Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Tech Term: Safe Mode

Tech Term: Safe Mode

Sometimes it can be hard to diagnose a problem with your PC. While it might not be something system-breaking, it’s still important to find the root of an issue before it becomes a major problem. One of the best ways to diagnose an issue with your computer is by logging in using Safe Mode. We’ll talk about when and how you can use Safe Mode to your computer’s benefit.

What Does Safe Mode Do?
In its most basic form, Safe Mode lets you boot up your PC in a limited fashion. Only critical drivers and files will be activated, allowing for only a barebones boot that can help you isolate and diagnose issues with your computer. For example, the issue becomes apparent outside of Safe Mode, but it doesn’t happen during Safe Mode. This means that it’s likely not a critical driver and is something additional that you’ve installed.

There are two different ways to access Safe Mode. The first is the one that we just outlined. The other is one that includes other network drivers and devices, which depending on the situation might not be what your goal is.

Follow the below instructions to implement Safe Mode on startup.

From the Start Menu...

  • Select the Start button in the bottom-left corner of the screen.
  • Select Settings (the gear icon)
  • Click on Update & Security
  • Go to Recover in the left-hand column
  • Go to Advanced Startup and select Restart Now
  • When the device restarts, select Troubleshoot > Advanced Options > Startup > Settings > Restart
  • Upon startup, hit F4 or the number 4 for Safe Mode. Hit F5 or the number 5 for Safe Mode with Networking

From the Sign-in Screen…

  • Restart your PC. Hold down the Shift key while you’re selecting Restart.
  • When the device restarts, select Troubleshoot > Advanced Options > Startup > Settings > Restart
  • Upon startup, hit F4 or the number 4 for Safe Mode. Hit F5 or the number 5 for Safe Mode with Networking

For more great tech tips and tricks, subscribe to our blog.

Central Technology Solutions Partners with ID Agen...
Which Management Software Is Right for Your Busine...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, November 18 2018

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Best Practices Cloud Technology Business Computing Privacy Email Malware Hosted Solutions Hackers Internet IT Services Productivity Managed IT Services Outsourced IT Network Security Data IT Support Data Backup Software Business Mobile Devices Ransomware Computer Tech Term Microsoft Productivity Backup Innovation Data Recovery Smartphone Google Internet of Things Hardware Managed Service Provider Business Continuity Small Business Cloud Computing Android Data Management Windows 10 Disaster Recovery Artificial Intelligence Browser Efficiency Encryption Social Media Remote Monitoring Managed IT User Tips Communication Windows IT Support Smartphones BYOD VoIP Facebook Paperless Office Save Money Mobile Device App Business Management Workplace Tips Risk Management Cybersecurity Phishing Firewall Applications Robot Network Government Unified Threat Management Collaboration Saving Money Bandwidth Server Upgrade Recovery BDR Mobile Device Management Gmail Office 365 Wi-Fi Windows 10 Holiday Big Data Compliance Money Tip of the week Chrome Bring Your Own Device Document Management SaaS Data storage Telephone Systems Going Green Project Management Vendor Management Hosted Solution Infrastructure Website Password Vulnerability Virtualization Apps Passwords Content Filtering File Sharing Help Desk Customer Service Apple Files Virtual Reality IT Management communications Managed IT Services Miscellaneous Healthcare Two-factor Authentication Computing Unified Communications Router Politics Regulations Antivirus Employer-Employee Relationship Office IT Service Work/Life Balance Computers Customer Relationship Management Wireless Storage Managed Service Data loss Automation Data Security Analytics Training Remote Computing Avoiding Downtime Uninterrupted Power Supply Mobile Computing Sports Tablet Hacker Social Upgrades Word Redundancy Wireless Technology Legal Twitter The Internet of Things Users Tech Support Quick Tips Scam Maintenance End of Support Health Spam Smart Technology Remote Monitoring and Management VPN WiFi Budget Digital Payment YouTube Patch Management Websites Information Technology Identity Theft Monitors Remote Workers Printing Licensing Microsoft Office Alert Outlook Virtual Private Network Administration Mouse Internet Exlporer Education HIPAA Network Management LiFi Blockchain IoT Information Assessment Business Technology Google Drive How To Samsung How To IT solutions Settings Server Management Mobile Security Business Growth Machine Learning Mobility Chromebook Flexibility SharePoint Staff GPS Company Culture Conferencing Consultation Lenovo Break Fix Social Networking Hard Drives Google Docs Asset Tracking Notifications Humor Recycling Cyberattacks Address Black Friday Roanoke — Central Technology Solutions MSP Black Market Statistics Unified Threat Management Hotspot Utility Computing Consulting Digital Obstacle Marketing Mirgation Drones Supercomputer Writing Development Emoji Zero-Day Threat Disaster Resistance Fraud Screen Reader Crowdsourcing Meetings Backups Gadgets Downloads Augmented Reality Deep Learning Tracking Network Congestion Managing Stress Instant Messaging Superfish Buisness Dark Web Motherboard Solid State Drive G Suite History OneNote Search Language Current Events Taxes eWaste Computer Repair Read Only Cyber Monday technology services provider Google Maps Proactive Bluetooth User Error Physical Security Managed Services Provider Spyware Course Software as a Service Migration Alt Codes Private Cloud IT Budget Retail Cables Cortana Proactive IT Smart Tech Shortcut Operations Display Enterprise Content Management Finance Data Warehousing Cryptocurrency Cabling 3D Printing Employee-Employer Relationship Computing Infrastructure Management Firefox Technology Assurance Group ’s 18 Processors Office Tips Cost Management E-Commerce Technology Tips Chatbots Typing Wires Human Error Heating/Cooling IT Consulting Net Neutrality Hacks Point of Sale WannaCry Multi-Factor Security Wearable Technology Best Practice Vulnerabilities Update Authentication Time Management Networking Downtime Microsoft Excel Modem Bitcoin Connectivity Unsupported Software Virus Printer Alerts Telephony Enterprise Resource Planning Electronic Medical Records Bookmarks Distributed Denial of Service Annual Convention Sync Operating System WPA3 Hacking Hard Drive Features Comparison Identity Public Cloud Social Engineering USB Permission Servers Data Breach Law Enforcement Google Calendar Botnet Geography Authorization Cookies Windows 8 Travel Save Time Mobile Data Access Control Cooperation Mobile Favorites Managed IT Service San Diego Identities Mobile Device Managment Software Tips Fleet Tracking Disaster Trending Virtual Desktop Gadget Dark Data Cache Personal Information Electronic Health Records Mail Merge Specifications Automobile Computer Care Safety Test Technology Laws VoIP Sponsor Legislation IT Technicians Google Wallet High-Speed Internet Employees Touchscreen Techology Permissions Nanotechnology Star Wars Monitoring CCTV Administrator RMM Relocation Backup and Disaster Recovery Webcam Hard Disk Drive IT Consultant Printers Error Cybercrime Emergency Web Server CrashOverride Cameras Regulation Motion Sickness