Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Tech Term: Safe Mode

Tech Term: Safe Mode

Sometimes it can be hard to diagnose a problem with your PC. While it might not be something system-breaking, it’s still important to find the root of an issue before it becomes a major problem. One of the best ways to diagnose an issue with your computer is by logging in using Safe Mode. We’ll talk about when and how you can use Safe Mode to your computer’s benefit.

What Does Safe Mode Do?
In its most basic form, Safe Mode lets you boot up your PC in a limited fashion. Only critical drivers and files will be activated, allowing for only a barebones boot that can help you isolate and diagnose issues with your computer. For example, the issue becomes apparent outside of Safe Mode, but it doesn’t happen during Safe Mode. This means that it’s likely not a critical driver and is something additional that you’ve installed.

There are two different ways to access Safe Mode. The first is the one that we just outlined. The other is one that includes other network drivers and devices, which depending on the situation might not be what your goal is.

Follow the below instructions to implement Safe Mode on startup.

From the Start Menu...

  • Select the Start button in the bottom-left corner of the screen.
  • Select Settings (the gear icon)
  • Click on Update & Security
  • Go to Recover in the left-hand column
  • Go to Advanced Startup and select Restart Now
  • When the device restarts, select Troubleshoot > Advanced Options > Startup > Settings > Restart
  • Upon startup, hit F4 or the number 4 for Safe Mode. Hit F5 or the number 5 for Safe Mode with Networking

From the Sign-in Screen…

  • Restart your PC. Hold down the Shift key while you’re selecting Restart.
  • When the device restarts, select Troubleshoot > Advanced Options > Startup > Settings > Restart
  • Upon startup, hit F4 or the number 4 for Safe Mode. Hit F5 or the number 5 for Safe Mode with Networking

For more great tech tips and tricks, subscribe to our blog.

Central Technology Solutions Partners with ID Agen...
Which Management Software Is Right for Your Busine...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, September 23 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Best Practices Cloud Technology Business Computing Privacy Email Malware IT Services Hosted Solutions Hackers Productivity Internet Managed IT Services IT Support Outsourced IT Data Network Security Software Mobile Devices Data Backup Tech Term Ransomware Microsoft Business Backup Computer Innovation Google Data Recovery Internet of Things Hardware Smartphone Business Continuity Cloud Computing Managed Service Provider Small Business Android Disaster Recovery Data Management Windows 10 Remote Monitoring Artificial Intelligence Productivity Social Media Managed IT User Tips Communication Facebook Efficiency Browser Encryption BYOD Paperless Office VoIP Windows Smartphones App IT Support Cybersecurity Workplace Tips Risk Management Save Money Phishing Mobile Device Management Network Firewall Applications Saving Money Recovery Business Management Unified Threat Management Mobile Device Gmail Upgrade Robot Telephone Systems SaaS Server Big Data BDR Chrome Tip of the week Office 365 Bandwidth Money Hosted Solution Data storage Virtualization Bring Your Own Device Website Going Green Holiday Apps Vendor Management Government Infrastructure Wi-Fi Document Management Content Filtering Password Passwords Compliance Miscellaneous Regulations Windows 10 Training IT Service Apple Unified Communications IT Management Computers Storage File Sharing Automation Healthcare Project Management Router Antivirus Computing Two-factor Authentication Files Employer-Employee Relationship Wireless Managed Service Data Security Data loss Vulnerability Collaboration Work/Life Balance Virtual Reality Analytics Remote Computing Licensing Mobile Security Settings communications Uninterrupted Power Supply Business Growth End of Support Health Mobile Computing Office Social Monitors Word Hacker Microsoft Office Alert Spam Managed IT Services Redundancy Machine Learning Mobility Wireless Technology Legal YouTube WiFi Quick Tips Scam The Internet of Things Tablet How To Samsung Smart Technology Administration VPN Flexibility LiFi Chromebook Education Patch Management Budget Customer Relationship Management Avoiding Downtime Help Desk Information Technology Virtual Private Network Customer Service Printing Tech Support IT solutions Network Management Outlook Politics Internet Exlporer Mouse Upgrades Assessment Business Technology Blockchain IoT Information Digital Payment HIPAA How To Google Drive Server Management Websites Identity Theft Sports Twitter Sync Specifications Physical Security Touchscreen Techology Telephony Retail Cache Marketing Cortana Electronic Health Records VoIP Sponsor 3D Printing High-Speed Internet Buisness Consultation Lenovo Law Enforcement Permissions Nanotechnology Display Star Wars Gadgets Monitoring Google Wallet Public Cloud Legislation IT Technicians Company Culture Processors Address Hard Drives Google Docs Travel Break Fix Social Networking Asset Tracking Statistics Botnet SharePoint Staff Mobile Device Managment Software Tips Black Friday Roanoke — Central Technology Solutions Office Tips MSP Disaster Resistance Humor Unified Threat Management Hotspot Recycling Cyberattacks Digital Obstacle Unsupported Software Development Virus Superfish Backups Gadget Fraud Screen Reader Utility Computing Users Update Consulting Search Drones Automobile Computer Care Mirgation Managing Stress Solid State Drive Dark Web Motherboard Electronic Medical Records OneNote Bluetooth Deep Learning Downloads Augmented Reality Cyber Monday technology services provider Proactive Proactive IT Current Events GPS User Error Language Social Engineering eWaste USB Read Only Spyware Course Software as a Service Migration Mobile Data Cables Downtime Smart Tech Managed Services Provider Shortcut Alt Codes Enterprise Content Management Firefox Cryptocurrency Crowdsourcing Data Warehousing Employee-Employer Relationship Supercomputer Operations G Suite History Technology Assurance Group ’s 18 Dark Data Personal Information Remote Monitoring and Management Heating/Cooling IT Consulting Tracking Maintenance Computing Infrastructure Safety Management Technology Tips Chatbots Wires Time Management Networking Hacks Taxes Net Neutrality Cost Management E-Commerce WannaCry Typing Google Maps Vulnerabilities Notifications Bitcoin Microsoft Excel Modem Connectivity Remote Workers Virtual Desktop Hacking Best Practice Private Cloud IT Budget Multi-Factor Security Wearable Technology Operating System Cabling Distributed Denial of Service Annual Convention WPA3 Servers Data Breach Printer Alerts Enterprise Resource Planning Black Market Comparison Identity Writing Hard Drive Emoji Features Geography Windows 8 Save Time Point of Sale Cookies Network Congestion Disaster Trending Google Calendar Mail Merge Identities Managed IT Service San Diego Computer Repair Fleet Tracking Technology Laws Access Control Cooperation Mobile Regulation Web Server Cameras Motion Sickness CCTV Hard Disk Drive Administrator Meetings Relocation Printers Emergency Webcam CrashOverride IT Consultant Error Cybercrime