Anybody who’s been following sleep states and power management for the new Microsoft Surface Book and the Surface Pro 4 knows that lingering and troublesome problems have plagued those platforms until recently. ( On February 17, MS released a firmware update that finally fixed things as reported in this Ars Technica story.) In fact, sleep and hibernation have been thorny issues for Windows for years. They have been problematic enough, in fact, that I’d gotten into the habit of turning sleep off on my PCs because of issues involved in waking up. But now, it seems that with the latest cumulative update to Windows 10 (KB3140768), lingering issues are solved for Windows sleep — at least on my small but hopefully representative sample of desktop PCs.
I’ve just gotten my new production PC squared away. I accidentally blew away my habitual Power Options settings on Friday, after re-installing APC’s Power Chute (Personal Edition) software on that machine. Before I got around to resetting Power Options to disable sleep I noticed something interesting. Windows sleep not only works as it’s supposed to on this PC (and on other desktop units and All-in-Ones here at home), but because this PC boots from an NVMe boot drive it’s also darn quick. Using the stopwatch on my iPhone, I’ve timed the delay between striking a key on the keyboard or moving my mouse and getting to the Windows login screen at between 8 and 9 seconds. That’s short enough that I don’t mind letting the PC sleep when I’m not using it. I’m even becoming confident that Windows sleep and wake behavior will stay consistent, because it’s already done so for the past four days now. No strange driver issues nor missing or lagging devices after wake-up now, either!
Windows Sleep cuts back on power usage
The real upside of this Windows sleep regime is that the PC consumes almost no energy when it’s sleeping. Thanks to Power Chute I can see that my electric bill will be dipping, too, as a result. I pay about $0.11 per KWh, and it looks like my monthly charge for the PC will drop by about $1.00 a month (down from $5 to just under $4, according to the software’s regular monitoring reports) thanks to sleeping overnight. I’m usually at my PC by 7:00 or 7:30 AM and keep it running until about 10:00 PM, so the new sleep regime gains it ~9 hours of sleep time daily.
Enabling Windows sleep saves about 25% on daily energy costs.
What’s interesting to me is to find myself marveling and happy about something that Windows has claimed to do for years that now finally seems to work as it should. You’d think one could take this kind of thing for granted but sadly, experience has taught otherwise…
I’ve been working with a new production PC for the past week, and only slowly realized that I had goofed with my initial install of Windows 10 on that machine. I had naively assumed that Windows 10 would recognize my NVMe drive needed a GPT disk layout and run the OS install accordingly. Not so: as I struggled with painfully slow boot times on a rig that was supposed to feature blast-fast boot and shutdown times, I slowly realized that my naïve assumption was dead wrong. Sure enough, inspection of the drive layout in Disk Management showed no EFI partition. No EFI partition meant the disk was formatted for Master Boot Record (MBR) boot-up. Alas, that meant the motherboard UEFI BIOS had trouble finding the NVMe drive at boot time. In fact, it was taking way too long to work its way through the 8 other drives I’ve got on that machine. Only eventually and apparently reluctantly would it hand over boot responsibility to the NVMe drive to get the OS up and running, even though I’d designated this drive as the highest priority in the BIOS boot order.
As it explains in this nice article at the “How-to-Geek” website:
“Windows can only boot from GPT (which stands for GUID Partition Table, where GUID is a “globally unique identifier”) on UEFI-based computers running 64-bit versions of Windows 10, 8.1, 8, 7, Vista and corresponding server versions.”
That article also goes onto illuminate the improvements to boot integrity that GPT provides. Chief among these is its ability to store multiple copies of the partition table and drive layout information. Thus, if one copy of that data gets damaged, another copy is still likely to remain accurate and usable. MBR maintains only a single copy of such data, so if it gets damaged, bootability usually gets trashed. Also, GPT works with drives of any size, whereas MBR tops out at 2TB. Further, GPT permits an arbitrary number of partitions on a drive (Windows caps that number at 128, but that’s not a GPT limitation), and MBR tops out at four. All good stuff, to be sure!
