Chapter 2. Configuring and optimizing Windows 8.1 computers

One of your primary responsibilities as an administrator is to manage the operating system configuration. Windows 8.1 has many unique characteristics, including:

  • A modular architecture and binaries distributed by using Windows Imaging (WIM) format disk images. Because of this, you can use the Deployment Image Servicing and Management (DISM) tool to manage packages, drivers, features, and internationalization settings in Windows Image (.wim) files or in virtual hard disk (.vhd/.vhdx) files. Disk Management and DiskPart have both been updated to work with .vhd and .vhdx files.

  • A preboot environment in which Windows Boot Manager is used to control startup and load the boot application that you’ve selected. Because of this, Windows 8.1 doesn’t use Ntldr and Boot.ini to load the operating system, as early versions of Windows did, and you have additional boot options. For example, you can start a computer from an operating system on a .vhd or .vhdx file. One way you do this is to create a basic boot image that uses Xcopy to copy the required .vhd or .vhdx file to a specified drive on startup.

  • A user privilege and access control handler called User Account Control (UAC) is used to manage which processes can run and how applications interact with the operating system. Because of this, Windows 8.1 handles user privileges and access controls differently than earlier versions of Windows. As you’ll learn in Chapter 5, you can optimize or turn off UAC prompting, but this doesn’t disable other UAC features, such as application virtualization.

Beyond this, you need to understand the tools and options available to configure Windows 8.1, and that’s what I discuss in this chapter. Many of the tools with which you need to work are on the Apps screen. On the Start screen, you’ll find a button with an arrow facing down; tapping or clicking this button displays the Apps screen. Because apps are listed first in the results whenever you perform an Everywhere search, one way to quickly search for apps is by pressing the Windows key + Q and then typing the app name in the Search box. If you followed my advice in Chapter 1, you might have pinned the key tools you work with every day to Start or to the desktop taskbar for quick access as well.

Supporting computers running Windows 8.1

To successfully manage a computer, diagnose problems, and troubleshoot support issues, you need to know how the computer is configured. Support tools you can use to get information on a computer’s configuration include the following:

  • Computer Management. Provides access to important system, services, and storage-management tools.

  • Performance Monitor. Allows you to monitor system performance and determine whether any issues are causing performance problems.

  • Resource Monitor. Allows you to view detailed usage information for system resources, including processors, memory, disks, and networking. Use Resource Monitor when you need more information beyond what Task Manager provides.

  • System. Allows you to view basic information about a computer and manage system properties.

  • System Information. Displays detailed system statistics about configuration and resource availability. You can also use System Information to troubleshoot system problems.

  • Task Manager. Allows you to view usage information for system resources.

In this section, I’ll discuss techniques for working with these tools. First, though, you might want to add the Administrative Tools to the Start screen. From Start, you do this by using one of the following techniques:

  • With the touch UI, slide in from the right, tap Settings, tap Tiles, and then tap Show Administrative Tools.

  • With the mouse and keyboard, point to the hidden button in the lower-right corner of the screen to display the Charms bar. On the Charms bar, click Settings, click Tiles, and then click Show Administrative Tools.

Tapping or clicking the Show Administrative Tools slider switches between Yes and No, meaning either to show the tools or hide the tools. The next time you open Start, the screen is updated to either show or hide the tools as appropriate.

Start and the desktop have a handy menu that you can display by pressing and holding or right-clicking the lower-left corner of the Start screen or the desktop. Alternatively, you can press the Windows key + X to access the shortcut menu, which is helpful for computers with a mouse and keyboard, but a true gift for computers with a touch UI. The shortcut menu has options for Control Panel, Computer Management, Power Options, Search, System, Task Manager, File Explorer, Windows PowerShell, Windows PowerShell (Admin), and more.

More Info

On the Start screen, the hidden button in the lower-left corner shows a Windows icon, and tapping or clicking the Windows button opens the desktop. On the desktop, this button is not hidden, and tapping or clicking this button opens Start. Pressing and holding or right-clicking this button is what displays the shortcut menu.

Although you can use the shortcut menu to open both a standard and an elevated, administrator prompt for Windows PowerShell, you cannot use the shortcut menu to open a command prompt. To quickly open a command prompt, press the Windows key + Q, enter cmd in the Search box, and then press Enter. One way to quickly open an elevated, administrator command prompt is to follow these steps:

  1. Press the Windows key + Q, and then enter cmd in the Search box.

  2. In the search results, right-click Command Prompt, and then select Run As Administrator.

Working with the Computer Management console

The Computer Management console is designed to handle core system administration tasks on local and remote systems. If you’ve added Administrative Tools to the Start screen, you can start the Computer Management console by tapping or clicking the related tile. You also can start the Computer Management console by typing compmgmt.msc in the Everywhere Search box, and then pressing Enter.

As Figure 2-1 shows, the main window has a multipane view similar to File Explorer. You use the console tree in the left pane for navigation and tool selection. The Actions pane, which can be displayed on the far right, is similar to the shortcut menu that is displayed when you press and hold or right-click an item. To display or close the Actions pane, tap or click the Show/Hide Action Pane button on the console toolbar. Tools are divided into the following three broad categories:

  • System Tools. General-purpose tools for managing systems and viewing system information

  • Storage. Drive management tools

  • Services And Applications. Tools used to view and manage the properties of services and applications installed on a server

Use the Computer Management console to manage network computers and resources.
Figure 2-1. Use the Computer Management console to manage network computers and resources.

Within these categories are the following tools:

  • Task Scheduler. View and manage scheduled tasks. Scheduled tasks are used to automate processes such as disk cleanup or diagnostics testing. Scheduled tasks and automation are discussed in Chapter 9.

  • Event Viewer. View the event logs on the selected computer. Event logs record important events that have taken place on the computer and can be used to determine if a computer has configuration issues or other types of problems. Events and event logs are covered in Chapter 9.

  • Shared Folders. View and manage shared folders, as well as related sessions and open files.

  • Local Users And Groups. Manage local users and local user groups on the selected computer. Each client computer has both local users and local groups, which are separate from domain users and groups. Working with local users and groups is covered in Chapter 5.

  • Performance. Use monitoring and reporting tools to determine a computer’s current performance and to track performance over time.

  • Device Manager. Use as a central location for checking the status of any device installed on a computer and for updating the associated device drivers. You can also use it to troubleshoot device problems. Managing devices is covered in Chapter 8.

  • Disk ManagementManage hard disks, disk partitions, and volume sets. Windows 8.1 supports disk spanning, disk striping, disk striping with parity, and disk mirroring. Disk spanning enables you to create a single volume that extends across multiple disks. Disk striping enables you to write data stripes across multiple disks for fast access to data. Neither technique provides failure protection, however, and if any disk in a spanned or striped volume fails, the entire volume fails.

  • Services. View and manage system services running on a computer. In Windows 8.1, every service has a recovery policy. If a service fails, Windows 8.1 tries to restart it automatically and automatically handles both service and nonservice dependencies as well. Any dependent services and system components are started prior to the attempt to start a failed service. Working with services is discussed in Chapter 8.

  • WMI Control. View and manage Windows Management Instrumentation (WMI). WMI gathers system information, monitors system health, and manages system components. See the Working with WMI Control section later in this chapter for more information.

When working with Computer Management, you can select a remote computer to manage by completing the following steps:

  1. Press and hold or right-click the Computer Management entry in the console tree, and then tap or click Connect To Another Computer. This opens the Select Computer dialog box.

  2. Select Another Computer, and then enter the fully qualified name of the computer with which you want to work, such as cspc85.microsoft.com, where cspc85 is the computer name and microsoft.com is the domain name. Or tap or click Browse to search for the computer with which you want to work.

  3. Tap or click OK.

If you want to make it possible to remotely manage a computer running Windows 8.1 by using the WS-Management protocol, enter winrm quickconfig at an elevated prompt, and then, each time you’re prompted to make configuration changes, enter Y. This will start the Windows Remote Management (WinRM) service, configure WinRM to accept WS-Management requests on any IP address, create a Windows Firewall exception for Windows Remote Management, and then configure LocalAccountTokenFilterPolicy to grant appropriate administrative rights for remote management.

Many other types of remote management tasks depend on other exceptions for Windows Firewall. Keep the following in mind:

  • Remote Desktop is enabled or disabled separately from remote management. To allow someone to connect to the local server by using Remote Desktop, you must allow related connections to the computer and configure access.

  • Remote Event Log Management must be configured as an allowed app in Windows Firewall to remotely manage a computer’s event logs. In the advanced firewall, several related rules allow management via Named Pipes (NP) and Remote Procedure Call (RPC).

  • Remote Scheduled Task Management must be configured as an allowed app in Windows Firewall to remotely manage a computer’s scheduled tasks. In the advanced firewall, several related rules allow management of scheduled tasks via RPC.

  • Remote Service Management must be configured as an allowed app in Windows Firewall to remotely manage a computer’s services. In the advanced firewall, several related rules allow management via NP and RPC.

  • Remote Shutdown must be configured as an allowed app in Windows Firewall to remotely shut down a computer.

  • Remote Volume Management must be configured as an allowed app in Windows Firewall to remotely manage a computer’s disks. In the advanced firewall, several related rules allow management of the Virtual Disk Service and Virtual Disk Service Loader.

Getting system information

You use the System console to view and manage system properties. In Control Panel, you can access the System console by tapping or clicking System And Security, and then tapping or clicking System. As Figure 2-2 shows, the System console is divided into four basic areas that provide links for performing common tasks and a system overview. These four areas are:

  • Windows Edition. Shows the operating system edition and version.

  • System. Lists the processor, memory, and type of operating system installed on the computer. The type of operating system is listed as 32-bit or 64-bit.

  • Computer Name, Domain, And Workgroup Settings. Provides the computer name and description, as well as the domain, homegroup, or workgroup details. If you want to change any of this information, tap or click Change Settings, and then tap or click the Network ID button in the System Properties dialog box.

  • Windows Activation. Shows whether you have activated the operating system and the product key. If Windows 8.1 isn’t activated yet, tap or click the link provided to start the activation process, and then follow the prompts.

Use the System console to view and manage system properties.
Figure 2-2. Use the System console to view and manage system properties.

When you’re working in the System console, links in the left pane provide quick access to key support tools, including the following:

  • Device Manager

  • Remote Settings

  • System Protection

  • Advanced System Settings

Tapping or clicking Change Settings under Computer Name, Domain, And Workgroup Settings displays the System Properties dialog box. Using System Properties to manage a computer’s configuration is discussed later in this chapter in the section Managing system properties.

When you want to get detailed system information or check computer information on remote systems, use System Information (Msinfo32.exe). You can access system information by tapping or clicking System Information on the Apps screen or by typing msinfo32 into the Everywhere Search box, and then pressing Enter. As shown in Figure 2-3, you can view system summaries by selecting the System Summary node. All the configuration statistics provided are collected by using the WMI service.

Advanced system information can help you troubleshoot system configuration problems.
Figure 2-3. Advanced system information can help you troubleshoot system configuration problems.

The System Information tool provides detailed information on several major areas of the operating system, including the following:

  • Hardware Resources. Provides detailed information on I/O, interrupt requests (IRQs), memory, direct memory access (DMA), and Plug and Play devices. A key area you’ll want to check if a system is having a device problem is the Conflicts/Sharing node, which provides a summary of devices that are sharing resources or causing system conflicts.

