301-571-5040    Get SUPPORT

Washington Works Blog

Tech Term: Safe Mode

Tech Term: Safe Mode

Sometimes it can be hard to diagnose a problem with your PC. While it might not be something system-breaking, it’s still important to find the root of an issue before it becomes a major problem. One of the best ways to diagnose an issue with your computer is by logging in using Safe Mode. We’ll talk about when and how you can use Safe Mode to your computer’s benefit.

What Does Safe Mode Do?
In its most basic form, Safe Mode lets you boot up your PC in a limited fashion. Only critical drivers and files will be activated, allowing for only a barebones boot that can help you isolate and diagnose issues with your computer. For example, the issue becomes apparent outside of Safe Mode, but it doesn’t happen during Safe Mode. This means that it’s likely not a critical driver and is something additional that you’ve installed.

There are two different ways to access Safe Mode. The first is the one that we just outlined. The other is one that includes other network drivers and devices, which depending on the situation might not be what your goal is.

Follow the below instructions to implement Safe Mode on startup.

From the Start Menu...

  • Select the Start button in the bottom-left corner of the screen.
  • Select Settings (the gear icon)
  • Click on Update & Security
  • Go to Recover in the left-hand column
  • Go to Advanced Startup and select Restart Now
  • When the device restarts, select Troubleshoot > Advanced Options > Startup > Settings > Restart
  • Upon startup, hit F4 or the number 4 for Safe Mode. Hit F5 or the number 5 for Safe Mode with Networking

From the Sign-in Screen…

  • Restart your PC. Hold down the Shift key while you’re selecting Restart.
  • When the device restarts, select Troubleshoot > Advanced Options > Startup > Settings > Restart
  • Upon startup, hit F4 or the number 4 for Safe Mode. Hit F5 or the number 5 for Safe Mode with Networking

For more great tech tips and tricks, subscribe to our blog.

Do You Know All the Things an MSP Can Do?
Which Management Software Is Right for Your Busine...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, January 18 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Business Computing Privacy Malware Hackers Productivity Network Security Business Email Software Tech Term Internet Hosted Solutions Mobile Devices Computer Data Data Backup Ransomware Managed IT Services Backup Microsoft Google IT Support User Tips Data Recovery Hardware Productivity Outsourced IT Efficiency Innovation IT Services Smartphone Small Business Cloud Computing Managed Service Provider Paperless Office Android Business Continuity Encryption Workplace Tips Business Management Social Media Collaboration Windows 10 Communication Remote Monitoring Windows 10 Browser Data Management Office 365 Save Money Managed IT Services Smartphones Government Holiday Server Disaster Recovery Bandwidth Healthcare VoIP Wi-Fi Artificial Intelligence BYOD Employer-Employee Relationship Passwords Unified Threat Management Phishing Work/Life Balance Facebook BDR Infrastructure Tip of the week Communications Internet of Things Scam Antivirus Vulnerability IT Management Cybersecurity App Information Quick Tips Maintenance Hosted Solution Word Office Two-factor Authentication Password Politics Chrome File Sharing Applications Apps Money Document Management Chromebook Virtual Reality Customer Relationship Management Big Data Risk Management Windows How To Compliance Network Blockchain Mobile Device Upgrade Saving Money Managed Service SaaS Physical Security Twitter IoT Telephone Systems Electronic Medical Records Storage Wireless VPN Data Security G Suite Mobile Device Management Computing Business Technology Server Management Virtual Private Network Robot Firewall Private Cloud Computer Care Downtime Access Control HIPAA Taxes Social Recovery Remote Computing Mobile Security Tech Support Training Websites Hacker Smart Technology Meetings Microsoft Office Botnet Patch Management Automation Remote Monitoring and Management Vendor Management Router Employees Alert Automobile Website Remote Workers Health Machine Learning Data loss Identity Theft Gmail Company Culture How To Samsung Point of Sale Regulations Permissions Travel Spam Network Management Google Calendar Relocation Cleaning Geography Instant Messaging YouTube Break Fix Cookies Supercomputer Fleet Tracking Operating System Personal Information Security Cameras Printer Wearable Technology Managing Stress Help Desk Managed IT Backup and Disaster Recovery Analytics Alerts Electronic Health Records Update Black Friday Social Networking GPS Fraud Star Wars Motion Sickness Professional Services Monitoring IT Support Touchscreen Legal Legislation Chatbots High-Speed Internet Finance Settings Dark Web Nanotechnology IT Budget Asset Tracking Tech Terms Google Drive Printing Enterprise Content Management Bookmarks Corporate Profile Outlook MSP Augmented Reality Human Error Lenovo Notifications Licensing Web Server Management Cyberattacks Solid State Drive Statistics Cyber Monday Motherboard Office Tips Tracking Digital Mail Merge IT Solutions Cost Management USB Consulting Cabling Sports Mouse Identity Error Development Authentication Microsoft Excel Screen Reader Digital Payment IBM OneNote Theft VoIP Techology Computer Repair Remote Worker SharePoint IT Consultant Unified Communications Favorites WannaCry Shortcut Virtualization The Internet of Things Proactive Permission Firefox Superfish Cooperation Cameras Enterprise Resource Planning Files Hard Disk Drive Bluetooth Authorization Spyware Address Upgrades Processors Hotspot Assessment Gadgets Dongle Budget Managed Services Provider Search Tablet Staffing Cables Smart Tech Cybercrime Employee-Employer Relationship Avoiding Downtime ROI Downloads IT Technicians Bring Your Own Device Project Management Monitors Administrator Test Financial Unified Threat Management Staff Law Enforcement CCTV Mobile Read Only Distributed Denial of Service Wires Language Internet Exlporer Webcam Users Service Level Agreement E-Commerce Disaster Heating/Cooling Comparison Black Market Connectivity Customer Service Time Management Multi-Factor Security Mirgation Education Vulnerabilities Conferencing Cortana Modem WPA3 RMM Networking Crowdsourcing Procurement User Error Gadget Emoji Managed IT Service Zero-Day Threat Computing Infrastructure Value Utility Computing Features Uninterrupted Power Supply Servers Specifications WiFi Hiring/Firing Public Speaking Regulation Fun Presentation Lithium-ion battery Wireless Technology 5G Safety Marketing Hard Drives Competition IP Address CrashOverride Miscellaneous Mobile Office Printers Domains Emergency