GPT Disk Layout Makes a Difference!
But GPT’s inherent association with UEFI was most important to my set-up, because a UEFI BIOS is better able to identify and work with that partitioning scheme than with MBR. During the bootup when the drive was formatted with MBR, a cursor would appear and blink on-screen for 30-45 seconds once boot-up got underway. A bit of online research told me that this behavior indicates the BIOS is searching for a boot drive while this occurs. I’m not sure why this happens when boot priority is specified as a BIOS configuration item, but it was constant and unrelenting anyway.
The EFI partition shows that the new install used a GPT disk layout.
The switch to GPT disk layout eliminated this phase of the boot process. Now, my PC boots in 13-14 seconds once the BIOS actually starts the boot-up process. The motherboard maker’s logo “Asrock” still sits on the screen for just over a minute before that process actually gets underway, though. My next troubleshooting mission will be to figure out how to make that go away.
The only downside to this change is that it required me to perform a clean reinstall of Windows 10, that being the only way to change the system/boot drive from MBR to GPT disk layout. I was able to get through most of it after hours last evening — the whole process took about 2.5 hours, except for a few more details I have to work through this morning. These include migrating my Library folders from the old install to the new, reconfiguring Outlook, and adding the old drive’s PST tiles into that new Outlook environment. Fortunately, having made an image backup of the old drive yesterday, I am able to mount that image in Disk Management as a virtual disk, and then to grab anything and everything I need while that drive is mounted.
File this one under the heading of “I didn’t know you could do that with Windows 10.” This refers to what Sergey Tkachenko calls a “secret reboot mode” in Windows 10 (and 8 versions, too, apparently). It’s available using the old three-fingered salute on Windows 10 PCs. (That means striking the CTRL-ALT-DEL simultaneously, a technique originally used to force DOS to reboot back in the pre-Windows days of PC computing). When you strike that key sequence in Windows 10 you get a security options screen that options like Lock, Switch User, Sign out, Change a password, and Task Management. That’s not where emergency restart comes into play for Windows 10, however.
Instead, you must click the shutdown button at the lower right corner of this window while holding down the CTRL key on your keyboard. This provokes the Emergency Restart screen shown (reproduced from the WinAero.com blog post on this topic):
Taa daa! Emergency restart is exactly what this special restart option says and does.
[Image credit: WinAero.com/Sergey Tkachenko]
Of course, that raises these very interesting questions:
What exactly is emergency restart?
How does emergency restart work?
It’s important to understand the answers because they affect the outcome of exercising this option. Basically, Emergency Restart shuts down all active Windows processes immediately, then shuts down the OS next. It’s as quick as shutdown gets, but also means losing any unsaved work in applications open on your desktop. It’s a kind of last-ditch OS shutdown maneuver that’s just one step shy of hitting the reset button when the OS is still running. Though a forced reset may sometimes be necessary when the OS or an application hangs completely, and the system becomes completely unresponsive to input, it’s never a happy maneuver. For this option, as long as the PC still responds to the three-fingered salute, you can bail out without a maneuver that produces the “Windows was not properly shut down” message in Reliability Monitor.
I mess around with my Windows machines often and aggressively enough that I like this newly uncovered restart option. If your usage patterns are anything like mine, you’ll probably like it too! Thanks again, Sergey, for sharing this useful tidbit of insider info.
The latest free eBook from Microsoft Press is likely to strike a chord with IT professionals interested in or planning for upcoming Windows 10 deployments. It’s entitled Deploying Windows 10: Automating deployment by using System Center Configuration Manager. The eBook is available for immediate download in a variety of electronic formats (standard PDF, mobile PDF, ePub, and Mobi/Kindle). The author team includes Andre Della Monica, Russ Rimmerman, Alessandro Cesarini, and Victor Silveira. All of these folks work for Microsoft as “premium field engineers,” and all have been involved in larger-scale Windows deployments, including recent and relevant experience with deploying Windows 10.