  • Components. Provides detailed information on installed components, from audio codecs to input devices to USB ports. A key area you’ll want to check if a system is having a component problem is the Problem Devices node. This area provides information on components that have errors.

  • Software Environment. Provides detailed information on the running configuration of the operating system. When you are troubleshooting problems with a remote system, you’ll find the Software Environment area to be extremely useful. In addition to drivers, environment variables, print jobs, and network connections, you can check running tasks, services, program groups, and startup programs.

If you want to browse configuration information for a remote computer, follow these steps:

  1. Open System Information. Select Remote Computer on the View menu. This displays the Remote Computer dialog box.

  2. In the Remote Computer dialog box, select Remote Computer On The Network.

  3. Enter the computer name in the text box provided, and then tap or click OK.

The account you use must have appropriate administrator access permissions for the domain or the local machine. If you have other problems obtaining information from a remote system, you might need to check the namespace used by the WMI service, as discussed in the following section. You’ll know that you are looking at system information for a remote computer because the System Summary node shows the computer name in parentheses.

Working with WMI Control

Windows Management Instrumentation (WMI) is a key part of the Windows 8.1 operating system. It is used to gather system statistics, monitor system health, and manage system components. To work properly, WMI relies on the WMI service, which must be running and properly configured for the environment.

You control the configuration of the WMI service through WMI Control, which can be accessed on a local or remote system by using the following steps:

  1. Open Computer Management from the Apps screen (or by pressing the Windows key + X, and then selecting Computer Management).

  2. Press and hold or right-click the Computer Management entry in the console tree, and then select Connect To Another Computer. You can now choose the system that has the services you want to manage.

  3. Expand the Services And Applications node by double tapping or double-clicking it. Next, tap or click WMI Control to select it. (This is required for the control to be read in.) Press and hold or right-click WMI Control, and then select Properties. You can now use the WMI Control Properties dialog box to configure WMI, as shown in Figure 2-4.

WMI Control is used to manage the configuration of the WMI service.
Figure 2-4. WMI Control is used to manage the configuration of the WMI service.

The WMI Control Properties dialog box has the following tabs:

  • General. Items on this tab provide summary information for the system and WMI. WMI uses the credentials of the current user to obtain system information.

  • Backup/Restore. Statistics gathered by WMI are stored in a repository. By default, this repository is located in %SystemRoot%System32WbemRepository. These statistics are automatically backed up at regular intervals. You can back up or restore the repository manually by using the Back Up Now or Restore Now option on this tab.

  • Security. Security settings determine who has access to different levels of WMI statistics. By default, the Administrators group has full access to WMI, and the Authenticated Users group has permissions to execute methods, enable accounts, and write gathered statistics.

  • Advanced. Advanced settings determine the default namespace for WMI. The default namespace is used in WMI scripting when a full namespace path isn’t set for a WMI object. You can change the default setting by tapping or clicking Change, selecting a new default namespace, and then tapping or clicking OK.

Note

WMI maintains error logs that can be used for troubleshooting problems with the WMI service. These logs are stored by default in %SystemRoot%System32WbemLogs. WMI maintenance files, logs, and repositories can use a considerable amount of disk space on a system. These files used an average of 65 megabytes (MB) on my test systems—the bulk of this (40–50 MB) to maintain repository backup files.

Information gathered by WMI is stored in a collection of system files called a repository. By default, the repository files are stored under %SystemRoot%System32WbemRepository. The repository is the heart of WMI and the Help And Support services framework. Information is moved through the repository by using a staging file. If repository data or the staging file becomes corrupt, WMI might not function properly. This condition is usually temporary, but you can safeguard against it by backing up the repository file manually.

To back up the WMI repository manually, complete the following steps:

  1. Open the WMI Control Properties dialog box, and then tap or click the Backup/Restore tab.

  2. Tap or click Back Up Now. Next, use the Specify A Name For Your Backup File dialog box to set the file location and name of the WMI backup file. Tap or click Save.

  3. The Backup In Progress dialog box is displayed while the recovery file is being created. The recovery file is saved with a .rec extension, and its size depends on how much information is being stored. Usually this file is between 20–30 MB in size.

If you later need to restore the WMI repository from a backup file, complete these steps:

  1. Open the WMI Control Properties dialog box, and then tap or click the Backup/Restore tab.

  2. Tap or click Restore Now. Next, use the Specify A Backup File To Restore dialog box to set the location and name of the existing recovery file. Then tap or click Open.

  3. The Restore In Progress dialog box is displayed temporarily, and then you’ll get a warning prompt. Tap or click OK.

  4. Your connection to WMI Control is broken. When the restore operation is complete, you can reconnect to the computer. To do this, close and reopen the WMI Control Properties dialog box, which forces WMI Control to reconnect to the local or remote computer: note that you can do this only if the restore operation is complete.

Note

If the connection fails, it usually means that WMI Control hasn’t finished restoring the repository. Wait for another 30 to 60 seconds, and then try again.

Managing Computer Browser support

Support for Server Message Block (SMB) 1.0 and the Computer Browser service is a holdover from the days of Windows XP and Windows Server 2003. The Computer Browser service periodically performs network broadcasts and collects information about computers on the network. SMB is a client/server technology used for distributing files over networks. Windows desktop operating systems have an SMB client; Windows Server operating systems also have SMB server technology. Current Windows operating systems support SMB 3.0, which supports end-to-end encryption and eliminates the need for IPsec to protect SMB data in transit.

The SMB 1.0/CIFS File Sharing Support feature is installed by default on computers running Windows 8.1. However, if you’ve removed all computers running Windows XP and Windows Server 2003 from your organization, support for Server Message Block (SMB) 1.0 is no longer needed, nor is the Computer Browser service that was used by SMB 1.0. To remove the SMB 1.0/CIFS File Sharing Support feature, follow these steps:

  1. In Control Panel, select Programs. Under Programs And Features, select Turn Windows Features On Or Off.

  2. In the Windows Features dialog box, turn off the SMB 1.0/CIFS File Sharing Support feature by clearing its check box.

  3. Tap or click OK. When prompted, tap or click Restart Now to restart the computer and apply the changes.

When you remove the SMB 1.0/CIFS File Sharing Support feature, the Computer Browser service also is removed because it’s no longer needed. Removing this feature ensures that the Computer Browser service is no longer used to collect information about computers on the network and prevents SMB clients connecting to file shares from using SMB 1.0.

Using system support tools

Windows 8.1 provides a wide range of support tools. Tools that are available include the following:

  • Built-In Diagnostics. Scans the system, examining hardware components and software configurations for problems. This information can be used to troubleshoot and resolve performance and configuration issues. Working with diagnostics tools is discussed in this chapter and in other chapters throughout this book.

  • DirectX Diagnostic Tool (Dxdiag.exe). Runs a diagnostic tool that you can use to troubleshoot problems with Microsoft DirectX, which is used to speed up the performance of applications, provided that the system hardware supports this feature.

  • Disk Cleanup (Cleanmgr.exe). Runs the Disk Cleanup utility, which examines disk drives for files that aren’t needed. By default, Disk Cleanup examines temporary files, the Recycle Bin, and various types of offline files to check whether there are files that can be deleted.

  • Disk Defragmenter (Dfrgui.exe). Runs the Optimize Drives utility, which examines disk drives for fragmentation and can then be used to defragment the drive. A drive with many fragmented files can reduce the system’s performance.

  • File Signature Verification Utility (Sigverif.exe). Checks operating system files that have been digitally signed. Any critical files that aren’t digitally signed are displayed in a results list. The complete list of system files checked is available in a log file stored in %SystemRoot%Sigverif.txt.

  • Offer Remote Assistance. Enables you to offer remote assistance to a user. If the user accepts the offer, you can troubleshoot problems on his system as discussed in Chapter 6.

  • Remote Assistance. Enables you to create a remote assistance invitation that can be used to get remote help from a technician. Remote Assistance is discussed in detail in Chapter 6.

  • System Configuration (Msconfig.exe). Enables you to manage system configuration information. You can configure normal, diagnostic, and selective startup as well.

  • System Restore (Rstrui.exe). Opens the System Restore utility, which can be used to create restore points or roll back a system to a specific restore point. The System Restore utility is discussed in Chapter 10.

The tools you might want to take a closer look at now include Disk Cleanup, File Signature Verification, and System Configuration.

Working with Disk Cleanup

Disk Cleanup checks disk drives for files that aren’t needed. You can start to work with Disk Cleanup by completing the following steps:

  1. Open Disk Cleanup by typing cleanmgr in the Everywhere Search box and then pressing Enter, or by tapping or clicking the related option on the Apps screen.

  2. If the computer has multiple hard disk drives, the Drive Selection dialog box is displayed. Use the Drives drop-down list to choose the drive you want to clean up, and then tap or click OK.

    Disk Cleanup then examines the selected drive, looking for temporary user files that can be deleted and user files that are candidates for deletion. The more files on the drive, the longer the search process takes.

    When Disk Cleanup finishes its initial run, you can add temporary system files that can be deleted and system files that are candidates for deletion by tapping or clicking Clean Up System Files, selecting a system drive to examine, and then tapping or clicking OK. You will then get a report similar to the one shown in Figure 2-5.

    Use Disk Cleanup to help identify files that can be deleted.
    Figure 2-5. Use Disk Cleanup to help identify files that can be deleted.

    File categories that you might find in the report include the following:

    • Downloaded Program Files. Contains programs downloaded for use by your browser, such as ActiveX controls and Java applets. These files are temporary and can be deleted.

    • Files Discarded By Windows UpgradeContains files from a previous upgrade that were not identified as Windows system files. After you’ve saved any necessary data from previous Windows installations, including user data, you can use this option to remove the related files and free up space.

    • Hibernation File Cleaner. Contains details about the state of the computer when it enters hibernation. If the computer doesn’t use hibernation, you can remove this file to free up space.

    • Microsoft Office Temporary Files. Contains temporary files and logs used by Microsoft Office. These files can be deleted to free up space.

    • Offline Files. Contains local copies of network files that you’ve designated for offline use. These files are stored to enable offline access and can be deleted.

    • Offline Web Pages. Contains local copies of webpages that you’ve designated for offline use. These files are stored to facilitate offline access and can be deleted.

    • Previous Windows Installation(s). Saved under %SystemDrive%Windows.old, contains files from previous Windows installations. After you’ve saved any necessary data from previous Windows installations, including user data, you can use this option to remove the related files and free up space.

    • Temporary Offline Files. Contains temporary data and work files for recently used network files. These files are stored to facilitate working offline and can be deleted.

    • Recycle Bin. Contains files that have been deleted from the computer but not yet purged. Emptying the Recycle Bin permanently removes the files.

    • Temporary Files. Contains information stored in the Temp folder. These files are primarily temporary data or work files for applications.

    • Temporary Internet Files. Contains webpages stored to support browser caching of pages. These files are temporary and can be deleted.

    • Thumbnails. Contains thumbnails of pictures, videos, and documents created by Windows 8.1. When you first access a folder, Windows 8.1 creates thumbnails of pictures, videos, and documents. These thumbnails are saved so that they can be quickly displayed the next time you open the folder. If you delete thumbnails, they are re-created the next time you open the folder.

  3. Use the check boxes provided in the Files To Delete list to choose files that you want to remove. Then tap or click OK. When prompted to confirm the action, tap or click Yes.

