312-253-4321    Get SUPPORT

Alchetec Blog

Tech Term: Safe Mode

Tech Term: Safe Mode

Sometimes it can be hard to diagnose a problem with your PC. While it might not be something system-breaking, it’s still important to find the root of an issue before it becomes a major problem. One of the best ways to diagnose an issue with your computer is by logging in using Safe Mode. We’ll talk about when and how you can use Safe Mode to your computer’s benefit.

What Does Safe Mode Do?
In its most basic form, Safe Mode lets you boot up your PC in a limited fashion. Only critical drivers and files will be activated, allowing for only a barebones boot that can help you isolate and diagnose issues with your computer. For example, the issue becomes apparent outside of Safe Mode, but it doesn’t happen during Safe Mode. This means that it’s likely not a critical driver and is something additional that you’ve installed.

There are two different ways to access Safe Mode. The first is the one that we just outlined. The other is one that includes other network drivers and devices, which depending on the situation might not be what your goal is.

Follow the below instructions to implement Safe Mode on startup.

From the Start Menu...

  • Select the Start button in the bottom-left corner of the screen.
  • Select Settings (the gear icon)
  • Click on Update & Security
  • Go to Recover in the left-hand column
  • Go to Advanced Startup and select Restart Now
  • When the device restarts, select Troubleshoot > Advanced Options > Startup > Settings > Restart
  • Upon startup, hit F4 or the number 4 for Safe Mode. Hit F5 or the number 5 for Safe Mode with Networking

From the Sign-in Screen…

  • Restart your PC. Hold down the Shift key while you’re selecting Restart.
  • When the device restarts, select Troubleshoot > Advanced Options > Startup > Settings > Restart
  • Upon startup, hit F4 or the number 4 for Safe Mode. Hit F5 or the number 5 for Safe Mode with Networking

For more great tech tips and tricks, subscribe to our blog.

Do You Know All the Things an MSP Can Do?
Which Management Software Is Right for Your Busine...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, December 15 2018

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Business Computing Malware Privacy Hackers Network Security IT Services Email Software Outsourced IT Data Backup Data Productivity Managed IT Services Internet Hosted Solutions Productivity Tech Term Business Data Recovery Ransomware Microsoft Computer IT Support Innovation Backup Business Continuity Mobile Devices Cloud Computing Hardware Small Business IT Support Data Management User Tips Remote Monitoring Smartphone Google Android Communication Internet of Things Managed Service Provider Browser Managed IT Paperless Office VoIP Disaster Recovery Collaboration Efficiency Workplace Tips BYOD Encryption Cybersecurity Mobile Device Social Media Managed IT Services Smartphones Windows 10 Business Management Artificial Intelligence Government Passwords Windows 10 Applications Facebook Office 365 Phishing Server Wi-Fi Save Money Document Management Infrastructure SaaS Tip of the week Telephone Systems Unified Threat Management Bandwidth Saving Money Upgrade BDR Compliance Antivirus Recovery Healthcare Holiday Network Vulnerability IT Management Risk Management Project Management Virtual Reality Managed Service Chrome Blockchain Work/Life Balance IT Service Windows Information Hosted Solution Office Data Security Training Robot Customer Relationship Management Firewall Data loss Storage Gmail Website Employer-Employee Relationship File Sharing App Password Virtualization Files Wireless Help Desk Mobile Device Management Going Green Maintenance Vendor Management Money Router Word Regulations Data Storage Scam Two-factor Authentication Politics Health Flexibility VPN Communications Remote Workers Internet Exlporer Machine Learning Quick Tips Apps Remote Computing IoT Electronic Medical Records Bring Your Own Device Virtual Private Network The Internet of Things Mobile Security Outlook Microsoft Office Digital Payment Upgrades Identity Theft Computers Business Technology Big Data Licensing Computing Tablet Miscellaneous Assessment Alert Customer Service Automation How To Patch Management Uninterrupted Power Supply Mobility How To Monitors Samsung Unified Communications Redundancy Smart Technology Network Management Chromebook Remote Monitoring and Management Server Management HIPAA Analytics Twitter IT Consulting Alerts Enterprise Resource Planning Corporate Profile Humor Instant Messaging Comparison Business Growth Augmented Reality Distributed Denial of Service Modem Touchscreen Hard Drive Solid State Drive Cortana Trending Legislation Wireless Technology IT Budget End of Support WPA3 Operating System Networking Social Tech Support Printing E-Commerce Websites Access Control Telephony Safety IT Technicians Geography Digital Education Backup and Disaster Recovery IBM G Suite Cabling Data Breach Hacker Cooperation Mobile Computer Care WannaCry Office Tips Finance Specifications Automobile Managed IT Service Cookies Downtime Cache Taxes Hard Disk Drive Bookmarks Emoji Social Networking Fleet Tracking Tech Terms Google Drive Gadgets Features Statistics SharePoint Mirgation High-Speed Internet Spyware Human Error Firefox IT Solutions Processors Permissions Star Wars Technology Laws Legal Law Enforcement Staff Company Culture Authentication Mail Merge USB Break Fix Nanotechnology Monitoring Users Hotspot Recycling Unsupported Software Favorites Shortcut Software as a Service Black Friday Motherboard Asset Tracking Theft Avoiding Downtime Techology Personal Information Disaster 3D Printing Electronic Health Records Bluetooth Downloads Update Migration Development Display MSP Permission Lenovo Fraud Utility Computing Consulting Heating/Cooling Unified Threat Management Gadget Operations Managing Stress WiFi VoIP Dark Data Authorization Address Dark Web Screen Reader Software Tips Virus Language eWaste Mobile Data Conferencing Technology Tips Cyber Monday Mobile Computing Apple Social Engineering OneNote Financial Time Management Disaster Resistance Cyberattacks Multi-Factor Security Chatbots Cables Proactive Test Consultation Superfish Spam Managed Services Provider Servers User Error Wearable Technology Enterprise Content Management GPS YouTube Employees Black Market Data Warehousing Smart Tech Computer Repair Crowdsourcing Computing Infrastructure Management Meetings Mouse Google Maps Search Employee-Employer Relationship Proactive IT Net Neutrality Cost Management Travel Read Only Hacking Google Calendar Botnet Identity Supercomputer RMM Notifications Point of Sale Printer Sports Vulnerabilities Tracking Settings Network Congestion Wires Zero-Day Threat Physical Security Microsoft Excel Connectivity Content Filtering History Cleaning Motion Sickness Printers 5G Hacks Emergency Marketing Budget Relocation Hiring/Firing Competition Regulation IP Address Staffing Sync IT Consultant Private Cloud Fun CrashOverride Mobile Office Mobile Device Managment Error Domains Administrator Cybercrime Hard Drives Information Technology Public Cloud Public Speaking Procurement Presentation Lithium-ion battery