CompTIA A+ Exam  >  CompTIA A+ Notes  >   Core 2  >  Cheatsheet: System Configuration

Cheatsheet: System Configuration

1. Windows Control Panel Utilities

1.1 Internet Options

TabKey Functions
GeneralHome page settings, browsing history deletion, appearance settings
SecuritySecurity zones (Internet, Local intranet, Trusted sites, Restricted sites), custom security levels
PrivacyPop-up blocker, cookie handling, InPrivate browsing settings
ContentCertificates, AutoComplete settings, parental controls
ConnectionsLAN settings, VPN/dial-up configuration, proxy server settings
ProgramsDefault browser selection, add-on management, file associations
AdvancedReset browser settings, SSL/TLS protocol versions, accelerated graphics

1.2 Devices and Printers

  • View and manage all connected devices (printers, scanners, cameras, external drives)
  • Add new devices and printers (local and network)
  • Set default printer, manage print queue
  • Access device properties and troubleshooting tools
  • Configure device settings and driver updates

1.3 Programs and Features

  • Uninstall or change installed programs
  • View installed updates and remove updates if needed
  • Turn Windows features on or off (.NET Framework, Hyper-V, Telnet Client, SMB)
  • View program size, installation date, publisher, version

1.4 Network and Sharing Center

FunctionDescription
View network statusActive networks, connection type, network map
Change adapter settingsEnable/disable network adapters, configure properties
Change sharing settingsNetwork discovery, file/printer sharing, public folder sharing, password-protected sharing
Set up connectionConnect to network, VPN, dial-up, wireless network

1.5 System

1.5.1 System Information Display

  • Computer name, domain/workgroup membership
  • Windows edition and version
  • Processor type and speed
  • Installed RAM
  • System type (32-bit or 64-bit)
  • Windows activation status

1.5.2 Key Functions

  • Remote settings (Remote Desktop, Remote Assistance)
  • System protection (restore points, shadow copies)
  • Advanced system settings (Performance, User Profiles, Startup and Recovery)
  • Computer name changes, domain/workgroup membership
  • Device Manager access

1.6 Windows Defender Firewall

FeatureDescription
Network profilesDomain, Private, Public networks with independent settings
Inbound rulesControl incoming connections to programs/services
Outbound rulesControl outgoing connections from programs/services
Allow app through firewallPermit specific applications to communicate through firewall
Advanced settingsCreate custom rules based on port, protocol, program, or service

1.7 Mail (Windows Mail App)

  • Configure email accounts (IMAP, POP3, Exchange)
  • Manage multiple email accounts
  • Sync settings for email, calendar, contacts
  • Notification settings
  • Signature configuration

1.8 Sound

TabFunctions
PlaybackConfigure speakers/headphones, set default device, device properties, audio enhancements
RecordingConfigure microphone, set default recording device, adjust levels
SoundsSound scheme selection, program event sounds
CommunicationsAutomatic volume adjustment during calls

1.9 User Accounts

  • Create local user accounts
  • Change account type (Administrator, Standard User)
  • Manage credentials (Windows Credentials, Generic Credentials)
  • Configure User Account Control (UAC) settings
  • Set up parental controls/Family Safety
  • Change account password, create password reset disk

1.10 File Explorer Options

1.10.1 General Tab

  • Open File Explorer to: This PC or Quick access
  • Privacy: Show recently used files and frequently used folders
  • Click behavior: Single-click vs. double-click to open

1.10.2 View Tab

  • Show hidden files, folders, and drives
  • Hide extensions for known file types (enable to show)
  • Hide protected operating system files
  • Display full path in title bar
  • Show drive letters
  • Launch folder windows in separate process

1.10.3 Search Tab

  • How to search: Include subfolders, find partial matches
  • When searching non-indexed locations: Include system directories, compressed files

1.11 Power Options

Power PlanDescription
BalancedBalances performance and energy consumption
Power SaverSaves energy by reducing performance
High PerformanceMaximizes performance, increases power consumption

1.11.1 Advanced Power Settings

  • Turn off hard disk after X minutes
  • Sleep after X minutes (Standby mode - RAM powered, other components off)
  • Hibernate after X minutes (saves RAM to disk, powers off completely)
  • Display turn off settings
  • USB selective suspend
  • PCI Express link state power management
  • Processor power management (minimum/maximum processor state)

1.12 Credential Manager

TypeDescription
Web CredentialsUsernames and passwords for websites saved by browsers
Windows CredentialsCredentials for network resources, Remote Desktop, apps
Certificate-Based CredentialsSmart card and certificate credentials
  • Add, remove, edit stored credentials
  • Back up and restore credentials

1.13 BitLocker

  • Full disk encryption for Windows (Pro, Enterprise, Education editions)
  • Requires TPM 1.2 or higher (or USB startup key without TPM)
  • Encrypts entire drive including OS, system files, user files
  • Recovery key options: Save to Microsoft account, USB drive, file, print
  • BitLocker To Go: Encrypts removable drives
  • Turn on/off, suspend protection, backup recovery key

2. Windows Settings App

2.1 Time & Language

2.1.1 Date & Time

  • Set time automatically (sync with time server)
  • Set time zone automatically
  • Manual time and date adjustment
  • Add clocks for different time zones
  • Sync now button to force time synchronization

2.1.2 Region & Language

  • Country or region setting
  • Regional format (date, time, currency formats)
  • Add display languages and language packs
  • Set preferred language order
  • Keyboard layouts and input methods
  • Speech recognition language