Verifying system files with File Signature Verification

Critical files used by the operating system are digitally signed. Digital signatures help prove the authenticity of these files and ensure that it’s easy to track changes that might cause problems on a system. When you are having problems that cannot easily be explained, such as a system becoming unstable after an application is installed, it’s a good idea to verify that critical system files haven’t been changed. You can do this by using the File Signature Verification utility.

The executable file for the File Signature Verification utility is Sigverif.exe. You can start and work with the File Signature Verification utility by completing the following steps:

  1. Enter sigverif in the Everywhere Search box, and then press Enter. This starts the File Signature Verification utility, as shown in Figure 2-6.

    Use the File Signature Verification utility to help verify system files.
    Figure 2-6. Use the File Signature Verification utility to help verify system files.
  2. By default, the File Signature Verification utility displays a list of system files that aren’t digitally signed and writes verification results to %SystemRoot%System32Sigverif.txt. Before you verify file signatures, you might want to specify logging options. If so, tap or click Advanced. As Figure 2-7 shows, the verification results are saved to a log file, and by default, any results you generate will overwrite any results that you previously generated. Results are saved to a log file named Sigverif.txt. To help you track changes in files, you might want to append results rather than overwrite. If you append rather than overwrite, you can more easily identify changes. When you are finished working with the logging options, tap or click OK to return to the main window.

    Modify the default logging options as necessary.
    Figure 2-7. Modify the default logging options as necessary.
  3. Tap or click Start to run the File Signature Verification utility. In the results, notice the list of files displayed in the File Signature Verification utility report. These files don’t have digital signatures and could have been maliciously replaced by other programs of the same name. Tap or click Close to return to the main window. If you suspect a problem, review event logs and other error reports to check if any of these files show up in the error reports.

  4. If you want to review the verification log, tap or click Advanced, and then tap or click View Log. You also can use Notepad to open the verification log, which is located in %SystemRoot%System32Sigverif.txt by default. Check the log to find out if there are files that have been altered since they were installed. Files are listed by status, such as Signed and Not Signed. Note the modification date and version of the file. If a computer has been having problems since a certain date, and critical files were changed on this date, this could be the source of the problem. For example, perhaps a program was installed that overwrote a critical file with an older version.

Managing system configuration, startup, and boot

Whether you want to update system configuration files or troubleshoot startup problems, your tool of choice should be the System Configuration utility. System Configuration is an integrated tool for managing system configuration information. Using this utility, you can manage the following elements:

  • Operating system startup options

  • Startup applications

  • Service-startup options

The following sections examine key tasks that you can perform with the System Configuration utility. The executable file for the System Configuration utility is Msconfig.exe. You can run the utility by typing msconfig in the Everywhere Search box and then pressing Enter.

Note

You’ll also find the System Configuration utility on the Apps screen. It’s under the Administrative Tools heading.

Understanding startup modes and troubleshooting system startup

You can use the System Configuration utility to select the startup mode for a computer. The following three startup modes are available:

  • Normal Startup. Used for normal system operations. In this mode, the operating system loads all system configuration files and device drivers and runs all startup applications and enabled services.

  • Diagnostic Startup. Used to troubleshoot system problems. In diagnostic mode, the system loads only basic device drivers and essential services. After you start the system in diagnostic mode, you can modify system settings to resolve configuration problems.

  • Selective Startup. Used to pinpoint problem areas in the configuration. Here, you can use a modified boot configuration and selectively use system services and startup items. This can help you identify the settings that are causing system problems and correct them as necessary.

Normal is the default startup mode. If you are experiencing problems with a system and want to use a different startup mode, complete the following steps:

  1. Open the System Configuration utility by typing msconfig in the Everywhere Search box and then pressing Enter, or by tapping or clicking the related option on the Apps screen.

  2. On the General tab, shown in Figure 2-8, select either Diagnostic Startup or Selective Startup. If you choose Selective Startup, you can use the following options to specify the items that you want the system to use:

    • Load System Services. Tells the system to load Windows services on startup. If you select this option, use the settings on the Services tab to specify which services are started.

    • Load Startup Items. Tells the system to run applications designated for startup at boot time. If you select this option, you can enable and disable startup applications by using the options on the Startup tab.

    • Use Original Boot Configuration. Tells the system to process the original boot configuration on startup instead of one you’ve created by modifying the boot settings with the System Configuration utility.

    Use the General tab of the System Configuration utility to control system startup.
    Figure 2-8. Use the General tab of the System Configuration utility to control system startup.

    Note

    If you make changes on the Boot, Services, or Startup tab, the Selective Startup option and related suboptions are automatically selected on the General tab.

  3. When you are ready to continue, tap or click OK, and then reboot the system. If you have problems rebooting the system, restart the system in Safe mode and then repeat this procedure. Safe mode appears automatically as an option after a failed boot.

Changing boot options

Windows 8.1 uses the Windows Boot Manager and a boot application to start up the operating system. Windows 8.1 doesn’t use Boot.ini or other boot files in a standard configuration. When troubleshooting, you can use the options on the Boot tab of the System Configuration utility to control the boot partition, boot method, and boot options used by the operating system.

As shown in Figure 2-9, when you start the System Configuration utility and tap or click the Boot tab, the operating systems that are bootable on the computer are listed. To specify that an operating system other than the current one should be used, simply tap or click the related operating system entry. When working with operating system entries, you can select the following options:

The Boot tab controls the boot partition, boot method, and boot options used by the operating system.
Figure 2-9. The Boot tab controls the boot partition, boot method, and boot options used by the operating system.
  • Set As Default. Sets the currently selected boot partition as the default partition. The default partition is selected automatically if you don’t choose an option before the timeout interval.

  • Timeout. Sets the amount of time the computer waits before using the default boot partition.

  • Delete. Deletes an operating system entry. The entry cannot be easily re-created, so delete an entry only if absolutely necessary.

Note

On a computer with a single operating system, the Set As Default and Delete buttons are unavailable because there is no other operating system to switch to or from. Similarly, when you select the default operating system, you can’t select Set As Default, and when you select the current operating system, you can’t select Delete.

You can also set the following boot options:

  • Safe Boot. Start the computer in Safe mode with additional flags for Minimal, Network, and Alternate Shell minimal boots, as well as the Active Directory Repair state (DsRepair). After you successfully start a system in Safe mode, you can modify system settings to resolve configuration problems.

  • No GUI Boot. Starts the computer to the Windows prompt and doesn’t load the graphical components of the operating system. Starting to the prompt is useful when you are having problems with the graphical components of Windows 8.1.

  • Boot Log. Turns on boot logging so that key startup events are written to a log.

  • Base Video. Forces the computer to use VGA display settings. Use this mode when you are trying to resolve display settings, such as when the display mode is set to a size that the monitor cannot display.

  • OS Boot Information. Starts the computer by using verbose output so that you can view the details of startup activities prior to the loading of Windows graphical components.

Any changes you make are stored as modified boot configuration data by the System Configuration utility. After you make changes and tap or click OK, you can restart the computer to apply the temporary changes. To go back to a normal startup after you’ve made and applied changes, you must select Normal Startup on the General tab and then tap or click OK. You must then reboot the system so that the normal settings are used.

If you tap or click the Advanced Options button on the Boot tab, you can set boot options for processors, maximum memory, PCI locking, and debugging by using the BOOT Advanced Options dialog box, shown in Figure 2-10. Use these options for troubleshooting. For example, if you suspect that a problem is related to multiple processors, you can specify 1 as the number of processors to use. If you suspect that a problem is due to memory beyond the first 4 gigabytes (GB), you can specify the maximum memory to use as 4,096 MB. After you are done troubleshooting, you should remove these options to restore normal operations.

Set advanced boot options for troubleshooting.
Figure 2-10. Set advanced boot options for troubleshooting.

On the Boot tab, to make any of the standard or advanced boot options you select permanent, select the Make All Boot Settings Permanent check box before tapping or clicking OK. In most cases, you won’t want troubleshooting or debugging options to be permanent, so be sure to clear these options first.

Enabling and disabling startup applications for troubleshooting

If you suspect that an application loaded at startup is causing problems with the system, you can diagnose this easily. Disable programs from starting automatically, and then reboot the system. If the problem is no longer present, you might have pinpointed the problem and could then try to remedy it by identifying and disabling the automatic startup of the program or programs causing issues.

To disable startup applications temporarily, follow these steps:

  1. Open the System Configuration utility by typing msconfig in the Everywhere Search box and then pressing Enter, or by tapping or clicking the related option on the Apps screen.

  2. On the General tab, ensure that Selective Startup is selected and then clear the Load Startup Items check box.

  3. Tap or click OK. You need to reboot the system to check the changes, so restart the computer. If the problem is no longer present, you’ve isolated the problem to the startup applications.

The Selective Startup check box is cleared automatically, so the next time that you start the computer, the startup applications will load. Next, you need to pinpoint the program causing the system problems by using Task Manager. You can open Task Manager by typing taskmgr in the Everywhere Search box or by pressing Ctrl+Alt +Delete. You also can press and hold or right-click in the lower-left corner of the Start screen or the desktop, and then tap or click Task Manager on the shortcut menu that is displayed.

The Startup tab in Task Manager lists each application configured for automatic startup. You can try disabling each application in turn and then restarting the computer to determine if that resolves the problem. To disable an application, tap or click it on the Startup tab, and then tap or click Disable. If you can’t identify a single application as the cause of the problem, the trouble might be with a Windows component, service, or device driver.

Caution

Disable only those programs that you’ve identified as potential problems, and do so only if you know how they are used by the operating system. If you don’t know what a program does, don’t disable it. Sometimes you can learn more about a startup program by following its command path and then examining its base installation folder.

Enabling and disabling services for troubleshooting

Just as applications that start automatically can cause problems on a system, so can services that start automatically. To help troubleshoot service problems, you can temporarily disable services by using the System Configuration utility, and then reboot to find out whether the problem goes away. If it does, you might have pinpointed the problem. You can then permanently disable the service or check with the service vendor to find out if an updated executable file is available for the service.

To temporarily disable services, follow these steps:

  1. Open the System Configuration utility by typing msconfig in the Everywhere Search box and then pressing Enter, or by tapping or clicking the related option on the Apps screen.

  2. Tap or click the Services tab. As shown in Figure 2-11, this tab displays a list of all services installed on the computer and includes the state of the service, such as Running or Stopped, and from where the service originated. To more easily find non-Microsoft services, select Hide All Microsoft Services.

    To troubleshoot problems with Windows services, use the options on the Services tab.
    Figure 2-11. To troubleshoot problems with Windows services, use the options on the Services tab.
  3. Clear the check box next to any service that you do not want to run at startup.

    Caution

    Disable only those services that you’ve identified as potential problems, and only if you know how they are used by the operating system. If you don’t know what a service does, don’t disable it. The Services tab of the System Configuration utility doesn’t provide additional information about services. You can learn the specific purpose of a service by using the Services utility, which is available in Computer Management. In the Services utility, select the service to view its description on the Extended tab, or double-tap or double-click the service to read its description on the General tab of the related properties dialog box.

  4. Tap or click OK. You need to reboot the system to check the changes, so if you are prompted to restart the system, tap or click Yes. Otherwise, reboot the system manually.

  5. Repeat this procedure as necessary to pinpoint the service causing the system problems. If you can’t identify a service as the cause of the problem, the trouble might be caused by a Windows component, a startup application, or a device driver.

Managing system properties

You use the System Properties dialog box to manage system properties. The following sections examine key areas of the operating system that can be configured by using the System Properties dialog box.

