Windows 8 provides a wide range of support tools. Tools that are available include the following:
-
Backup (Sdclt.exe)
Opens the Windows 7 File Recovery tool, which you can use to back up and restore user and system files. -
Built-In Diagnostics
Scans the system, examining hardware components and software
configurations for problems. This information can be used to
troubleshoot and resolve performance and configuration issues.
-
DirectX Diagnostic Tool (Dxdiag.exe)
Runs a diagnostic tool that you can use to troubleshoot problems with
Microsoft DirectX. DirectX is used to speed up the performance of
applications, provided that the system hardware supports this feature. -
Disk Cleanup (Cleanmgr.exe)
Runs the Disk Cleanup utility, which examines disk drives for files
that aren’t needed. By default, Disk Cleanup examines temporary files,
the Recycle Bin, and various types of offline files to see whether there are files that can be deleted. -
Disk Defragmenter (Dfrgui.exe)
Runs the Optimize Drives utility, which examines disk drives for
fragmentation and can then be used to defragment the drive. A drive with
many fragmented files can reduce the system’s performance. -
File Signature Verification Utility (Sigverif.exe)
Used to check operating system files that have been digitally signed.
Any critical files that aren’t digitally signed are displayed in a
results list. The complete list of system files checked is available in a
log file stored in %SystemRoot%\Sigverif.txt. -
Offer Remote Assistance
Enables you to offer remote assistance to a user. -
Remote Assistance
Enables you to create a remote assistance invitation that can be used
to get remote help from a technician. -
System Configuration (Msconfig.exe) Enables you to manage system configuration information. You can configure normal, diagnostic, and selective startup as well. -
System Restore (Rstrui.exe)
Opens the System Restore utility, which can be used to create restore
points or roll back a system to a specific restore point.
The tools you might want to take a closer look at now include Disk Cleanup, File Signature Verification, and System Configuration.
Working with Disk Cleanup
Disk Cleanup checks disk drives for files that
aren’t needed. You can start to work with Disk Cleanup by completing the
following steps:
-
Open Disk Cleanup by typing cleanmgr in the Apps Search box and then pressing Enter, or by tapping or clicking the related option on the Apps screen. -
If the computer has multiple hard disk
drives, the Drive Selection dialog box is displayed. Use the Drives
drop-down list to choose the drive you want to clean up, and then tap or
click OK.
Disk Cleanup then examines the selected
drive, looking for temporary user files that can be deleted and user
files that are candidates for deletion. The more files on the drive, the
longer the search process takes.
When Disk Cleanup finishes its initial run, you
can add temporary system files that can be deleted and system files
that are candidates for deletion by tapping or clicking Clean Up System
Files, selecting a system drive to examine, and then tapping or clicking
OK. You will then see a report similar to the one shown in Figure 1.
File categories that you might see in the report include the following:
-
Downloaded Program Files
Contains programs downloaded for use by your browser, such as ActiveX
controls and Java applets. These files are temporary and can be deleted. -
Files Discarded By Windows Upgrade
Contains files from a previous upgrade that were not identified as
Windows system files. After you’ve saved any necessary data from
previous Windows installations, including user data, you can use this
option to remove the related files and free up space. -
Hibernation File Cleaner
Contains details about the state of the computer when it enters
hibernation. If the computer doesn’t use hibernation, you can remove
this file to free up space.
-
Microsoft Office Temporary Files
Contains temporary files and logs used by Microsoft Office. These files can be deleted to free up space. -
Offline Files
Contains local copies of network files that you’ve designated for
offline use. These files are stored to enable offline access and can be
deleted. -
Offline Web Pages
Contains local copies of webpages that you’ve designated for offline
use. These files are stored to enable offline access and can be deleted. -
Previous Windows Installation(s)
Saved under %SystemDrive%\Windows.old, these files are from previous
Windows installations. After you’ve saved any necessary data from
previous Windows installations, including user data, you can use this
option to remove the related files and free up space. -
Temporary Offline Files
Contains temporary data and work files for recently used network files.
These files are stored to enable working offline and can be deleted. -
Recycle Bin
Contains files that have been deleted from the computer but not yet
purged. Emptying the Recycle Bin permanently removes the files. -
Temporary Files Contains information stored in the Temp folder. These files are primarily temporary data or work files for applications. -
Temporary Internet Files
Contains webpages stored to support browser caching of pages. These files are temporary and can be deleted. -
Thumbnails
Contains thumbnails of pictures, videos, and documents created by
Windows 8. When you first access a folder, Windows 8 creates thumbnails
of pictures, videos, and documents. These thumbnails are saved so that
they can be quickly displayed the next time you open the folder. If you
delete thumbnails, they are re-created the next time you open the
folder.
-
Use the check boxes provided in the Files To
Delete list to choose files that you want to remove. Then tap or click
OK. When prompted to confirm the action, tap or click Yes.
Verifying System Files with File Signature Verification
Critical files used by the operating system are digitally signed. Digital
signatures help prove the authenticity of these files and ensure that
it is easy to track changes that might cause problems on a system. When
you are having problems that cannot easily be explained, such as happens
when a system becomes unstable after an application is installed, it is
a good idea to verify that critical system files haven’t been changed.
You can do this by using the File Signature Verification utility.
The executable file for the File Signature Verification utility is Sigverif.exe. You can start and work with the File Signature Verification utility by completing the following steps:
-
Type sigverif in the Apps Search box, and then press Enter. This starts the File Signature Verification utility, as shown in Figure 2.
-
By default, the File Signature
Verification utility displays a list of system files that aren’t
digitally signed and writes verification results to
%SystemRoot%\System32\Sigverif.txt. Before you verify file signatures,
you might want to specify logging options. If so, tap or click Advanced.
As Figure 3
shows, the verification results are saved to a log file, and by
default, any results you generate overwrite any results that you
previously generated, and results are saved to a log file named
Sigverif.txt. To help you track changes in files, you might want to
append results rather than overwrite. If you append rather than
overwrite, you can more easily identify changes. When you are finished
working with the logging options, tap or click OK to return to the main
window.
-
Tap or click Start to run the File
Signature Verification utility. In the results, notice the list of
files displayed in the File Signature Verification utility report. These
files don’t have digital
signatures and could have been maliciously replaced by other programs
of the same name. Tap or click Close to return to the main window. If
you suspect a problem, review event logs and other error reports to see
if any of these files show up in the error reports. -
If you want to review
the verification log, tap or click Advanced, and then tap or click View
Log. You also can use Microsoft Notepad to open the verification log,
which is located in %SystemRoot%\System32\Sigverif.txt by default. Check
the log to see if there are files that have been altered since they
were installed. Files are listed by status, such as Signed and Not
Signed. Note the modification date and version of the file. If a
computer has been having problems since a certain date, and critical
files were changed on this date, this could be the source of the
problem. For example, perhaps a program was installed that overwrote a
critical file with an older version.
|