Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Prevent Windows 10 From Restarting While You’re Working

Tip of the Week: How to Prevent Windows 10 From Restarting While You’re Working

How many times has this happened to you: you’ve walked back to your home or work PC after taking a break, only to find that Windows 10 installed new updates and automatically restarted? Thanks to Windows 10’s notoriously aggressive update behavior, any work that wasn’t saved was lost forever. It can be very frustrating to lose a project that you’ve spent hours on, through no fault of your own. Luckily, there are steps you can take to easily create a restart schedule.

In the fall of 2016, Microsoft issued an Anniversary Update to the Windows 10 OS. With this update, Microsoft included a new feature called “Active Hours.” Active Hours was created to let users specify the times when they’re more likely to be using their computers. In order to set up an Active Hours restart schedule, ensure that your computer has the Anniversary update installed (check your PC settings to see if it has already present). If you need help installing Windows 10 Anniversary, you can download this Update Assistant on Microsoft’s website: https://www.microsoft.com/en-us/windows/features.

After Windows 10 Anniversary is properly installed, follow these steps to setup Active Hours on your PC:

    n
  1. Click on the Start menu and then the Settings. As a shortcut, you can also use Windows key + i on your keyboard.
  2. Next, select Update & Security.
    ib win 10 1
  3. Under the Windows Update tab, which will show up automatically, you’ll see a link to Change active hours. Click that.
    ib win 10 2
  4. From there, you can set your active hours (note: time lengths exceeding 12 hours will be marked as invalid).
    ib win 10 3
  5. Click Save to confirm your changes.

Now your PC will not install updates during those specified hours. But again, at most, you’re only covered for a 12-hour period. So, what about those times when you need to pull an all-nighter to complete a project? Not only can Windows 10 updates interrupt your productivity, they can also take a long time to install. To further prevent unwanted installations and restarts, you can also adjust your restart settings.

To change your restart settings, you’ll need to stay in the Update & Security section of your PC settings. Next:

    n
  1. Click on Restart options, which is located under Change active hours.
    ib win 10 4
  2. Turn the feature On.
    ib win 10 5
  3. Next, set the day and time when you’d like Windows to finish installing updates. There is no need to save anything. As long as the switch is set to On, you’re all set.
    ib win 10 6

If you find that the On/Off switch is grayed out and you aren’t able to adjust it, this means that there are no new updates available at that time. In other words, you won’t have to worry about updates finishing up and forcing your PC to restart. Be sure to keep an eye on your restart options if you are planning to burn the candle at both ends.