The Computer Name tab

The computer’s network identification can be displayed and modified on the Computer Name tab of the System Properties dialog box, shown in Figure 2-12. As the figure shows, the Computer Name tab displays the full computer name of the system and the domain or group membership. The full computer name is essentially the Domain Name System (DNS) name of the computer, which also identifies the computer’s place within an Active Directory hierarchy.

A quick way to open the System Properties dialog box is to press and hold or right-click the hidden button in the lower-left corner of Start or the desktop, tap or click System, and then tap or click the Change Settings link. Alternatively, you can enter sysdm.cpl and then press Enter.

The options on the Computer Name tab enable you to do the following:

  • Join a computer to a domain. Tap or click Network ID to start the Join A Domain Or Workgroup Wizard, which guides you through modifying network access information for the computer.

  • Change a computer’s name. Tap or click Change to change the computer’s name and the domain or group associated with the computer.

Use the Computer Name tab to display and configure system identification.
Figure 2-12. Use the Computer Name tab to display and configure system identification.

Real World

Before you try to join a computer to a domain, be sure that the IP address configuration, including the DNS settings, are correct for the network to which the computer is connected. For client computers to use the DNS, the computer must have an appropriate computer name and a properly configured primary DNS suffix. Rather than using names that are cute or arbitrary, you should decide on a naming scheme that is meaningful to both users and administrators. In DNS, the computer’s name serves as its host name, and the primary DNS suffix determines the domain to which it is assigned for name resolution purposes. Any unqualified host names that are used on a computer are resolved by using the primary DNS suffix. For example, if you are logged on to a computer with a primary DNS suffix of tech.cpandl.com and you ping CorpSvr28 from a command prompt, the computer directs the query to corpsvr28.tech.cpandl.com.

By default, the primary DNS suffix is the domain in which the computer is a member. You can change a computer’s primary DNS suffix if necessary. For example, if a computer’s primary DNS suffix is seattle.tech.cpandl.com, you might want the computer to use the primary DNS suffix of cpandl.com to simplify name resolution in this large DNS hierarchy. To change a computer’s primary DNS suffix, tap or click Change on the Computer Name tab, and then tap or click More. Enter the primary DNS suffix you want to use in the text box provided, and then close all open dialog boxes by tapping or clicking OK three times.

The Hardware tab

The Hardware tab in the System Properties dialog box provides access to Device Manager and Device Installation Settings.

Open the System Properties dialog box by pressing and holding or right-clicking the hidden button in the lower-left corner of the Start screen or the desktop, tapping or clicking System, and then tapping or clicking the Change Settings link. The main options you might want to work with on the Hardware tab are the device installation settings.

When you connect a new device, Windows 8.1 checks for drivers automatically by using Windows Update. If you don’t want a computer to check for drivers automatically, tap or click Device Installation Settings, and then select either Yes, Do This Automatically or No, Let Me Choose What To Do, and then tap or click Save Changes.

Note

The Device Manager button opens Device Manager in a Microsoft Management Console (MMC). Device Manager, also included in the Computer Management console as an MMC snap-in, is discussed in Chapter 8.

The Advanced tab: performance options

The Advanced tab in the System Properties dialog box provides access to controls for many of the key features of the Windows operating system, including application performance, virtual memory usage, user profiles, environment variables, and startup and recovery.

Performance options are a subset of the advanced configuration settings, which are configured by using the Performance Options dialog box. One way to access this dialog box is by completing the following steps:

  1. In Control Panel, tap or click System And Security, and then tap or click System.

  2. In the System console, tap or click Advanced System Settings in the left pane.

  3. To display the Performance Options dialog box, tap or click Settings in the Performance panel.

To open the Performance Options dialog box directly, in the Everywhere Search box, enter SystemPropertiesPerformance in the Everywhere Search box, and then press Enter.

Setting Windows performance

The Windows 8.1 interface has many graphics enhancements that can affect the overall performance, including visual effects for menus, toolbars, windows, and the taskbar. By using the Performance Options dialog box, you can fine-tune the way these graphics enhancements are used.

The Visual Effects tab is selected by default in the Performance Options dialog box, and you have the following options for controlling visual effects:

  • Let Windows Choose What’s Best For My Computer. Enables the operating system to choose the performance options based on the hardware configuration. For a newer computer, the effect of selecting this option will probably be identical to using the Adjust For Best Appearance option. The key distinction, however, is that this option is chosen by Windows based on the available hardware and its performance capabilities.

  • Adjust For Best Appearance. When you optimize Windows for best appearance, you enable all visual effects for all graphical interfaces. Menus and the taskbar use transitions and shadows. Screen fonts have smooth edges. List boxes have smooth scrolling. Folders use web views, and more.

  • Adjust For Best Performance. When you optimize Windows for best performance, you turn off the resource-intensive visual effects, such as slide transitions and smooth edges for fonts, while maintaining a basic set of visual effects.

  • Custom. You can customize the visual effects by selecting or clearing the visual effects options in the Performance Options dialog box. If you clear all options, Windows does not use visual effects.

When you have finished changing visual effects, tap or click Apply. Tap or click OK twice to close the open dialog boxes.

Setting application performance

Application performance is related to processor-scheduling caching options that you set for the Windows 8.1 system. Processor scheduling determines the responsiveness of applications that are running interactively (as opposed to background applications that might be running on the system as services). You control application performance by using the options on the Advanced tab of the Performance Options dialog box. Type SystemPropertiesPerformance in the Everywhere Search box and then press Enter to open this dialog box.

The Processor Scheduling panel on the Advanced tab of the Performance Options dialog box gives you the following options:

  • Programs. To give the active application the best response time and the greatest share of available resources, select Programs. Generally, you’ll want to use this option for all Windows 8.1 workstations.

  • Background Services. To give background applications a better response time than the active application, select Background Services. Generally, you’ll want to use this option for Windows 8.1 computers running as servers (meaning that they have server-like roles and are not being used as Windows 8.1 workstations). For example, a Windows 8.1 computer might be the print server for a department.

If you change the performance settings, tap or click Apply.

Configuring virtual memory

Virtual memory enables you to use disk space to extend the amount of available RAM on a system by writing RAM to disks through a process called paging. With paging, a set amount of RAM, such as 4,096 MB, is written to the disk as a paging file, where it can be accessed from the disk when needed in place of physical RAM.

An initial paging file is created automatically for the drive containing the operating system. By default, other drives don’t have paging files, so you must create these paging files if you want them. When you create a paging file, you set an initial size and a maximum size. A paging file is written to the volume as a file named Pagefile.sys.

Real World

Typically, Windows 8.1 allocates virtual memory in an amount at least as large as the total physical memory installed on the computer, to help ensure that paging files don’t become fragmented, which can result in poor system performance. If you want to manually manage virtual memory, you can reduce fragmentation by setting an initial page file size that is at least as large as the total physical memory. For computers with 4 GB or less of RAM, you should set the maximum size to at least twice the total physical memory. For computers with more than 4 GB of RAM, you should set the maximum size to at least 1.5 times the total physical memory (or the size recommended by the hardware manufacturer). This can help ensure that the paging file is consistent and can be written to contiguous file blocks (if possible, given the amount of space on the volume).

You can manually configure virtual memory by completing the following steps:

  1. Open the Performance Options dialog box. One way to do this is to enter SystemPropertiesPerformance in the Everywhere Search box, and then press Enter.

  2. On the Advanced tab, tap or click Change to display the Virtual Memory dialog box, shown in Figure 2-13. The following information is provided:

    • Drive [Volume Label] and Paging File Size (MB) Shows how virtual memory is currently configured on the system. Each volume is listed with its associated paging file (if any). The paging file range shows the initial and maximum size values set for the paging file, if applicable.

    • Total Paging File Size For All Drives. Provides a recommended size for virtual RAM on the system and tells you the amount currently allocated. If this is the first time you’re configuring virtual RAM, note that the recommended amount has already been given to the system drive (in most instances) and that this is indicated by the selection of the System Managed Size option.

  3. By default, Windows 8.1 manages the paging file size for all drives. If you want to manually configure virtual memory, clear the Automatically Manage Paging File Size For All Drives check box.

  4. In the Drive list box, select the volume with which you want to work.

    Virtual memory extends the amount of physical memory (RAM) on a system.
    Figure 2-13. Virtual memory extends the amount of physical memory (RAM) on a system.
  5. Select Custom Size, and then enter an initial size and a maximum size.

  6. Tap or click Set to save the changes.

  7. Repeat steps 4 through 6 for each volume you want to configure.

  8. Tap or click OK, and if prompted to overwrite an existing Pagefile.sys file, tap or click Yes.

  9. If you updated the settings for a paging file that is currently in use, you’ll get a prompt explaining that you need to restart the system for the changes to take effect. Tap or click OK.

  10. Tap or click OK twice to close the open dialog boxes. When you close the System utility, you’ll get a prompt stating that the changes will not be applied until you restart your computer.

You can have Windows 8.1 automatically manage virtual memory by following these steps:

  1. On the Advanced tab of the Performance Options dialog box, tap or click Change to display the Virtual Memory dialog box.

  2. Select the Automatically Manage Paging File Size For All Drives check box.

  3. Tap or click OK two times to close the open dialog boxes.

Tip

Clearing the page file on shutdown is recommended as a security best practice. You can clear the page file on shutdown by enabling the Shutdown: Clear Virtual Memory Pagefile option. You’ll find this Computer Configuration setting under Security SettingsLocal PoliciesSecurity Options.

Configuring Data Execution Prevention

Data Execution Prevention (DEP) is a memory protection technology. DEP tells the computer’s processor to mark all memory locations in an application as nonexecutable unless the location explicitly contains executable code. If code is executed from a memory page marked as nonexecutable, the processor can raise an exception and prevent the code from executing. This prevents malicious code, such as a virus, from inserting itself into most areas of memory because only specific areas of memory are marked as having executable code.

Note

The 32-bit versions of Windows support DEP as implemented by Advanced Micro Devices (AMD) processors that provide the No Execute (NX) page-protection processor feature. Such processors support the related instructions and must be running in Physical Address Extension (PAE) mode to support large memory configurations. The 64-bit versions of Windows also support the NX processor feature but do not need to use PAE to support large memory configurations.

To be compatible with DEP, applications must be able to explicitly mark memory with the Execute permission. Applications that cannot do this will not be compatible with the NX processor feature. If you are experiencing memory-related problems running applications, you should determine which applications are having problems and configure them as exceptions rather than completely disabling execution protection. In this way, you still get the benefits of memory protection and can selectively disable memory protection for programs that aren’t running properly with the NX processor feature.

Execution protection is applied to both user-mode and kernel-mode programs. A user-mode execution protection exception results in a STATUS_ACCESS_VIOLATION exception. In most processes, this exception will be an unhandled exception and will result in the termination of the process. This is the behavior you want because most programs violating these rules, such as a virus or worm, will be malicious in nature.

Execution protection for kernel-mode device drivers, unlike protection for applications, cannot be selectively disabled or enabled. Furthermore, on compliant 32-bit systems, execution protection is applied by default to the memory stack. On compliant 64-bit systems, execution protection is applied by default to the memory stack, the paged pool, and the session pool. A kernel-mode execution protection access violation for a device driver results in an ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY exception.

You can determine whether a computer supports DEP by using the System utility. If a computer supports DEP, you can also configure it by completing the following steps:

  1. Open the Performance Options dialog box. One way to do this is to enter SystemPropertiesPerformance in the Everywhere Search box, and then press Enter.