Though only 95 pages in length, the book offers relevant best practices and deployment advice for deploying Windows 10.
According to the book’s description, over 70 percent of businesses use System Center Configuration Manager (SCCM) to manage PCs. That platform also enjoys increasing market share on a quarter-over-quarter basis. Of its many features and functions, SCCM’s OSD (OS Deployment) functions are among the most popular and frequently used. This book explains and explores those features and functions, and how to use them in real-world situations.
Deploying Windows 10: Contents
The books four chapters are organized as follows:
- Chapter 1 describes what’s new in Windows 10, and what makes it worth using.
- Chapter 2 covers Windows 10 deployment options, and compares and contrasts deployment methods.
- Chapter 3 digs into OSD concepts to prepare for deploying Windows 10 using SCCM.
- Chapter 4 provides a walk-through of the Windows 10 deployment process using SCCM, including implementation details.
How can anyone turn down a free eBook that offers potentially useful and valuable information and implementation advice? Digging in won’t cost you any more than the time it takes to download and start reading. Be sure to follow the links you’ll find in the first paragraph of this blog post, and grab yourself a copy today. Hopefully, it will help get the Windows 10 deployment ball rolling in your organization.
Yesterday, MS released Cumulative Update KB3140743, which promises — and describes in detail — a raft of bug fixes and improvements. Be sure to check the Windows 10 update history page for those details. MS’s actual language is: “improved reliability in numerous areas, including … network connectivity and discovery.” What’s going on here shows up nicely under the Network heading in File Explorer. It now correctly lists all local computers, media devices, network infrastructure elements, and (networked) printers on the LAN. Network discovery has been fixed, and fixed quite well!
Network discovery now catches and displays everything of interest in the Network element in File Explorer.
It’s hard to over-enthuse about this improvement, which captures and displays the network neighborhood quickly and accurately. As an experiment, I withdrew a local PC from my LAN Homegroup. Upon re-establishing its membership, the PC immediately re-appeared in the Computer pane on another PC. It even shows terminal server sessions via RDP. It would eventually display my son’s XboxOne when it booted up later that day.
Reliability Improvements Go Way Beyond Network Discovery…
The improved reliability claim also extends to other items as per the update history for KB3140743:
OS and Windows Update installation, startup, installing and configuring Windows for the first time, authentication, resuming from hibernation, shutdown, kernel, Start menu, storage, Windows Hello, display modes, Miracast, AppLocker, Internet Explorer 11, Microsoft Edge browser, … and File Explorer
I haven’t yet had time to explore these other items in any depth. But if they offer the same accuracy and speed as the networking stuff, Windows 10 has truly taken a big leap forward in reliability. The next few days promise to be more interesting than usual, as I and others explore and learn more about these changes. One thing’s for sure: this is one Windows Update that most users won’t want to miss. Also, enterprise admins will want to start testing this update for deployment sooner rather than later, even those on the Current Branch for Business!
Last weekend, I got my new production PC off the ground with a basic build and OS install. This weekend, I finished the job. This meant installing a raft of SSDs and hard disks, then moving the contents of the old production PC onto the new one. Lots of various applications, services, and so forth needed to move over as well. I put LapLink PCMover to work, and was able to save significant time by doing so. However, I hit a few potholes along the way, and learned a thing or two as I made my PC switchover.
I found myself having to reinstall much of the licensed software that PCMover claimed to have moved. Such items included Office 365, PaintShop Pro, System Information for Windows (SIW), and Nitro Pro 10, but not Paragon Partition Manager. Also, I had to reconfigure e-mail access info in Outlook to get everything working, which took some trial and error to puzzle my way through. Right now, the system appears to be working correctly, and I’m functioning normally on my production PC. It’s something of a relief, I’ll confess, because I hit several snags that had me wondering if I’d be able to get back to work this morning.
