Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Tip of the Week: Working Around Windows’ Restore Point Issue

Tip of the Week: Working Around Windows’ Restore Point Issue

One would think that a program called System Restore would be one that would be prioritized as one to get right. Unfortunately, this seems not to be the case, as utilizing one of your restore points after performing a Windows Update can cause some serious issues. For our tip, we’ll go over how to avoid these issues with a workaround.

Error Code 0xc000021a

It doesn’t take much to activate the issue. Essentially, if you create a restore point before attempting to update Windows and then try to revert back to those restore points, error code 0xc000021a kicks in, and - even after repeated reboots - you will not be able to access the desktop. This is because the system restoration process creates a catalogue of files, with driver files waiting to be restored upon restart. However, when a restart takes place, the existing versions are loaded up first. Because the versions of the catalogue files don’t match, the restart process is halted.

Avoiding the Problem

Microsoft’s official stance is that a user shouldn’t use the System Restore utility at all, but should instead utilize the Windows Recovery Environment, or WinRE.

The following steps should help you:

  • Restart your computer, holding down the shift key to boot up the Windows Recovery Environment.
  • Once there, select Troubleshoot, then Advanced Options, More Recovery Options, and finally, Startup Settings.
  • Select Restart Now.
  • Your computer will reboot to a menu. Select Disable Driver Signature Reinforcement. This may require you to use the F7 key.

Before you do all this, and get yourself stuck in a complicated situation, we recommend reaching out to the professionals here at 415 IT to help you with your work computer or laptop.

Plus, we test new Windows updates out before deploying them across our clients’ networks, to reduce issues that would require a sudden restore. Need help? Give us a call at (415) 295-4898.

65 Bitcoin Ransom Paid by Florida City
Network Security is Crucial for Every Organization
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, July 17 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Business Computing Data Backup Hosted Solutions Privacy Network Security Cloud Software Data Recovery Data IT Support Email Malware Outsourced IT Tech Term IT Services Business Internet Hackers Computer Managed IT Services Innovation Cloud Computing Business Management Ransomware Collaboration Small Business User Tips Windows 10 Microsoft Google Hardware Mobile Devices Paperless Office Android Upgrade Efficiency Business Continuity Managed Service Provider VoIp Encryption Phishing Server Vulnerability Smartphones Communication Communications Remote Monitoring Office 365 Laptops Business Technology Holiday Managed Service Backup Quick Tips Workplace Tips Internet of Things Cybersecurity Managed IT services Passwords Browser Applications Data Management Managed IT Artificial Intelligence Information Antivirus Disaster Recovery Saving Money Scam Wi-Fi Save Money Document Management Government Bandwidth Mobile Device Healthcare Tip of the week Compliance Blockchain Processor Smartphone Project Management Employer-Employee Relationship Customer Relationship Management Chrome Two-factor Authentication Router Social Media VPN Analytics Website BYOD Automation Microsoft Office Windows Data Security Vendor Management BDR Infrastructure IT Management RMM Tablet File Sharing Users Data Loss Network Management Internet Exlporer Smart Technology Alert Proactive Consultation Redundancy Maintenance Storage Facebook Bring Your Own Device Help Desk HIPAA Remote Monitoring and Management Operating System Windows 7 Machine Learning Networking Mobile Security Unified Threat Management Employees Unified Communications Downtime Files Access Control Virtual Private Network Company Culture Gmail The Internet of Things Cooperation Server Management Network Risk Management Remote Workers Word Regulations Patch Management IoT Software as a Service Net Neutrality Management Assessment Computing Infrastructure Hard Disk Drives Mobile Computing Address WiFi Conferencing Microsoft Excel Database Miscellaneous Mirgation Hard Drive Spam Enterprise Content Management Printing Dark Web Augmented Reality Notes Wearable Technology Star Wars Human Error Identity Theft Enterprise Resource Planning Techology E-Commerce Theft SaaS Proactive Maintenance App Authentication Google Calendar Fraud Monitoring Electronic Medical Records Computing Alerts Solid State Drives Geography Meetings Voice over Internet Protocol Projects Cache Social Networking Technology Laws Remote Worker Virtual Reality Touchscreen Hacking PowerPoint Display Utility Computing OneNote Permission Travel Identity Outlook Disaster Resistance Features Financial Firewall Time Management Cybercrime Screen Reader Emergency Multi-Factor Security Authorization Teamwork Comparison Licensing Heating/Cooling Options Modem High-Speed Internet Printer Politics Return on Investment Remote Computing Technology Tips OneDrive G Suite Unified Threat Management Office Private Cloud Data Warehousing Flexibility Trending Professional Services Training Tech Support Search How To Test Shared resources Mobile Shortcut Proactive IT Electronic Health Records Procurement Distributed Denial of Service Statistics Database Management Smart Tech WPA3 Legislation Consulting Specifications Servers 5G Development Instant Messaging Settings Recycling Digital Payment Hotspot Manufacturing Motherboard Chromebook Bookmarks ROI Operations Mobility Virtual Assistant Bitcoin IT Technicians Cost Management Lenovo Employee-Employer Relationship Virtualization IT Consulting Cyberattacks Social Managed IT Service Bluetooth GDPR Connectivity Samsung Fleet Tracking Zero-Day Threat Recovery Managed Services Provider Mobile Device Management Black Friday Wireless Internet Cookies Cables SharePoint Customer Service Transportation Migration eWaste Wireless Mouse Language Password Vulnerabilities Mail Merge User Error Favorites Apps Money Wasting Time Current Events Superfish CIO applications Managing Stress Data Breach Read Only Security Cameras Break Fix Asset Tracking Backup and Disaster Recovery Gadgets Point of Sale Tech Terms Cyber Monday Staff Avoiding Downtime Websites Employer/Employee Relationships Nanotechnology Wires Downloads MSP Finance Permissions Chatbots CEO Printers Students Daniel Stevens Regulation Marketing Twitter Education

Latest Blog

As you company grows, you will need to invest a good deal of the revenue that you take in to keep operations from falling into complacency. In order to get a good idea what investments would be most advantageous, doing a proactive ROI analysis of project you plan to undertak...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...