  2. The text at the bottom of the Data Execution Prevention tab specifies whether the computer supports execution protection.

  3. If a computer supports execution protection and is configured appropriately, you can configure DEP by using the following options:

    • Turn On DEP For Essential Windows Programs And Services Only. Enables DEP only for operating system services, programs, and components. This is the default setting and is recommended for computers that support execution protection and are configured appropriately.

    • Turn On DEP For All Programs Except Those I Select. Configures DEP and allows for exceptions. Select this option, and then tap or click Add to specify programs that should run without execution protection. In this way, execution protection will work for all programs except those you have listed.

  4. Tap or click OK.

The Advanced tab: environment variables

System and user environment variables are configured by means of the Environment Variables dialog box, as shown in Figure 2-14. One way to access this dialog box is by completing the following steps:

  1. In Control Panel, tap or click System And Security, and then tap or click System.

  2. In the System console, tap or click Advanced System Settings in the left pane.

  3. On the Advanced tab in the System Properties dialog box, tap or click Environment Variables.

The Environment Variables dialog box lets you configure system and user environment variables.
Figure 2-14. The Environment Variables dialog box lets you configure system and user environment variables.

Note

If you enter SystemPropertiesAdvanced in the Everywhere Search box and then press Enter, you open the System Properties dialog box to the Advanced tab and can then click Environment Variables.

Creating an environment variable

When you create or modify system environment variables, the changes take effect when you restart the computer. When you create or modify user environment variables, the changes take effect the next time the user logs on to the system.

You can create an environment variable by completing the following steps:

  1. Open the Environment Variables dialog box, as discussed previously.

  2. Tap or click New under User Variables or under System Variables, whichever is appropriate. This opens the New User Variable dialog box or the New System Variable dialog box, respectively.

  3. In the Variable Name text box, enter the variable name. In the Variable Value text box, enter the variable value. Tap or click OK.

Real World

The command path for executable files is managed through the PATH variable. You can edit this variable to update the command path, as discussed in the section Managing the command path in Chapter 7.

More Info

User profiles contain global user settings and configuration information. They are created the first time that a user logs on to a local computer or domain and are different for local and domain accounts. A user’s profile maintains the desktop environment so that it is the same each time the user logs on. You’ll find an extensive discussion on user profiles in Chapter 10, in Windows Server 2012 R2 Pocket Consultant: Essentials & Configuration (Microsoft Press, 2013).

You can access Group Policy and use a preference item to create an environment variable on computers throughout a domain by completing the following steps:

  1. Open a Group Policy Object for editing in the Group Policy Management Editor. To configure preferences for computers, expand Computer ConfigurationPreferencesWindows Settings, and then select Environment. To configure preferences for users, expand User ConfigurationPreferencesWindows Settings, and then select Environment.

  2. Press and hold or right-click the Environment node, point to New, and then select Environment Variable. This opens the New Environment Properties dialog box.

  3. From the Action list, select Create. Next, select User Variable to create a user variable or System Variable to create a system variable.

  4. In the Name text box, enter the variable name. In the Value text box, enter the variable value.

  5. Use the options on the Common tab to control how the preference is applied. In most cases, you’ll want to create the new variable only once. If so, select Apply Once And Do Not Reapply.

  6. Tap or click OK. The next time policy is refreshed, the preference item will be applied as appropriate for the Group Policy object in which you defined the preference item.

Editing an environment variable

You can edit an environment variable by completing the following steps:

  1. Open the Environment Variables dialog box, as discussed previously.

  2. Select the variable in the User Variables or System Variables list box.

  3. Tap or click Edit under User Variables or under System Variables, whichever is appropriate. The Edit User Variable dialog box or the Edit System Variable dialog box opens.

  4. Enter a new value in the Variable Value text box, and then tap or click OK.

You can access Group Policy and use a preference item to update an environment variable on computers throughout a domain by completing the following steps:

  1. Open a Group Policy Object for editing in the Group Policy Management Editor. To edit preferences for computers, expand Computer ConfigurationPreferencesWindows Settings, and then select Environment. To edit preferences for users, expand User ConfigurationPreferencesWindows Settings, and then select Environment.

  2. Press and hold or right-click the Environment node, point to New, and then select Environment Variable. This opens the New Environment Properties dialog box.

  3. From the Action list, select Update to update the variable, or select Replace to delete and then re-create the variable. Next, select User Variable to create a user variable or System Variable to create a system variable.

  4. In the Name text box, enter the name of the variable to update. In the Value text box, enter the variable value.

  5. Use the options on the Common tab to control how the preference is applied. In most cases, you’ll want to create the new variable only once. If so, select Apply Once And Do Not Reapply.

  6. Tap or click OK. The next time policy is refreshed, the preference item will be applied as appropriate for the Group Policy Object in which you defined the preference item.

Deleting an environment variable

When you are working with the Environment Variables dialog box, you can delete an environment variable by selecting it and tapping or clicking Delete. To delete an environment variable on computers throughout a domain by using Group Policy, complete the following steps:

  1. Open a Group Policy Object for editing in the Group Policy Management Editor. To configure preferences for computers, expand Computer ConfigurationPreferencesWindows Settings, and then select Environment. To configure preferences for users, expand User ConfigurationPreferencesWindows Settings, and then select Environment.

  2. Do one of the following:

    • If a preference item already exists for the variable, double-tap or double-click the variable name to open the related Properties dialog box. Select Delete in the Action list. On the Common tab, set the appropriate options, such as Apply Once And Do Not Reapply, and then tap or click OK.

    • If a preference item doesn’t already exist for a variable that you want to remove from computers, you need to create a preference item by using the techniques discussed earlier in this chapter under Creating an environment variable. Be sure to select Delete in the Action list and select the appropriate options on the Common tab.

The Advanced tab: startup and recovery options

System startup and recovery properties are configured by means of the Startup And Recovery dialog box, shown in Figure 2-15. One way to access this dialog box is by completing the following steps:

  1. In Control Panel, tap or click System And Security, and then tap or click System.

  2. In the System console, tap or click Change Settings, or tap or click Advanced System Settings in the left pane.

  3. To display the Startup And Recovery dialog box, tap or click the Advanced tab in the System Properties dialog box, and then tap or click Settings in the Startup And Recovery panel.

Note

If you enter SystemPropertiesAdvanced in the Everywhere Search box and then press Enter, you will open the System Properties dialog box to the Advanced tab and can then click Settings in the Startup And Recovery panel.

The Startup And Recovery dialog box lets you configure system startup and recovery procedures.
Figure 2-15. The Startup And Recovery dialog box lets you configure system startup and recovery procedures.

Setting startup options

The System Startup area of the Startup And Recovery dialog box controls system startup. In a computer with multiple bootable operating systems, to set the default operating system, select one of the operating systems listed under Default Operating System. The startup options change the configuration settings used by the Windows Boot Manager.

At startup of a computer with multiple bootable operating systems, Windows 8.1 displays the startup configuration menu for 30 seconds by default. You can change this by taking either of the following actions:

  • Start up immediately to the default operating system by clearing the Time To Display List Of Operating Systems check box.

  • Display the available options for a specific amount of time by ensuring that the Time To Display List Of Operating Systems check box is selected, and then setting a time delay in seconds.

Generally, on most systems, you’ll want to use a value of 3 to 5 seconds. This period is long enough for a user to make a selection, yet short enough to expedite the system startup process.

When the system is in a recovery mode and booting, a list of recovery options might be displayed. As with the standard startup options, you can configure recovery startup options in one of two ways. You can set the computer to boot immediately using the default recovery option by clearing the Time To Display Recovery Options When Needed check box, or you can display the available options for a specific amount of time by selecting the Time To Display Recovery Options When Needed check box, and then setting a time delay in seconds.

Setting recovery options

The System Failure and Write Debugging Information areas of the Startup And Recovery dialog box control system recovery. Recovery options enable administrators to control precisely what happens when the system encounters a fatal system error (also known as a Stop error). The available options for the System Failure area are as follows:

  • Write An Event To The System Log. Select this option to log the error in the system log, which allows administrators to review the error later by using Event Viewer.

  • Automatically Restart. Select this option to have the system attempt to reboot when a fatal system error occurs.

Note

Configuring automatic reboots isn’t always a good approach. Sometimes you might want the system to halt rather than reboot to ensure that the system gets proper attention. Otherwise, you would know that the system rebooted only when you viewed the system logs or if you happened to be in front of the system’s monitor when it rebooted.

The Write Debugging Information list enables you to choose the type of debugging information that you want to write to a dump file. The dump file can in turn be used to diagnose system failures. The options are as follows:

  • None. Use this option if you don’t want to write debugging information.

  • Small Memory Dump. Use this option to dump the physical memory segment in which the error occurred. This dump is 256 kilobytes (KB) in size.

  • Kernel Memory Dump. Use this option to dump the physical memory area being used by the Windows kernel. The dump file size depends on the size of the Windows kernel.

  • Complete Memory Dump. Use this option to dump all physical memory. The dump file size depends on the amount of physical memory being used, up to a maximum file size equal to the total physical RAM on the server.

  • Automatic Memory Dump. Use this option to let Windows determine which type of memory dump is best and create the dump file accordingly.

If you elect to write a dump file, you must also specify a location for it. The default dump files are %SystemRoot%Minidump for small memory dumps and %SystemRoot%Memory.dmp for all other memory dumps. You’ll also usually want to select Overwrite Any Existing File to ensure that any existing dump files are overwritten if a new Stop error occurs.

Best Practices

The dump file can be created only if the system is properly configured. The system drive must have a sufficiently large memory-paging file (as set for virtual memory on the Advanced tab), and the drive where the dump file is written must also have sufficient free space. With a kernel-only dump, you must have 35 to 50 percent of the amount of RAM available for the dump file. For example, one of my systems has 16 GB of RAM, so about 6–8 GB of free space must be available to correctly create a kernel-only dump of debugging information.

The System Protection tab

The System Protection tab in the System Properties dialog box, shown in Figure 2-16, provides options for managing the configuration of System Restore. Access this tab by completing the following steps:

  1. In Control Panel, tap or click System And Security, and then tap or click System.

  2. In the System console, tap or click Change Settings, or tap or click Advanced System Settings in the left pane.

  3. In the System Properties dialog box, tap or click the System Protection tab.

System Restore manages restore points on a per-drive basis.
Figure 2-16. System Restore manages restore points on a per-drive basis.

You also can access the System Protection tab in the System Properties dialog box by typing SystemPropertiesProtection in the Everywhere Search box and then pressing Enter.

Unlike in Windows 7, System Restore no longer includes Previous Versions as a subcomponent. With Windows 8.1, you create previous versions of personal files by using File History backups. The sections that follow discuss techniques for working with and configuring System Restore. Chapter 10 discusses using restore points to recover a computer and file history backups.

Real World

File servers running Windows Server 2012 have a Previous Versions feature. Previous versions come from shadow copies and are created for folders that are shared on the network. In File Explorer, the Properties dialog box for a shared folder that has been mapped as a network drive will have a Previous Versions tab. Use the options on this tab to restore previous versions of files in a folder shared by a file server.

Understanding system protection

With System Restore enabled, a computer creates periodic snapshots of the system configuration. These snapshots are called restore points. System settings tracked include Windows settings and lists of programs that have been installed. If the computer has problems starting or isn’t working properly because of a system configuration change, you can use a restore point to restore the system configuration to the point at which the snapshot was made. For example, suppose that your system is working fine, and then you install a new service pack release for Office. Afterward, the computer generates errors and Office applications won’t run. You try to uninstall the update, but that doesn’t work, so you decide to run System Restore. By using System Restore, you can restore the system by using a snapshot taken prior to the update.