PC Switchover Lessons Learned
I don’t know what it is about some hardware manuals, but I’m usually capable of following instructions. I did hit some snags in getting my SSDs and hard disks attached to the Asrock Z170 Extreme 7+ motherboard, and observed that instructions about drives blocked because of SATA ports consumed by the M.2 NVMe SSD didn’t quite match the ports I was able to get working. My reading of the instructions was that the bottom row of SATA connectors at the right on the motherboard block would be unusable, but it turned out that the top ones were unusable instead. I also experienced issues with the ASMedia SATA connectors, not realizing that installing a former boot drive into any of those ports would attempt to pre-empt the NVMe SSD in the boot order.
On another similar front, I attempted to recycle some spare mSATA SSDS into dual RAID 0 configurations using some StarTech circuit boards, but discovered one of them non-functional (it would accept the mSATA devices, but wouldn’t allow me to configure them for storage in Disk Management, producing an “I/O Error” every time I attempted to set up either a GPT or MBR based storage volume). It took some time to sort out all the storage stuff, but eventually I got more than enough working to get the system outfitted with a fair amount of space (about 9 TB worth: 7.5 TB on HDD spinning disks, the remainder on SSDs from 250 GB to 500 GB in size).
A snippet from SIW Pro following the PC Switchover.
PCMover Makes a Quicker PC Switchover Possible
PCMover cost me $60 but proved eminently worth it by automagically moving most of my applications, and all of my files and settings (Documents, Downloads, and so forth) from the old production PC to the new one. I did the migration over my GbE network, and the whole thing took about 35 minutes from start to finish. Though I did have to re-install a handful of applications after the move was completed, it was still quite a bit faster than doing everything over again would have been. The last time I rebuilt my production PC, it took me just over a long day to deal with the aftermath of getting the OS reinstalled, and to put my applications and settings back to where they had been beforehand.
I will say this much for the new rig: it’s the coolest-running PC I’ve ever built. Idle temps are in the low 20s; it runs in a range of 24-29 for ordinary use; and I have yet to see it spike over 37 at the heaviest load I’ve thrown at it (all temps are in Celsius). Throw in a faster CPU, faster memory, and a blazing fast NVMe boot/system drive, and it’s proving to be an entirely satisfactory upgrade.
Over time, Windows PCs can accumulate interesting amounts of clutter and detritus. Especially on machines, like mine, where I install and sometimes use a wide variety of programs, this applies to the items that Windows invokes upon starting up the OS and getting things going. While you can use the Startup tab in Task Manager to do a decent job of policing startup items and elements, nothing beats Sysinternals Autoruns program when it comes to getting serious about startup cleanup.
Just this morning, I stumbled across a nice PC World story from Lincoln Spector entitled “3 ways to speed up Windows 10 without buying new hardware.” His first tip reads “1. Remove unnecessary autostarters” and briefly explains how to manage such items with Task Manager. That got me to thinking about Autoruns, after which I took a look into that program to see just how many items my production PC’s installation had accumulated there. By the time I got to 300 (there’s no easy way to count what’s in Autoruns except by scrolling through its listing AFAIK), I go tired and gave up, but if the ratio of space consumed to total items is any indicator, it probably runs around 1200 or so. Turning to the Logon tab (instead of Everything) produced a much more manageable count of 38.
Startup Cleanup Comes Easy with Autoruns
In looking at entries in Autoruns, you can right-click to look the item you’ve selected online, and occasionally get some insight as to what’s worth keeping and what’s worth disabling/deselecting. What I did for my startup cleanup was to delete elements for applications I use only seldom, if at all, to bring down the overall count. In my case that included:
- numerous entries related to Acronis TrueImage (which I run once a week as a secondary backup facility)
- Skype (which I never use on this PC as it has no readily available microphone unless I plug in a headset)
- some but not all Apple and iTunes stuff (updater, iCloud, etc.) that I use seldom, if ever
- a variety of updaters (Java, Nvidia, SnagIt, and so forth — I use Secunia/Flexera PSI to keep up with updates one or more times weekly)
- various browser plug-ins primarily for Web-based meetings (GoToMeeting, On24, and so forth)
- various downloaders (BITS, Akamai, and more)
- other related or similar items
By the time I was done clicking through the interface (which took the better part of half an hour), I’d unchecked over 50 items in all. This is a reasonably substantial startup cleanup, as such things go.
