender Antivirus, Malwarebytes (personal or business-licensed only), Event Viewer
- Steps:
- WARNING: Download the EICAR test file on a test/isolated system only (never production; AV may auto-delete). The EICAR test file is a harmless file designed to trigger antivirus alerts for testing purposes.
- Observe Defender’s response—check Protection History for the threat event.
- Verify process is terminated; run full AV and Malwarebytes scan to confirm clean.
- Check Event Viewer for related security events (e.g., 1116: Malware detected, 1117: Malware action taken).
- Document all actions and outcomes in an incident report template.
- Expected Outcome: Threat is contained and quarantined; user receives prevention advice.
Lab 2: Auditing and Correcting Folder Permissions
- Objective: Identify and fix NTFS/share permission issues.
- Steps:
- Create a folder, deny access to a test user/group.
- Attempt access; confirm “Access Denied.”
- As admin, use Properties → Security → Advanced to take ownership and edit permissions.
- Use
icacls
to confirm ACLs updated correctly. - Test user access and document change rationale.
Lab 3: Restoring from Backup After a Ransomware Event
- Objective: Restore files using File History or cloud backup.
- Steps:
- Simulate encrypted files (rename or restrict permissions).
- Open File History → Restore previous version, or use your backup solution’s restore dialog.
- Validate file integrity and note any failed restores.
- Document the process for compliance records.
Lab Safety Reminder
Never test malware (including EICAR) on production systems. Always use isolated VMs or non-networked test hardware. Understand the limits of test files and AV exceptions.
Security Event Log Analysis: Key Event IDs and Interpretation
Being able to interpret Windows Security Event Logs is vital for both troubleshooting and incident response. Here’s a quick reference:
Event ID | Description | Action |
---|---|---|
4624 | Successful logon | Check for unexpected logon types or sources |
4625 | Failed logon | Look for brute force/credential stuffing attempts |
4740 | Account locked out | Correlate to device or process causing lockouts |
4720 | User created | Investigate unauthorized account creation |
4726 | User deleted | Ensure only authorized deletions occur |
4663 | Object access attempt | Audit failed access to sensitive files/folders |
Integrating Security Tools and Procedures in the Real World
- Centralized Management: Use Intune, WSUS, or third-party RMM tools to enforce settings and push updates.
- SIEM Integration: Aggregate logs for automated alerting and incident correlation.
- Incident Response Documentation: Always follow your organization's process. Use a standard incident report template, document chain of custody if handling sensitive data, and report as required (especially for HIPAA, GDPR, etc.).
- Physical Security: Implement workstation locking (Win+L), cable locks, BIOS/UEFI passwords, device encryption, and secure device disposal (shredding, degaussing, certified destruction).
- Remote Work Security: Secure VPN, endpoint protection, limited RDP with NLA, and regular audits of remote access logs.
- User Training: Implement phishing simulations; use quizzes and “lunch-and-learn” sessions to keep users security-aware.
Best Practices for Preventing PC Security Issues
- Least Privilege Principle: Assign only the minimum rights needed. Standard (non-admin) accounts for users; local admin only when absolutely necessary—document all exceptions.
- Regular Patch Management: Automate OS and third-party updates. Use WSUS, Intune, or third-party tools for business; verify update logs regularly.
- User Training and Simulation: Schedule phishing simulations and hands-on security quizzes. Provide clear reporting channels for suspicious activity.
- Strong Authentication: Enforce password complexity, require MFA, and use modern authentication (Windows Hello, FIDO2 keys) where possible.
- Backups and Test Restores: Use a 3-2-1 backup strategy (3 copies, 2 types of media, 1 offsite). Schedule test restores quarterly to ensure backup integrity.
- Network Segmentation: Separate guest, IoT, and business networks with VLANs; restrict inter-VLAN communication as needed.
- Routine Audits: Quarterly audits of shares, permissions, local accounts, and security logs.
- Clear Documentation and Escalation Paths: Incident reports, change logs, and an escalation plan for security events are essential.
Case Studies: Lessons from the Field
- Ransomware at a Clinic: Ransom note appeared on every desktop. Isolated the affected machine, ran Defender Offline, and restored files from File History. Downtime was minimized because backups were tested. Lesson: Backups and calm, documented response are lifesavers.
- Account Lockouts from Ghost Devices: A user’s account kept locking because an old network printer was authenticating with a stale password. Traced the source via Event Viewer, unmapped the device, and updated credentials. Lesson: Cached credentials on forgotten devices can cause repeated headaches.
- Phishing Response at a Law Firm: Staff reported a suspicious email that mimicked the managing partner. The IT team confirmed it was phishing, reset passwords, scanned for malware, and held a follow-up lunch-and-learn. Lesson: User vigilance and structured response prevent escalation.