Note

System Restore can provide several different types of restore points. One type, System Checkpoint, is scheduled by the operating system and occurs at regular intervals. Another type of snapshot, Installation Restore Point, is created automatically based on events that are triggered by the operating system when you install applications. Other snapshots, known as Manual Restore Points, are created by users. You should recommend that users create Manual Restore Points prior to performing an operation that might cause problems on the system.

System Restore manages restore points on a per-drive basis. Each drive with critical applications and system files should be monitored for configuration changes. By default, System Restore is enabled only for the system drive. You can modify the System Restore configuration by turning on monitoring of other drives. If a drive isn’t configured for System Restore monitoring, configuration changes are not tracked, and the disk cannot be recovered if problems occur.

Note

Protection points are created daily for all drives being monitored by System Restore. Previous versions are not saved as part of a volume’s automatically or manually created protection points. Use File History backups instead.

Configuring System Restore

You control how System Restore works by using the System Protection tab of the System Properties dialog box. The system process responsible for monitoring configuration and application changes is the System Restore Service. This service is configured for automatic startup and runs under the LocalSystem account. System Restore won’t work properly if this service isn’t running or configured appropriately.

System Restore saves system checkpoint information for all monitored drives and requires at least 300 MB of disk space on the system volume to save restore points. System Restore reserves additional space for restore points as necessary, up to 100 percent of the total disk capacity, but this additional space is always available for user and application storage. System Restore frees up additional space for you as necessary. If System Restore runs out of available space, the operating system overwrites previously created restore points.

You can configure the amount of disk space used by System Restore. By default, System Restore reserves at least 1 percent of the total disk capacity for saving restore points. For example, on a hard disk with a total capacity of 930 GB, System Restore would reserve 9.3 GB of disk space by default.

Complete the following steps to configure System Restore for each drive:

  1. In Control Panel, tap or click System And Security, and then tap or click System.

  2. In the System console, tap or click System Protection in the left pane.

  3. To configure System Restore for a volume, select the volume in the Protection Settings list, and then tap or click Configure. This displays the System Protection For dialog box, shown in Figure 2-17.

    Configure System Restore on a per-drive basis.
    Figure 2-17. Configure System Restore on a per-drive basis.
  4. Choose one of the following options:

    • Turn On System Protection. Choose this option to keep copies of system settings. This option is recommended for the system volume to ensure that you can restore the computer.

    • Disable System Protection. Choose this option to turn off System Restore. This option is not recommended for the system volume because you will not be able to restore the computer after configuration changes.

  5. If you’ve enabled system protection, you can use the Disk Space Usage slider to adjust the maximum disk space that System Restore can use. If the maximum size is reached, System Restore deletes older restore points to make room for new ones.

  6. Tap or click OK. (If you’ve turned off system protection, Windows removes all saved system settings, and you must confirm that you want to do this by tapping or clicking Yes. When Windows finishes removing all the restore point data, tap or click Close.)

If you are using System Restore to protect a computer and are absolutely certain that the system is in a stable state, you can remove all saved system settings to recover space on disks or to ensure that users don’t apply a restore point that you don’t want them to use. To do this, follow these steps:

  1. In Control Panel, tap or click System And Security, and then tap or click System.

  2. In the System console, tap or click System Protection in the left pane.

  3. In the Protection Settings list, select the volume with which you want to work, and then tap or click Configure.

  4. Tap or click Delete, and then tap or click Continue to confirm that you really want to delete all saved system settings. Repeat steps 3 and 4 for other volumes, as appropriate.

  5. When Windows finishes removing all the restore point data, tap or click Close.

The Remote tab

The Remote tab in the System Properties dialog box controls Remote Assistance invitations and Remote Desktop connections. These options are discussed in Chapter 6.

Configuring power management settings

Power management settings control the behavior of a computer in different power use situations, such as when it is plugged in or running on a battery. Although all computers should be configured with power management settings to save energy, power management settings on laptops help to balance performance against energy usage. In some cases, you’ll want to reduce laptop responsiveness and overall performance to increase the battery life, enabling the laptop user to run the laptop on battery for longer periods of time. In other cases, you might want to ensure moderate performance and a moderate battery life, or you might want to ensure maximum performance regardless of how this affects battery life.

The core aspects of power management are managed by using power plans, which are collections of power management settings that control power usage and consumption. A computer can have multiple power plans, but only one can be active at a time. In addition to power plans, most computers have preset behaviors for when the power button is pressed and for when the sleep button is pressed, and laptops have a default action for when you close the laptop’s lid. Typically, closing a laptop’s lid puts it into sleep mode, pressing and holding the power button shuts down a computer, and pressing the sleep button puts a computer into sleep mode. Through system-wide settings for power options, you can customize the power button and password-protection-on-wakeup behavior to meet the needs of individual users or groups of users.

Managing power options from the command line

Windows 8.1 includes the Power Configuration (Powercfg.exe) utility for managing power options from the command line. You can view a list of parameters for this utility by typing powercfg /? at a command prompt. The parameters you’ll work with most often include the following:

  • -a. Lists the available sleep states on the computer and the reasons why a particular sleep state is not supported.

  • -d [guid]. Deletes the power plan specified by the GUID.

  • -devicequery all_devices_verbose. Lists detailed power support information for all devices on the computer. Be sure to redirect the output to a file, because this list is very long and detailed.

  • -energy. Checks the system for common configuration, device, and battery problems and then generates an HTML report in the current working directory.

  • -h. Switches the hibernate feature on or off.

  • -l. Lists the power plans configured on a computer by name and GUID.

  • -q [guid]. Lists the contents of the power plan specified by the GUID. If you don’t provide a GUID, the contents of the active power plan are listed.

  • -requests. Displays all power requests made by device drivers. If there are pending requests for the display, these requests would prevent the computer from automatically powering off the displays. If there are pending requests for any device including the display, these requests would prevent the computer from automatically entering a low-power sleep state.

  • -s [guid]. Makes the power plan specified by the GUID the active power plan.

  • -x [setting] [value]. Sets the specified value for the specified setting in the active power plan.

Note

By default, Windows 8.1 computers use hybrid sleep instead of hibernate. Hibernate should not be configured without first determining compatibility. Note also that the Power Configuration utility (Powercfg) accepts either a hyphen (-) or a slash (/) for commands. I prefer to use a hyphen because of its location on the keyboard.

The following is a sample listing returned by typing powercfg -l at a command prompt.

Existing Power Schemes (* Active)
-----------------------------------
Power Scheme GUID: 381b4222-f694-41f0-9685-ff5bb260df2e (Balanced)
Power Scheme GUID: 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c (High performance)
Power Scheme GUID: a1841308-3541-4fab-bc81-f71556f20b4a (Power saver)
Power Scheme GUID: c1d97820-3148-42a9-a587-75d618a9bb2b (Graphics Dept) *

The active plan is marked with an asterisk. From this listing, you can determine that this computer has four power plans and the active power plan is the Graphics Dept plan.

If you want to configure power plans or modify power settings by using Powercfg, you need to do so by using an elevated command prompt. When a parameter requires a GUID, the easiest way to obtain this value is to enter powercfg -l at an elevated command prompt, and then copy the value for the appropriate power plan. For example, if you want to make the Balanced plan the default plan for the computer in the previous example, you would enter the following at an elevated command prompt.

powercfg -s 381b4222-f694-41f0-9685-ff5bb260df2e

You determine the power modes that a computer supports by typing powercfg -a at a command prompt. Powercfg will list exactly what modes are and aren’t supported, such as the following.

The following sleep states are available on this system:
Standby (S1 S3)
Hibernate
Hybrid Sleep
The following sleep states are not available on this system:
Standby (S2)
The system firmware does not support this standby state.

Real World

Windows 8.1 supports a connected-standby mode in which the display is turned off but the device is powered on. In this power state, the device is technically on; however, the Desktop Activity Monitor suppresses desktop app execution, making the mode similar to the S3 sleep state. The Desktop Activity Monitor does this by suspending or throttling desktop software processes, which in turn minimizes resource usage and extends battery life. Software that doesn’t support connected standby might cause the device to wake.

If a computer has problems entering sleep or hibernate mode, you can use powercfg -a to possibly determine what is causing the problem. If the firmware doesn’t support a particular mode, you might in some (limited) cases be able to update the firmware to gain support for a particular mode. If a device that doesn’t support a particular mode is causing a problem, you might be able to remove the device and replace it with a compliant device.

Any time you want to evaluate a computer’s power configuration and device compatibility, you can generate a Power Efficiency Diagnostics report by typing powercfg -energy at a command prompt. When you run powercfg -energy, the report is generated as an HTML document called Energy-Report.html. In the report, you’ll find the results of power management compliance for devices. Any device that doesn’t support power management appropriately will be listed, along with the error details. For example, if a USB device doesn’t properly enter the Suspend state, you’ll get the detailed information about the errors encountered and the device configuration. If a power management capability has been disabled because of a compatibility issue, you’ll find this in the report, too. For example, if the PCI Express Active-State Power Management feature isn’t supported on the hardware and the feature has therefore been disabled, you’ll find this listed in the report. Warnings and additional information about devices and compatibility are also provided, including details on supported sleep states and processor power management capabilities.

Real World

For laptops, important information is provided on battery charging and battery life. If a battery is nearing or at the end of its useful life, you’ll be able to tell this because the battery life is limited and the battery details will show that the battery isn’t holding a charge as it should. You’ll then know that you need to replace the laptop’s battery.

To dig even deeper into power management issues, you can get comprehensive power support details for every device on the computer by entering the following command.

powercfg -devicequery all_devices_verbose > power.txt

Power.txt is the name of the file in the current working directory in which the power information will be saved.

When you’ve configured Windows PowerShell for remote access, you can easily execute Powercfg on multiple remote computers. To do this, enter the name of each remote computer to check on a separate line in a file called Computers.txt, and then save this file. Next, open an elevated administrator Windows PowerShell prompt and enter the following commands.

$comp = get-content c:computers.txt
$s = new-pssession -computername $comp
invoke-command -session $s { powercfg.exe -energy }

Here, C:Computers.txt is the path to the Computers.txt file. Update this path as appropriate for the location in which you saved the file. On each computer, an Energy-Report.html file will be created in the default directory for the user account used to access the computer. If you would rather not have to retrieve the HTML document from each computer, you can write the report to a share and base the report name on the computer name, as shown in the following example.

$comp = get-content c:computers.txt
$s = new-pssession -computername $comp
invoke-command -session $s { powercfg.exe -energy -output
"\fileserver46data$env:computername.html"}

Here, you write the report to the \fileserver46data share and name the file by using the value of the ComputerName environment variable. Note that when you work with Windows PowerShell and are referencing commands with executable files, you must specify the .exe file extension with the program name.

Working with power plans

On mobile computing devices, the notification area of the taskbar includes a Power icon. Tapping or clicking this icon shows the battery state and the power plan that you are using. Tapping or clicking either of the links provided in the notification status dialog box opens the Power Options page in Control Panel. Out of the box, most configurations of Windows 8.1 have three preferred power plans:

  • Balanced. A power usage plan that balances energy consumption and system performance. The processor speeds up when more resources are used and slows down when less are needed. This is the default power plan. Use this plan for users who work with a wide variety of applications, including those that are moderately graphics-intensive, such as Microsoft PowerPoint, and those that are not graphics-intensive, such as Microsoft Word and Outlook.