This isn’t something that needs doing every week or every month, but if you’re in the habit of installing new programs on a work or personal machine on a more-or-less regular basis, it’s probably worth doing every 3 to 6 months or so. Grab a copy of Autoruns, and have at it!
Notice on the screencap that I’ve unchecked 13 of the 24 items showing, or just over half of that total. With some careful inspection (and occasional use of the “Search Online…” right-click menu item) you should be able to trim away quite nicely at the Windows runtime environments you subject to this analysis and action. This can be useful in tweaking and tuning reference Windows images as well, prior to their deployment.
On my home network, I’m usually playing host to anywhere from half-a-dozen to a dozen PCs that include desktops, notebooks, tablets, and even an Xbox One. Along with those computing devices, I’ve got a variety of other elements that include my boundary device to Time Warner cable (an Arris box that supports 802.11ac wireless as well as GbE), and a couple of printers. Owing to topology issues — namely, a single GbE wired port upstairs — I had until recently elected to attach my Dell 2155cn color laser printer via USB to my wife’s PC, rather than wiring it up to the in-house Ethernet as a network-attached device. Sure, network printing has all kinds of advantages, but I never felt compelled to extend my topology at the end of the upstairs link until recently.
But in the last month, my wife’s mini-ITX PC (built around a very nice little JetWay JNF9G-QM77 motherboard with an i7-3630QM low-voltage processor) started dropping the USB-attached printer about once a week. I’m not sure if a driver change is responsible, or if the USB circuitry is getting flaky, but something weird was going on. After spending over an hour trying unsuccessfully to troubleshoot the latest glitch on Monday, I dashed over to Fry’s on Tuesday to pick up an el-cheapo GbE switch. That evening, I dropped in said switch, and attached both her PC and the printer to separate ports via Cat6 cables so that the Dell printer could take up independent residence on the network.
Network Printing Works Immediately and Correctly
Immediately, the Dell printer showed up in Devices and Printers in the “Add a printer” selection box, bearing the name DELLCB745E. Upon using Nir Sofer’s excellent Fast Resolver tool to check the printer’s IP address (eventually, I’ll create a static reservation for that address in the Arris routing tables) to learn that the final six characters of the device name are also the last six hexadecimal digits of its MAC address. This is the portion that “uniquely” identifies the specific network interface built into the printer, as compared to all other similar devices from the same maker, which provides a reasonable way to construct a unique device name for network access. Also makes network printing better able to provide easily identifiable and usable device names.
No sooner attached, than network printing starts up, visible in Printers and Devices.
Better still, the printer is now available to the entire network directly and not just to my wife’s PC. That means she can now power it off when she’s not using that PC because it’s no longer necessary to keep it running to provide printer access. Windows 10 is able to see the device for what it is, and able to automagically download the correct drivers on its own without any human intervention. All in all, I’d have to say the change is worth the $35-40 it cost me for the upstairs switch and the two Cat6 cables I had to buy to put all the pieces together. Network printing provides a definite improvement over intermittent availability when attached via USB!
Thanks to some clever work from Sergey Tkachenko over at Winaero.com, DISM shows off yet another interesting capability. You can use it to install missing Windows features without having to download them from the Internet (that’s because they’re already part of the Windows image baked into the Windows installer, or other environments that include the ubiquitous install.wim or install.esd file). The syntax for the relevant DISM FeatureName command tells the story, to those in the know, namely:
DISM /Online /Enable-Feature /FeatureName:NetFX3 /All /Source:D:\sources\sxs /LimitAccess
Let’s unpack this command string, to elucidate what’s going, item by item:
/online: operate on the current running version of Windows
/enable-feature: turns OS features on
/featurename: identifies feature name to be turned on, where NetTX3 refers to the current .NET Framework version 3, aka .NET 3.5
/all: turn on all aspects of the feature being enabled
/Source: identifies a file-spec from whence the files should be drawn (\sources\sxs, for install.wim/.esd image)
/LimitAccess: do not download files from the Internet
Here’s the DISM FeatureName command at work (on a pre-release Win10 build).
