Recall from Chapter 15 that your company has just acquired a small architectural firm. You have patched and updated all of the firm’s machines, but those pesky users are still managing to find ways to render their PCs unusable. As a technician, you need to use Event Viewer to log what they do to their computers. A few of the computers have contracted malware, making the computers nonbootable. Let’s take some time in this chapter to discover and use some of the available Windows troubleshooting tools.