  • High Performance. A high-power usage plan that optimizes the computer for performance at a direct cost to battery life. This plan ensures that you always have enough power for using graphics-intensive programs or playing multimedia games. Use this plan when performance is essential and users work primarily with graphics-intensive applications or applications that perform complex arithmetic calculations. Note that you might have to tap or click Show Additional Plans to view this power plan.

  • Power Saver. A low-power usage plan designed to reduce power consumption. This plan slows down the processor to maximize the battery life. Use this plan for users who work primarily with non-graphics-intensive applications, such as Word and Outlook.

Power plan settings are divided into two general categories: basic and advanced. Basic power settings control when a computer dims or turns off its display, as well as when the computer enters sleep mode. It’s important to note that mobile computing devices have On Battery and Plugged In settings that can be configured independent of each other. For example, you might want a computer’s display to dim after 2 minutes of inactivity when on battery or after 5 minutes of inactivity when plugged in.

Advanced power settings determine precisely whether and when power management components on a computer are shut down and how those components are configured for performance. The advanced power settings available depend on the computer’s configuration and include the following:

  • BatteryCritical Battery Action. Specifies the action to take when the battery reaches a critical level. You can set this option to Sleep, Hibernate, or Shut Down.

  • BatteryCritical Battery Level. Determines the percentage of battery remaining that initiates the critical battery action. Typically, the default value is 5 percent, meaning that the computer will enter critical power mode when there is 5 percent of battery power remaining. Although you can set any percentage, a critical level of 3 to 5 percent is often best.

  • BatteryReserve Battery Level. Determines the percentage of battery remaining that initiates reserve power mode. Typically, the default value is 7 percent, meaning that the computer will enter reserve power mode when 7 percent of battery power is remaining. Although you can set any percentage, a reserve level of 5 to 18 percent is often best.

  • Desktop Background SettingsSlide Show. Determines whether the slide show feature for the desktop background is available or paused. The default setting is Available. If you set this option to Paused, background slide shows on the desktop will be disabled.

  • DisplayTurn Off Display After. Determines whether and when a computer’s display is turned off to conserve power. Use a setting of Never to disable this feature. Use a specific value in minutes to specify how long the computer must be inactive before the display is turned off.

  • DisplayDim Display After. Determines the length of time before the display dims when the computer is inactive. Use a specific value in minutes to determine how long the computer must be inactive before the display is dimmed.

  • DisplayDimmed Display Brightness. Specifies the brightness level to use when the display is dimmed. Use a specific value as a percentage of maximum brightness.

  • DisplayEnable Adaptive Brightness. Monitors ambient light sensors to detect changes in ambient light and adjust the display brightness accordingly.

  • Hard DiskTurn Off Hard Disk After. Determines whether and when a computer’s hard disk is turned off to conserve power. Use a setting of Never to disable turning off the hard disk. Use a specific value in minutes to determine how long the computer must be inactive before the hard disk is turned off. Windows 8.1 provides a combo box for setting numeric values. Tapping or clicking and holding the up or down arrow enables you to rapidly scroll through values. If you scroll down from 1, the next value is Never. You can also enter a value. If you enter a value of 0, this is interpreted as Never.

  • Multimedia SettingsWhen Playing VideoDetermines the power optimization mode used when playing video. If you set this option to Optimize Video Quality, the computer will use the best playback quality possible for video. If you set this option to Balanced, the computer will use a balanced approach, adjusting playback quality to some degree to save power. If you set this option to Optimize Power Savings, the computer will actively adjust the playback quality to save power.

  • Multimedia SettingsWhen Sharing Media. Determines what the computer does when a device or another computer plays media from the computer. If you set this option to Allow The Computer To Enter Away Mode, the computer will not enter sleep mode when sharing media with other devices or computers. If you set this option to Allow The Computer To Sleep, the computer can enter sleep mode after an appropriate period of inactivity regardless of whether media is being shared with other computers or devices. If you set this option to Prevent Idling To Sleep, the computer will enter sleep mode when sharing media with other devices or computers only if a user puts the computer in sleep mode.

  • PCI ExpressLink State Power Management. Determines the power saving mode to use with PCI Express devices connected to the computer. You can set this option to Off, Moderate Power Savings, or Maximum Power Savings.

  • Power Buttons And LidLid Closed Button Action. Specifies the action to take when someone closes the lid on a mobile computer. You can set this option to Do Nothing, Sleep, Hibernate, or Shut Down.

  • Power Buttons And LidPower Button Action. Specifies the action to take when someone pushes and holds the computer’s power button. You can set this option to Do Nothing, Sleep, Hibernate, or Shut Down.

  • Power Buttons And LidSleep Button Action. Sets the default action for the sleep button. Use this setting to override the computer’s default action. You can set this option to Do Nothing, Sleep, or Hibernate. You cannot, however, use an option that is not supported by the computer.

  • Processor Power ManagementMaximum Processor State. Sets a maximum or peak performance state for the computer’s processor. To save power and reduce energy consumption, lower the permitted maximum performance state. But you lower the performance state at a direct cost to responsiveness and computational speed. Although reducing the maximum processing power to 50 percent or less can cause a significant reduction in performance and responsiveness, it can also provide a significant power savings.

  • Processor Power ManagementMinimum Processor State. Sets a minimum performance state for the computer’s processor. To save power and reduce energy consumption, lower the permitted minimum performance state—but you lower the performance state at a direct cost to responsiveness and computational speed. For example, a value of 5 percent would lengthen the time required to respond to requests and process data while offering substantial power savings. A value of 50 percent helps to balance responsiveness and processing performance while offering a moderate power savings. A value of 100 percent would maximize responsiveness and processing performance while offering no power savings.

  • Processor Power ManagementSystem Cooling Policy. Determines whether the operating system increases the fan speed before slowing the processor. If you set this option to Passive, this feature is limited, and the processor might run hotter than normal. If you set this option to Active, this feature is enabled to help cool the processor.

  • PlanNameRequire A Password On Wakeup. Determines whether a password is required when a computer wakes from sleep. You can set this option to Yes or No. With domain computers, this option is set to Yes and can be controlled only through Group Policy.

  • SleepAllow Hybrid Sleep. Specifies whether the computer uses Windows 8.1 sleep mode rather than the sleep mode used in earlier versions of Windows. You can set this value to On or Off. Hybrid sleep mode puts the computer in a low-power consumption state until the user resumes using the computer. When running on battery, laptops and tablets continue to use battery power in the sleep state, but at a very low rate. If the battery runs low on power while the computer is in the sleep state, the current working environment is saved to the hard disk, and then the computer is shut down completely.

  • SleepAllow Wake Timers. Determines whether timed events should be allowed to wake the computer from a sleep state. If you set this option to Disable, timed events won’t wake the computer. If you set this option to Enable, timed events can wake the computer.

  • SleepHibernate After. Determines whether and when a computer hibernates to conserve power. When a computer goes into hibernation, a snapshot of the user workspace and the current operating environment is taken by writing the current memory to disk. When a user turns the computer back on, reading the memory from disk restores the user workspace and operating environment. In Windows 8.1, this setting isn’t normally used because the standard configuration is to sleep after a period of inactivity. Use a setting of Never to disable this feature. Use a specific value in minutes to determine how long the computer must be inactive before the computer hibernates.

  • SleepSleep After. Determines whether and when a computer enters a sleep state to conserve power. Use a setting of Never to disable this feature. Use a specific value in minutes to determine how long the computer must be inactive before the computer enters a sleep state.

  • USB SettingsUSB Selective Suspend SettingDetermines whether the USB selective suspend feature is available. If you set this option to Disabled, selective suspend will not be used with USB devices. If you set this option to Enabled, selective suspend can be used with USB devices.

  • Wireless Adapter SettingsPower Saving Mode. Specifies the power saving mode to use with any wireless adapters connected to the computer. You can set this option to Maximum Performance, Low Power Saving, Medium Power Saving, or Maximum Power Saving.

As you can tell, the advanced power settings control every facet of power management. The differences in the advanced settings are what really set the power plans apart from each other. For example, whereas the High Performance plan ensures performance by allowing the computer’s processor to always run at 100 percent power consumption, the Power Saver and the Balanced plans reduce energy consumption by configuring the processor to use a minimum power consumption rate of 5 percent and a maximum rate of 100 percent.

When configuring power plans, it’s important to allow components to turn off after periods of inactivity. Turning off components separately enables a computer to progressively go into sleep mode. When a computer is fully in sleep mode, all power-manageable components are switched off so that the computer uses less power. When the computer is brought out of sleep mode, the components, such as the monitor and hard disks, are turned back on, restoring the user workspace. You should configure sleep mode so that when a laptop is running on batteries, it goes into power conservation mode when the user is away from the laptop for a relatively short period of time, such as 20 or 30 minutes.

Because a computer can have multiple power plans, each plan can be optimized for the way a laptop is used at a particular time. You can configure multiple power plans for different situations. At home or in the office, laptops might need different power management configurations than they do when users are giving presentations. In one case, you might want to configure the laptop to quickly conserve energy when running on batteries. In another case, you might want to ensure that the laptop never turns off its hard disk or wireless adapters.

Selecting and optimizing power plans

Although computers can have multiple power plans, only one plan can be active at a time. To select or optimize a power plan, follow these steps:

  1. In Control Panel, tap or click System And Security, and then tap or click Power Options.

  2. As shown in Figure 2-18, you can specify the power plan to use by selecting it in the plans list.

    Choose a power plan.
    Figure 2-18. Choose a power plan.
  3. Tap or click Change Plan Settings for the plan with which you want to work. This displays the Edit Plan Settings page, shown in Figure 2-19. Note that mobile computing devices have separate On Battery and Plugged In settings.

    Configure power plan settings.
    Figure 2-19. Configure power plan settings.
  4. For a mobile computing device with a dimmable display, use the Dim The Display list to specify whether and when the computer’s display is dimmed. Choose Never to disable this feature.

  5. Use the Turn Off The Display list to specify whether or when the computer’s display automatically turns off. Choose Never to disable this feature.

  6. Use the Put The Computer To Sleep list to specify whether or when the computer automatically enters sleep mode. Choose Never to disable this feature.

  7. If you want to configure advanced options, tap or click Change Advanced Power Settings. Use the settings in the Power Options dialog box, shown in Figure 2-20, to configure the advanced settings. Tap or click OK to save any changes you’ve made.

  8. If you’ve made changes to Turn Off Display After or Sleep After, tap or click Apply to save these changes.

    Use the Power Options dialog box to configure advanced power options.
    Figure 2-20. Use the Power Options dialog box to configure advanced power options.

In Group Policy, you can use a preference item to optimize power plans on computers throughout a domain by completing the following steps:

  1. Open a Group Policy Object for editing in the Group Policy Management Editor. To configure preferences for computers, expand Computer ConfigurationPreferencesControl Panel Settings, and then select Power Options. To configure preferences for users, expand User ConfigurationPreferencesControl Panel Settings, and then select Power Options.

  2. Press and hold or right-click the Power Options node, point to New, and then tap or click Power Plan (At Least Windows 7). This opens the New Power Plan (At Least Windows 7) Properties dialog box.

  3. From the Action list, select Update to update the power plan’s settings or select Replace to delete the power plan and then re-create it exactly as you specify.