[Image Credit: Sergey Tkachenko Winaero.com]
What DISM Featurename Values Are Available for Windows 10?
Funny you should ask: DISM can provide that list using the command line DISM /online /Get-Features. By running this command, I was able to interrogate my own running image, and learned that there are 115 such named features, most of which are disabled by default in a standard Windows 10 installation. Any of these that are in a “Disabled” state may be turned on using the same syntax shown above, simply by substituting the desired package name for “NetTX3” in the exploded DISM command already explored and explained.
What Can Go Wrong When Using DISM Featurename Stuff?
In my own experience, and in working with DISM for various other instructions that include the /Source attribute, I’ve learned that this particular attribute can sometimes be finicky. If you try to use the foregoing syntax and get errors related to source locations, you’ll want to dig deep into the TechNet DISM Reference to fully understand its syntax and semantics. In the comments to Tkachenko’s explanatory blog post, for example, half-a-dozen respondents reported trouble with the very nice batch file he provides to automate the process of using DISM to add the .NET 3.5 feature (and one respondent supplies an alternate DISM technique that uses its /Add-Package capability instead of /Enable-Feature).
Industry observers have been keen to point out that while consumers have been fairly quick to move to Windows 10, enterprise users have not been quite as aggressive in their uptake. Thus, for example, when Microsoft revealed early in January that the total number of Windows 10 users had exceeded 200 million (including Xbox users), it also indicated that only about 10% of that population (22 million) represented seats in enterprise and education sectors. Enterprise Windows 10 deployment is about to get a major bump. That comes thanks to a memo from Department of Defense CIO, Terry A. Halverson, that is a major news focus this week (even though it’s dated 11/20/2015).
DoD Windows 10 Deployment Memo Excerpts
Here are some key snippets from this memo:
It is important for the Department [of Defense] to rapidly transition to Microsoft Windows 10 in order to improve our cybersecurity posture, lower the cost of IT, and streamline the IT operating environment.
This memo serves as notification that the DoD will direct Combatant Commands, Services, Agencies and Field Activities (CC/S/As) to rapidly deploy the Windows 10 operating system throughout their respective organizations starting in January 2016. This applies to all DoD information systems currently using Microsoft operating systems. The Department’s objective is to complete the deployment by January 2017. …
The Defense Information Systems Agency (DISA) and the National Security Agency (NSA) are co-leading a joint Secure Host Baseline (SHB) working group to prepare a Windows 10 Standard Desktop framework. The WIN 10 SHB will bring consistency to DoD host security configuration management activities and will be available to CC/S/A’s on DISA’s Information Assurance Support Environment Portal site … in January.
The distribution list for the memo covers all the bases: everybody’s migrating to Win10!
How serious is this Windows 10 deployment initiative? Any CC/S/A (Combatant Command, Service, or Agency and Field Activity) that wishes to extend its Windows 10 deployment beyond January 2017 must for waivers on a case-by-case basis. Any waivers that extend into 2018 must obtain approval from the DoD CIO — namely, Mr. Halvorsen himself.
DoD Windows 10 Deployment IS a Pretty Big Deal…
Press reports on the number of devices affected come from Microsoft’s Windows Experience Blog post dated 2/17/2016, entitled “US Department of Defense Commits to Upgrade 4 Million Seats to Windows 10.” The author, Yusuf Mehdi, is the Corporate VP for Microsoft’s Windows and Devices Group. This is an ambitious plan with a short timeline, and should definitely shake any wrinkles out of Microsoft’s staging and deployment tools and platforms. It promises to be something of “make-or-break” for Microsoft’s big plans to hit 1 billion Windows 10 users by 2017. The DoD effort will certainly be the biggest single Windows 10 deployment ever undertaken. If things go well, those plans will have earned a major endorsement; if not, …