312-253-4321    Get SUPPORT

Alchetec Blog

Tech Term: Safe Mode

Tech Term: Safe Mode

Sometimes it can be hard to diagnose a problem with your PC. While it might not be something system-breaking, it’s still important to find the root of an issue before it becomes a major problem. One of the best ways to diagnose an issue with your computer is by logging in using Safe Mode. We’ll talk about when and how you can use Safe Mode to your computer’s benefit.

What Does Safe Mode Do?
In its most basic form, Safe Mode lets you boot up your PC in a limited fashion. Only critical drivers and files will be activated, allowing for only a barebones boot that can help you isolate and diagnose issues with your computer. For example, the issue becomes apparent outside of Safe Mode, but it doesn’t happen during Safe Mode. This means that it’s likely not a critical driver and is something additional that you’ve installed.

There are two different ways to access Safe Mode. The first is the one that we just outlined. The other is one that includes other network drivers and devices, which depending on the situation might not be what your goal is.

Follow the below instructions to implement Safe Mode on startup.

From the Start Menu...

  • Select the Start button in the bottom-left corner of the screen.
  • Select Settings (the gear icon)
  • Click on Update & Security
  • Go to Recover in the left-hand column
  • Go to Advanced Startup and select Restart Now
  • When the device restarts, select Troubleshoot > Advanced Options > Startup > Settings > Restart
  • Upon startup, hit F4 or the number 4 for Safe Mode. Hit F5 or the number 5 for Safe Mode with Networking

From the Sign-in Screen…

  • Restart your PC. Hold down the Shift key while you’re selecting Restart.
  • When the device restarts, select Troubleshoot > Advanced Options > Startup > Settings > Restart
  • Upon startup, hit F4 or the number 4 for Safe Mode. Hit F5 or the number 5 for Safe Mode with Networking

For more great tech tips and tricks, subscribe to our blog.

Do You Know All the Things an MSP Can Do?
Which Management Software Is Right for Your Busine...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, August 22 2018

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy IT Services Malware Business Computing Managed IT Services Email Network Security Software Productivity Hackers Outsourced IT Data Backup Internet Ransomware Hosted Solutions Microsoft Data Backup IT Support Tech Term Mobile Devices Computer Data Recovery Business Continuity Innovation Business Cloud Computing Hardware Small Business Productivity Data Management IT Support Google Smartphone Android User Tips Internet of Things Communication Managed IT Remote Monitoring Paperless Office Disaster Recovery Windows 10 VoIP Managed Service Provider BYOD Cybersecurity Browser Office 365 Business Management Smartphones Artificial Intelligence Social Media Efficiency Applications Passwords Facebook Encryption Mobile Device Phishing Holiday Saving Money Server Risk Management Save Money Government Document Management Wi-Fi Infrastructure SaaS Tip of the week Telephone Systems Unified Threat Management Managed IT Services Compliance Recovery Network Going Green Vendor Management Vulnerability Money Regulations IT Management Word Data Storage Project Management Collaboration Router Chrome Workplace Tips Virtual Reality IT Service Windows Windows 10 Work/Life Balance Two-factor Authentication Hosted Solution Data Security Firewall Robot Training Storage Data loss Managed Service Gmail Employer-Employee Relationship Bandwidth App File Sharing Password BDR Virtualization Antivirus Redundancy Website Help Desk Miscellaneous Network Management Maintenance Scam Upgrade Chromebook Analytics Twitter Unified Communications Server Management Politics Wireless Flexibility Health VPN Mobile Device Management Quick Tips Smart Technology Remote Computing Bring Your Own Device HIPAA Virtual Private Network Digital Payment Outlook Office Upgrades Business Technology Internet Exlporer Computers Identity Theft Blockchain IoT Licensing Apps Tablet Computing Assessment Alert Mobile Security The Internet of Things Automation Microsoft Office How To Customer Relationship Management Patch Management How To Samsung Big Data Uninterrupted Power Supply Monitors Files Mobility Black Market Fraud Utility Computing Servers User Error Migration Development GPS YouTube MSP Dark Web Screen Reader Google Maps Proactive IT Computer Repair Crowdsourcing Operations Managing Stress Customer Service Search Mouse Supercomputer OneNote Notifications Language eWaste Travel Hacking Google Calendar Botnet Cyber Monday Mobile Computing Physical Security Healthcare Content Filtering History Network Congestion Printer Sports Chatbots Cables Tracking Settings Proactive Communications Data Warehousing Smart Tech Humor Touchscreen IT Consulting Wearable Technology Enterprise Content Management Spam Corporate Profile Comparison Business Growth IT Budget Employee-Employer Relationship Cortana Networking Social Computing Infrastructure Management Solid State Drive End of Support Trending Legislation Machine Learning Printing Net Neutrality Cost Management G Suite Cabling Education Websites Access Control Telephony Identity Digital Remote Monitoring and Management Automobile Microsoft Excel Connectivity Office Tips Data Breach Electronic Medical Records Vulnerabilities Computer Care WannaCry Wires Specifications Remote Workers Google Drive Alerts Enterprise Resource Planning Taxes Hard Disk Drive Emoji Distributed Denial of Service Modem Firefox IT Solutions Processors Hard Drive Augmented Reality Statistics SharePoint Spyware WPA3 USB Wireless Technology Technology Laws Legal Law Enforcement IT Technicians Geography Tech Support Mail Merge Safety Information Unsupported Software Avoiding Downtime Techology Personal Information Cooperation Mobile IBM Shortcut Software as a Service Managed IT Service Cookies Fleet Tracking 3D Printing Lenovo Cache Disaster Display Bluetooth Downloads Update Social Networking Hacker Address Permissions Star Wars Software Tips Dark Data Heating/Cooling Unified Threat Management Gadget Mirgation High-Speed Internet Gadgets WiFi VoIP Nanotechnology Apple Monitoring Mobile Data Time Management Disaster Resistance Virus Staff Company Culture Social Engineering Technology Tips Break Fix Asset Tracking Consultation Superfish Hotspot Recycling Multi-Factor Security Black Friday Motherboard Users Hard Drives Information Technology Public Cloud Mobile Office Domains Cleaning Hacks Motion Sickness Emergency Public Speaking Downtime Presentation Lithium-ion battery Relocation Hiring/Firing Sync 5G Staffing IT Consultant Fun Private Cloud Marketing CrashOverride Mobile Device Managment Budget Regulation Administrator Competition Error Cybercrime IP Address