  4. From the selection list, choose the power plan with which you want to work, such as Balanced.

  5. To set the plan as the active plan, select the Set As The Active Power Plan check box.

  6. Use the options provided to configure the settings for the power plan.

  7. Tap or click OK. The next time policy is refreshed, the preference item will be applied as appropriate for the Group Policy Object in which you defined the preference item.

Creating power plans

In addition to the preferred power plans included with Windows 8.1, you can create power plans as needed. To create a power plan, follow these steps:

  1. In Control Panel, tap or click System And Security, and then tap or click Power Options.

  2. In the left pane, tap or click Create A Power Plan. This displays the Create A Power Plan page, as shown in Figure 2-21.

    Create a power plan.
    Figure 2-21. Create a power plan.
  3. To prepopulate the power plan settings, select the preferred power plan that is closest to the type of plan you want to create.

  4. In the Plan Name text box, enter a descriptive name for the plan, and then tap or click Next. This displays the Edit Plan Settings page.

  5. For laptops and tablets, use the Dim The Display list to specify whether and when the computer’s display is dimmed. Choose Never to disable this feature.

  6. Use the Turn Off The Display list to specify whether or when the computer’s display automatically turns off. Choose Never to disable this feature.

  7. Use the Put The Computer To Sleep list to specify whether or when the computer automatically enters sleep mode. Choose Never to disable this feature.

  8. Tap or click Create to create the plan. The Power Options page is displayed with updates to include the plan you created as a new preferred plan that replaces the plan you selected previously. You’ll find the original preferred plan under Show Additional Plans. Tap or click the Expand button on the right to display the original plan.

  9. The plan you created is selected by default. Tap or click Change Plan Settings for this plan to display the Edit Plan Settings page, and then tap or click Change Advanced Power Settings to display the Power Options dialog box.

  10. After you configure the advanced power options as appropriate, tap or click OK to save any changes you’ve made.

You can access Group Policy and use a preference item to create power plans on computers throughout a domain by completing the following steps:

  1. Open a Group Policy Object for editing in the Group Policy Management Editor. To configure preferences for computers, expand Computer ConfigurationPreferencesControl Panel Settings, and then select Power Options. To configure preferences for users, expand User ConfigurationPreferencesControl Panel Settings, and then select Power Options.

  2. Press and hold or right-click the Power Options node, point to New, and then select Power Plan (At Least Windows 7). This opens the New Power Plan Properties dialog box.

  3. From the Action list, select Create. To prepopulate the power plan settings, select the preferred power plan that is closest to the enter of plan you want to create. After you choose a plan, tap or click in the selection list and then enter the name of the new plan.

  4. From the selection list, choose the power plan you want to work with, such as Balanced.

  5. To set the plan as the active plan, select the Set As The Active Power Plan check box.

  6. Use the options provided to configure the settings for the power plan.

  7. Tap or click OK. The next time policy is refreshed, the preference item will be applied as appropriate for the Group Policy Object in which you defined the preference item.

Configuring systemwide power button and password protection on wakeup settings

fSystemwide settings for power options enable you to customize the way that the power button and password protection on wakeup works for all users who log on to the computer. You can configure the power button so that when it is pressed, the system shuts down, hibernates, or enters sleep mode. You can configure the computer so that when it wakes from sleep, a password is required to unlock the screen.

To set systemwide power settings, follow these steps:

  1. In Control Panel, tap or click System And Security, and then tap or click Power Options.

  2. In the left pane, tap or click Choose What The Power Buttons Do.

  3. Use the When I Press The Power Button list to specify whether the computer should do nothing, shut down, sleep, or hibernate when the power button is pressed. You cannot, however, use an option that is not supported by the computer.

  4. Use the When I Press The Sleep Button list to specify whether the computer should sleep, hibernate, or do nothing when the sleep button is pressed. Again, you cannot use an option that is not supported by the computer.

  5. If available, use the When I Close The Lid list to specify whether the computer should sleep, hibernate, or do nothing when the computer lid is closed. Again, you cannot use an option that is not supported by the computer.

  6. If the options for Password Protection On Wakeup and Shutdown Settings are not available, tap or click the Change Settings That Are Currently Unavailable link.

  7. Use the Require A Password option to specify that the computer requires a password on wakeup. It is a good idea to prompt for a password to help ensure the security of the system.

  8. Select Turn On Fast Startup to save system information to a file on the system disk when you shut down the computer. This file is then read during boot to enable faster startup. When you restart the computer, Fast Startup is not used.

  9. Select the power options that you want displayed when you click the power button.

  10. Tap or click Save Changes when you have finished making changes.

Managing power options in policy settings

In Group Policy, you’ll find policy settings for managing power options in the Administrative Templates for Computer Configuration under SystemPower Management. The following five subnodes are provided:

  • Button Settings. Includes policies for setting plugged-in and on-battery actions for the power button, the sleep button, and the laptop lid. This also controls the way the power button works on the Tasks screen, which is displayed by pressing Ctrl+Alt+Delete.

  • Hard Disk Settings. Includes policies for setting plugged-in and on-battery actions for turning off the hard disks.

  • Notification Settings. Includes policies for controlling notifications and actions for adverse battery conditions.

  • Sleep Settings. Includes policies for setting permitted device and application sleep states.

  • Video And Display Settings. Includes policies for setting plugged-in and on-battery actions for the display, the display brightness, and desktop background slide shows.

To apply a policy setting, enable the policy, and then select the appropriate action.

Through Group Policy, you can also specify an active power plan. How you work with Power Management policies depends on whether you want to use a default power plan, an updated preferred plan, or a custom power plan that you’ve created. If you want all computers that process a particular policy to use one of the Windows 8.1 default power plans, follow these steps:

  1. After you open the Group Policy Object that you want to work with for editing, expand Administrative Templates policies for Computer Configuration under SystemPower Management.

  2. Double-tap or double-click Select An Active Power Plan.

  3. Select Enabled, and then use the Active Power Plan list to select the plan to use. The options are High Performance, Power Saver, and Automatic. If you choose Automatic, Windows 8.1 uses the Balanced power plan in most cases.

  4. Tap or click OK.

If you want all computers that process a particular policy to use an updated preferred plan or a custom power plan that you’ve created, follow these steps:

  1. After you open the Group Policy Object that you want to edit, expand Computer ConfigurationAdministrative TemplatesSystemPower Management.

  2. Double-tap or double-click Specify A Custom Active Power Plan.

  3. Select Enabled. In the Custom Active Power Plan (GUID) text box, enter the GUID of the power plan to use.

  4. Tap or click OK.

Tip

To determine the GUID of a power plan, get a list of the power plans configured on a computer by typing powercfg -l at an elevated command prompt.

Using alarms and configuring alarm actions

Alarms determine whether a laptop sounds an alarm or displays a warning message when its battery reaches a certain level. You can configure three levels of alarms and notifications for laptops:

  • Low Battery Alarm. The Low Battery Alarm is meant to alert the user when the battery power level is nearly depleted. The low-power state is activated by default when the battery has 10 percent or less power remaining. On a battery with 8 hours of useful life, 10 percent is about 48 minutes of use.

  • Reserve Battery Alarm. The Reserve Battery Alarm is meant to alert the user when the battery is using reserve power. The reserve-power state is activated by default when the battery has 7 percent or less power remaining. On a battery with 8 hours of useful life, 7 percent is about 34 minutes of use.

  • Critical Battery Alarm. The Critical Battery Alarm is meant to alert the user when the battery is about to fail. The critical-power state is activated by default when the battery has 5 percent or less power remaining. On a battery with 8 hours of useful life, 5 percent is about 24 minutes of use.

An alarm action associated with low and critical alarms enables you to dictate what specific actions the operating system should take when the alarm level is reached. Possible actions include shutting down the computer, entering sleep mode, or entering hibernate mode. Starting with Windows Vista, you could turn off low-battery notifications by enabling the Turn Off Low Battery User Notification policy. In Windows 7, the reserve battery alert was added to notify users that batteries were running on reserve power. Because there are different considerations for configuring the alert levels, I’ll examine each separately in the sections that follow.

Configuring low-battery notification and actions

As stated previously, the low-battery notification is a warning that the system is getting low on power. When entering the low-power state, the system notifies the user with either a text prompt alone or a text prompt and an audible alarm. In some cases, you might want to configure the computer to go a step further and enter standby mode in addition to, or instead of, giving a warning.

To configure the low-battery notification and actions, follow these steps:

  1. After you open the Group Policy Object that you want to edit, expand Administrative Templates policies for Computer Configuration under SystemPower ManagementNotification Settings.

  2. To set the low-battery notification action, double-tap or double-click Low Battery Notification Action. Select Enabled, and then use the Low Battery Notification Action list to select the action, such as Sleep. Tap or click OK.

  3. To specify when the low-battery alarm is triggered, double-tap or double-click Low Battery Notification Level. Select Enabled, and then use the Low Battery Notification Level combo box to set the appropriate alarm level. Tap or click OK.

Tip

The default low-battery alarm level is based on the total battery life and typically is 10 percent. On most systems, this is an appropriate value; however, I’ve found that on some systems, especially those with poor batteries, this isn’t enough, and I increase the level to between 12 and 15 percent. In contrast, on energy-efficient systems or those with two batteries, the default value is often too much. Here, I adjust the level so that the user is notified when about 20 minutes of battery power remains. However, keep in mind that over time the efficiency level of batteries decreases and batteries will eventually fail unless they are replaced periodically. Create energy reports to help you identify failing batteries.

Configuring reserve-power mode

Reserve-power mode is designed to notify users that the battery is operating on reserve power. To configure reserve-battery notification, follow these steps:

  1. After you open the Group Policy Object that you want to edit, expand Administrative Templates policies for Computer Configuration under SystemPower ManagementNotification Settings.

  2. To specify when the reserve-battery alarm is triggered, double-tap or double-click Reserve Battery Notification Level. Select Enabled, and then use the Reserve Battery Notification Level combo box to set the appropriate alarm level. Tap or click OK.

Configuring critical-battery alarms

Critical-battery alarms are designed to ensure that systems enter an appropriate mode prior to running out of power. When entering a critical-power state, the system notifies the user and then enters sleep mode. In sleep mode, the computer’s power-manageable components shut off to conserve power. I often configure the low-power alarm so that the computer enters sleep mode. I then configure the critical-battery alarm to have the computer enter hibernation mode or shut down. This takes power management to the next level and helps preserve the system before power is completely exhausted.

To configure the critical-battery actions, follow these steps:

  1. After you open the Group Policy Object that you want to edit, expand Administrative Templates policies for Computer Configuration under SystemPower ManagementNotification Settings.

  2. To set the critical-battery notification action, double-tap or double-click Critical Battery Notification Action. Select Enabled, and then use the Critical Battery Notification Action list to select the action, such as Hibernate or Shut Down. Tap or click OK.

  3. To specify when the critical-battery alarm is triggered, double-tap or double-click Critical Battery Notification Level. Select Enabled, and then use the Critical Battery Notification Level combo box to set the appropriate alarm level. Tap or click OK.

Tip

The default critical-alarm level is based on the total battery life and typically is 5 percent. In most cases, this value is appropriate. However, if you plan for the computer to go into hibernation or shut down, you might want to reduce this value. You might also want to take into account the battery life. If a computer has a long battery life, the default typically is too high, but if a computer has a short battery life, it might not be high enough. I usually set the critical-power alarm so that the alarm action is triggered when 6 to 8 minutes of power is remaining.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset