Level 2 / Level 3 Service Desk Support

In-depth Technical Support Ensures Uptime and Productivity

Experienced and knowledgeable technicians assess issues and provide solutions for problems that cannot be handled through Level 1 support.

Level 2 Support generally handles configuration issues, troubleshooting, software installations, hardware repair (including in-house repair or coordinating depot services). Depending on the Help Desk organization, a Level 2 tech may either:

  • Be limited to only solving known issues and escalate new issues to level 3; or
  • Be authorized to research and implement fixes for new issues and only escalate to Level 3, if it is out of their skill set or ability to resolve.

Typical issues handled within Level 2 and Level 3 include:

  • Exchange Server problems
    • Mail not being received or delivered
    • Not receiving e-mail from a particular account / customer
  • VIRTUAL MACHINE – HyperV and VMWare server problems
    • Server not responsive
    • Server performance issue
    • Resource allocation problems
  • PHYSICAL SERVER
    • Security and O/S  patches
    • Network connectivity problems
    • Application not responsive
  • WAN/LAN
    • Remote connection issues
    • Establish SSL-VPN connection
    • Connectivity issues / outages
    • Wireless connection problems

Technical Experience and Certifications:

  • Microsoft Server Certified
  • CompTIA A+ certified
  • Dell Certified
  • SKILLS – Server / LAN-WAN /
  • Unitrends Certified
  • VMWare Certified
  • CCNA certified
  • Network + certified
  • CompTIA A+ certified
  • SKILLS – Server / LAN-WAN / PC
  • CCNA Certified
  • Skills – LAN-WAN / PC
  • Skills – Hardware repair / Printers / PC – laptop /IBM mid-range

Contact Me about Service Desk Support

Cybercrime As A Service (CaaS): What Every Business Owner Needs to Know 

If you’re an entrepreneur, you know how cybercrime can impact your business. Read to learn more about Cybercrime-as-a-Service.  Cybercrime- ...

Enforcing Cybersecurity in the Age of Credential Phishing

The shift from office work to remote or hybrid models has evolved and frequented cyberattacks, phishing in particular. The pandemic necessitated opera ...

Establishing Effective Company Cybersecurity Policies

Are you looking to improve your cybersecurity protocols and policies? Read our latest blog post for best practices on establishing effective company c ...