312-253-4321    Get SUPPORT

Alchetec Blog

Tech Term: Safe Mode

Tech Term: Safe Mode

Sometimes it can be hard to diagnose a problem with your PC. While it might not be something system-breaking, it’s still important to find the root of an issue before it becomes a major problem. One of the best ways to diagnose an issue with your computer is by logging in using Safe Mode. We’ll talk about when and how you can use Safe Mode to your computer’s benefit.

What Does Safe Mode Do?
In its most basic form, Safe Mode lets you boot up your PC in a limited fashion. Only critical drivers and files will be activated, allowing for only a barebones boot that can help you isolate and diagnose issues with your computer. For example, the issue becomes apparent outside of Safe Mode, but it doesn’t happen during Safe Mode. This means that it’s likely not a critical driver and is something additional that you’ve installed.

There are two different ways to access Safe Mode. The first is the one that we just outlined. The other is one that includes other network drivers and devices, which depending on the situation might not be what your goal is.

Follow the below instructions to implement Safe Mode on startup.

From the Start Menu...

  • Select the Start button in the bottom-left corner of the screen.
  • Select Settings (the gear icon)
  • Click on Update & Security
  • Go to Recover in the left-hand column
  • Go to Advanced Startup and select Restart Now
  • When the device restarts, select Troubleshoot > Advanced Options > Startup > Settings > Restart
  • Upon startup, hit F4 or the number 4 for Safe Mode. Hit F5 or the number 5 for Safe Mode with Networking

From the Sign-in Screen…

  • Restart your PC. Hold down the Shift key while you’re selecting Restart.
  • When the device restarts, select Troubleshoot > Advanced Options > Startup > Settings > Restart
  • Upon startup, hit F4 or the number 4 for Safe Mode. Hit F5 or the number 5 for Safe Mode with Networking

For more great tech tips and tricks, subscribe to our blog.

Do You Know All the Things an MSP Can Do?
Which Management Software Is Right for Your Busine...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, March 20 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Business Computing Malware Hackers Privacy IT Services Email Productivity Network Security Software Hosted Solutions Outsourced IT Data Backup Data Productivity Managed IT Services Internet Business Tech Term Data Recovery Ransomware Innovation Computer Cloud Computing Microsoft Backup IT Support Hardware Mobile Devices Small Business Business Continuity IT Support Google Android Efficiency User Tips VoIP Paperless Office Business Management Internet of Things Data Management Smartphone Remote Monitoring Collaboration Phishing Browser Disaster Recovery Workplace Tips Encryption Smartphones Cybersecurity Managed Service Provider Managed IT Services Managed IT Communication Windows 10 Server Artificial Intelligence Save Money Office 365 Upgrade Social Media Windows 10 BYOD Passwords Mobile Device Holiday Applications Compliance Communications Document Management Government Saving Money Facebook Wi-Fi Employer-Employee Relationship Risk Management Network Tip of the week Managed Service Microsoft Office Information Vendor Management Windows Healthcare Infrastructure Antivirus SaaS Vulnerability Unified Threat Management IT Management Scam Telephone Systems Project Management BDR Bandwidth Recovery Money Data Security Apps Business Technology Virtualization Going Green Politics Customer Relationship Management Data Storage Regulations Virtual Reality Website IT Service Work/Life Balance Firewall Data loss Tablet Training Router Wireless Bring Your Own Device Office Mobile Device Management Hosted Solution Robot File Sharing Automation Two-factor Authentication VPN Storage Quick Tips Blockchain Password Gmail Chrome Maintenance App Files Help Desk Word Remote Workers The Internet of Things Monitors Company Culture Chromebook Twitter Health Software as a Service Big Data Assessment Social Machine Learning Remote Computing Digital Payment Customer Service Unified Communications Identity Theft Electronic Medical Records Miscellaneous Patch Management Flexibility Licensing Management Printing Smart Technology Redundancy Network Management Net Neutrality HIPAA Outlook Computing Computers Alert Server Management Upgrades Analytics Internet Exlporer Mobility How To Employees Uninterrupted Power Supply IoT Samsung Access Control Remote Monitoring and Management Mobile Security How To Virtual Private Network Security Cameras IBM Google Drive Permissions Star Wars Tracking Settings Social Engineering Computer Repair Crowdsourcing Instant Messaging Safety Mirgation High-Speed Internet Content Filtering History Mobile Data Firefox Break Fix Nanotechnology Corporate Profile Notifications Hacker Statistics Staff SharePoint WPA3 Botnet Operating System Physical Security E-Commerce Virtual Assistant Gadgets Hotspot Technology Laws Recycling IT Budget Sports Backup and Disaster Recovery Black Friday Mail Merge Motherboard Solid State Drive Business Growth Remote Worker Avoiding Downtime Fraud Techology Utility Computing Digital Search Finance Shortcut Migration Development G Suite Cabling Dark Web Lenovo Screen Reader Computer Care WannaCry Bookmarks Bluetooth Operations Downloads Managing Stress Downtime Fleet Tracking Tech Terms Taxes Hard Disk Drive Network Congestion Features Wasting Time Users Heating/Cooling Language Unified Threat Management eWaste Telephony Human Error Cyber Monday Address Mobile Computing Monitoring Automobile ROI Time Management Disaster Resistance Spyware Authentication Chatbots Technology Tips Cables Humor Consultation Data Warehousing Superfish Smart Tech End of Support Favorites Wearable Technology Multi-Factor Security Enterprise Content Management Cortana Emoji Asset Tracking Theft Education IT Solutions Processors Electronic Health Records Database Servers Computing Infrastructure User Error MSP Permission USB Consulting Notes Spam Proactive IT Cost Management Legal Law Enforcement Authorization Identity Mouse Disaster Office Tips Microsoft Excel Connectivity WiFi VoIP Personal Information Conferencing Hacking Google Calendar Vulnerabilities Software Tips OneNote Private Cloud Financial Modem Cyberattacks Voice over Internet Protocol Alerts Printer Enterprise Resource Planning Apple Update Proactive Test Distributed Denial of Service Managed Services Provider PowerPoint Touchscreen IT Consulting Hard Drive Gadget Comparison Employee-Employer Relationship Procurement Networking GPS YouTube Virus Meetings Trending IT Technicians Legislation Geography Unsupported Software Managed IT Service Cookies Display Read Only Windows 7 Websites Cooperation Mobile Google Maps 3D Printing RMM Augmented Reality Dark Data Black Market Point of Sale Professional Services Tech Support Data Breach Cache Supercomputer Wires Zero-Day Threat Wireless Technology Social Networking Specifications Travel Public Cloud Cleaning Printers Marketing Budget Hard Drives Motion Sickness Competition Hacks IP Address Regulation Staffing Mobile Office Sync Relocation IT Consultant Domains CrashOverride Mobile Device Managment Administrator Hiring/Firing Public Speaking Presentation Cybercrime Error Fun Lithium-ion battery Emergency Information Technology 5G