Comprehensive Troubleshooting and Incident Response Checklist
- Gather detailed user reports (symptoms, timing, recent changes)
- Review Event Viewer for relevant security events
- Analyze running processes and startup items
- Verify AV and firewall status; run updated scans
- Check network settings and monitor connections
- Audit permissions and ownership on affected files/folders
- Document every action and communication
- Educate user on prevention steps
- Escalate to senior IT or compliance as needed
Sample Incident Report Template:
Incident Title: [Brief description] Date/Time Detected: [YYYY-MM-DD HH:MM] User(s) Affected: System(s) Involved: Description of Symptoms: Diagnostic Steps Taken: Actions Performed: Outcome: Preventative Actions: Escalation/Reporting: [If applicable]
Exam Preparation Strategies and Resources
Aligning with CompTIA A+ 220-1102 Objectives
The A+ Core 2 exam tests real troubleshooting skills—not just “button pushing.” Here’s how to prepare:
- Practice Scenario-Based Questions: Focus on real-world workflows rather than memorization. Example: Q: A user reports constant pop-ups and browser redirects. What’s your first diagnostic step? A: Disconnect from the network and check Task Manager for suspicious processes.
- Hands-On Labs: Spin up VMs, intentionally “break” and fix systems. Practice everything in this article—especially malware removal, permission fixes, and log analysis.
- Know Your Tools and Flow: Be ready to select the best diagnostic and remediation tool for each scenario. Review all steps for configuring security settings.
- Review Modern Windows UI: Be familiar with Windows 10/11 settings, as screenshots may vary from older versions.
- Map Your Study: Compare your learning to official CompTIA A+ exam objectives, which outline all required knowledge areas and skills.
- Don’t Cram—Understand: The best techs learn why, not just what. Ask “what’s the risk?” and “what’s the fix?” for every scenario.
Exam-Style Practice Questions
- What Windows feature allows you to revert system files to a previous state? Answer: System Restore (note: not a substitute for full backup)
- Which Event ID indicates a failed logon? Answer: 4625
- How do you block a suspicious program via Windows Firewall? Answer: Create an outbound rule in Windows Defender Firewall Advanced Settings.
- What’s the first step when a user suspects a phishing email? Answer: Instruct them not to click; report to IT/security team.
- What’s the most restrictive combination for file access? Answer: The most restrictive of NTFS and share permissions applies.
Performance-Based Simulation Task Example
You’re shown a screenshot of NTFS and share permissions for a folder. The user can’t access the folder. Your task: Identify and change permissions so the user has “Modify” access via group membership only, not individual assignment.
Printable Quick Reference: PC Security Troubleshooting
- Check AV/firewall status and event logs first
- Disconnect from network if malware is suspected
- Audit permissions and ownership (icacls, takeown)
- Use only one real-time AV; fully uninstall others
- Document all actions in an incident report
- Escalate as needed for compliance or legal issues
Glossary of Key Terms
- NTFS: New Technology File System—Windows’ file/folder permissions system.
- SIEM: Security Information and Event Management—aggregates logs for security monitoring.
- MFA: Multi-Factor Authentication—requires two or more credentials for access.
- Rootkit: Malware that hides its presence by altering the OS.
- UAC: User Account Control—Windows feature that controls elevation prompts.
- Phishing: Social engineering attack using fake emails/sites to steal info.
- VLAN: Virtual LAN—segments a network to isolate devices/users.
FAQ: PC Security Troubleshooting for CompTIA A+ Candidates
- Q: Should I always use Safe Mode with Networking for malware removal?
A: Not always—some malware loads even in Safe Mode with Networking. For stubborn infections, use Safe Mode without networking or a bootable AV tool. - Q: What’s the difference between NTFS and share permissions?
A: Share permissions apply when accessing files over the network; NTFS applies at the file system level. The most restrictive permission wins. - Q: Can I use BitLocker on Windows Home?
A: No, BitLocker is only available on Windows 10/11 Pro, Enterprise, and Education. Use third-party encryption tools for Home. - Q: What should I do first if an endpoint is compromised?
A: Isolate the system (disconnect from network), document, and follow incident response procedures—don’t just start “cleaning.”
Conclusion: Process, Practice, and Professionalism
Mastering PC security troubleshooting is about process, not panic. Gather facts, use your tools, remediate methodically, and lock things down for the future. The real world is unpredictable, but with these strategies, you’ll be ready for both the CompTIA A+ exam and the trenches of IT support.
Remember: It’s not about knowing every answer off the top of your head—it’s about being methodical, resourceful, and always learning. Practice hands-on, review exam scenarios, and connect with fellow techs to share war stories and best practices. Each incident is both a challenge and a chance to get better.
Ready to take your troubleshooting skills to the next level? Keep this guide handy, document your work, and never stop learning. If you have your own stories, favorite tools, or exam tips, share them with the community—we all level up together!