There you have it. Windows 10 will no longer be able to bully you into halting your productivity. For more tips on how to avoid downtime for your hardware, give Total Tech Care a call at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 28 February 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Communication Business Continuity Smartphones IT Support Smartphone Miscellaneous Mobile Device Small Business Network Browser Collaboration Productivity Quick Tips Cybersecurity Users Business Management Managed IT Services Upgrade Windows Phishing Outsourced IT Ransomware Data Backup Windows 10 Office Data Recovery Server Save Money Cloud Computing Windows 10 Passwords Virtualization Social Media Saving Money Holiday Gadgets Chrome Tech Term Automation Managed IT Services Microsoft Office Managed Service Computers Facebook Cybercrime Artificial Intelligence Operating System BYOD Internet of Things Mobile Device Management Health Networking IT Support Wi-Fi Hacking Information Technology Alert Remote Managed Service Provider Spam Information Office 365 Covid-19 Telephone Systems Router BDR Recovery Employer-Employee Relationship Bandwidth Social Engineering Mobility App History Mobile Computing Data Breach Law Enforcement Application Human Resources Password Big Data Remote Monitoring Money Encryption Applications Office Tips Training Government VPN Private Cloud Remote Computing Managed IT Blockchain How To Paperless Office Mobile Office Apps Data Storage Patch Management Marketing Wireless WiFi IT solutions Servers Entertainment Avoiding Downtime Gmail Website Budget Settings Data Security Two-factor Authentication Bring Your Own Device Data Management Mouse Work/Life Balance HaaS Infrastructure Vulnerability Voice over Internet Protocol Flexibility Windows 7 Google Drive Word HIPAA Sports Employee/Employer Relationship Redundancy The Internet of Things RMM Keyboard Lithium-ion battery Data Protection Vendor Management USB Firewall Save Time Virtual Reality Apple Software as a Service Social Telephone System Staff Cleaning Machine Learning User Error Connectivity Remote Work Vendor Meetings End of Support Managed Services Display Conferencing Physical Security Education Scam Risk Management Safety Hacker Hard Drive IT Management PDF Fraud DDoS Remote Worker Botnet IT Plan Proactive IT SharePoint Computing Printer Cryptocurrency Bluetooth Best Practice Unsupported Software YouTube Black Market Comparison Charger Customer Service Environment Compliance Digital Signage CES Document Management OneNote Computer Care IT Consultant Fax Server Solid State Drive Current Events Wireless Technology Downtime Business Technology Telephony How to Content Management Access Control Samsung SaaS Humor Procurement Data storage Workplace Strategy Virtual Assistant Net Neutrality Automobile Authentication Value Help Desk Network Congestion Electronic Medical Records eWaste Printing Spam Blocking Computing Infrastructure Going Green Update Hiring/Firing Managed Services Provider Google Docs Wearable Technology Database Battery Identity Theft Shadow IT Retail Hard Drives Instant Messaging Remote Workers Virus Legal Robot Excel Processor Unified Threat Management Business Intelligence Internet Exlporer Biometrics Computer Accessories Audit Worker Virtual Desktop Augmented Reality Search Engine Twitter Public Computer Peripheral Transportation Digital Security Cameras Using Data Cameras NIST Regulations Business Mangement Smart Tech Computer Fan Relocation Trending Rootkit Copiers Science 5G Addiction Amazon Quick Tip Benefits Ergonomics Smartwatch Video Games Recycling Workers Worker Commute Practices FENG Distributed Denial of Service Customer Relationship Management Development Wiring OLED Analyitcs Virtual Machine Experience Cache Amazon Web Services IBM PCI DSS Smart Technology 2FA Programming Fiber Optics Printer Server Safe Mode Employee Flash Scalability Criminal Business Owner Hosted Computing Messaging GDPR Cabling Hypervisor Wireless Internet Software Tips Online Shopping Supercomputer NarrowBand Policy Antivirus Dark mode Trend Micro File Sharing Sync Search Emails Inventory iPhone Specifications SMS Camera Windows 8 Default App Saving Time Wire Evernote IT service Procedure Travel Two Factor Authentication dark theme Shopping Google Search Netflix Root Cause Analysis Files Millennials AI Printers Tablet IT Infrastructure Smart Office Bing HBO Wireless Charging Knowledge Chromecast Music Domains FinTech Social Network Skype Data loss Colocation Workforce IaaS Uninterrupted Power Supply Maintenance Virtual Private Network Investment Consultant Bloatware Employee/Employer Relationships Outlook Cables Leadership Troubleshooting Employees Monitor Windows 365 Analytics ISP Start Menu Nanotechnology Screen Mirroring Telecommuting Loyalty Video Conferencing Project Management Tablets ROI Best Available Entrepreneur Bitcoin Shortcuts Frequently Asked Questions Cortana Books Sales Reputation Point of Sale WIndows 7 Streaming Media Personal Cryptomining Mobile Digital Signature Windows 10s Content Cast Tech Support Shortcut Supply Chain Management Warranty Cost Management Batteries HVAC Tip of the week Techology Google Apps webinar Laptop Emergency Monitoring Customers Employer Employee Relationship Windows 8.1 Social Networking Digitize Professional Services Analysis Public Cloud Audiobook Devices Assessment Administrator Windows Server 2008 R2 Customer relationships Enterprise Content Management Windows Server 2008 Touchpad Running Cable Email Best Practices User IT Assessment PowerPoint MSP Manufacturing Tools Windows Media Player Accountants Politics Thought Leadership Advertising Credit Cards Television Microchip Memory Computer Tips Managed IT Service Password Management Security Cameras Password Manager Multi-Factor Security Virtual CIO Managing Stress Notifications OneDrive Biometric Security

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code