2.2 Update & Security

2.2.1 Windows Update

FunctionDescription
Check for updatesManually trigger update search
View update historySee installed updates and uninstall if needed
Advanced optionsAutomatic update settings, receive updates for other Microsoft products, pause updates
Active hoursSet time range to prevent automatic restarts
Delivery OptimizationDownload updates from PCs on local network or internet

2.2.2 Windows Security

  • Virus & threat protection (Windows Defender Antivirus, scans, updates, settings)
  • Firewall & network protection (monitor network connections, firewall settings)
  • App & browser control (SmartScreen settings, exploit protection)
  • Device security (Core isolation, Security processor/TPM, Secure Boot)
  • Account protection (sign-in options, Windows Hello, Dynamic lock)

2.2.3 Backup

  • File History: Back up files to external drive or network location
  • Add a drive for automatic file backup
  • More options: Backup frequency, retention period, folder exclusions

2.2.4 Recovery

OptionDescription
Reset this PCKeep files or remove everything, reinstall Windows
Advanced startupBoot to recovery environment for troubleshooting, restore points, startup settings
Go back to previous versionRevert to previous Windows version (10 days after upgrade)

2.3 Personalization

2.3.1 Background

  • Picture, Solid color, Slideshow options
  • Choose fit for desktop image

2.3.2 Colors

  • Choose accent color or automatic color from background
  • Light or Dark mode for Windows and apps
  • Show accent color on Start, taskbar, title bars
  • Transparency effects

2.3.3 Lock Screen

  • Background image or slideshow
  • Status display (calendar, weather, notifications)
  • Screen timeout settings

2.3.4 Themes

  • Apply theme (background, colors, sounds, cursor)
  • Desktop icon settings
  • Mouse cursor settings

2.3.5 Taskbar

  • Lock/unlock taskbar
  • Auto-hide taskbar
  • Taskbar location on screen
  • Combine taskbar buttons
  • System icons display (clock, volume, network, power, etc.)
  • Multiple displays: Show taskbar on all displays

2.4 Apps

2.4.1 Apps & Features

  • View installed apps and programs
  • Uninstall, modify, or move apps
  • Choose where to install apps (different drives)
  • App execution aliases

2.4.2 Default Apps

  • Set default apps by file type or protocol
  • Choose default apps for email, maps, music, photos, video, web browser
  • Set defaults by app

2.4.3 Startup

  • Enable/disable apps that run at startup
  • View startup impact (High, Medium, Low, Not measured)

2.5 Privacy

2.5.1 General Privacy Settings

  • Advertising ID for personalized ads
  • Website access to language list
  • Let Windows track app launches to improve Start menu
  • Show suggested content in Settings app

2.5.2 App Permissions

Permission TypeControl
LocationAllow apps to access device location
CameraAllow apps to access camera
MicrophoneAllow apps to access microphone
NotificationsAllow apps to access notifications
Account infoAllow apps to access name, picture, account info
ContactsAllow apps to access contacts
CalendarAllow apps to access calendar
Call historyAllow apps to access call history
EmailAllow apps to access email
File systemAllow apps to access file system
Background appsAllow apps to run in background

2.5.3 Activity History

  • Store activity history on device
  • Send activity history to Microsoft
  • Clear activity history

2.6 Network & Internet

2.6.1 Status

  • View network connection status
  • Network troubleshooter
  • View network properties (IP address, DNS servers, MAC address)
  • Data usage monitoring

2.6.2 Wi-Fi

  • Turn Wi-Fi on/off
  • Show available networks
  • Manage known networks
  • Random hardware addresses for privacy
  • Metered connection setting

2.6.3 Ethernet

  • View connected network properties
  • Change adapter options
  • Set as metered connection

2.6.4 VPN

  • Add VPN connection (server name, VPN type, sign-in info)
  • VPN types: PPTP, L2TP/IPsec, SSTP, IKEv2
  • Connect/disconnect VPN
  • Advanced options: proxy settings

2.6.5 Proxy

  • Automatic proxy setup (automatic detection, setup script)
  • Manual proxy setup (address, port, exceptions)

2.7 Gaming

  • Xbox Game Bar (capture screenshots, record gameplay, performance monitoring)
  • Captures: Screenshot and game clip location
  • Game Mode: Prioritize gaming performance
  • TruePlay: Monitor game integrity

2.8 Accounts

2.8.1 Your Info

  • View account info (name, email, picture)
  • Verify identity with Microsoft account
  • Switch to local account or Microsoft account

2.8.2 Sign-in Options

MethodDescription
Windows Hello FaceFacial recognition (requires IR camera)
Windows Hello FingerprintFingerprint reader authentication
Windows Hello PIN4+ digit PIN for local authentication
PasswordTraditional password authentication
Picture PasswordTouch gestures on chosen picture
Security KeyPhysical security key (FIDO2)
  • Require sign-in after sleep
  • Dynamic lock: Auto-lock when Bluetooth device moves away

2.8.3 Family & Other Users

  • Add family member (requires Microsoft account)
  • Add other user (local or Microsoft account)
  • Assign account access to PC
  • Change account type

2.8.4 Sync Your Settings

  • Sync settings across devices with Microsoft account
  • Theme, passwords, language preferences, ease of access, other Windows settings

3. Administrative Tools & System Utilities

3.1 Task Manager

3.1.1 Processes Tab

  • View running apps and background processes
  • CPU, Memory, Disk, Network usage per process
  • End task, create dump file, go to details
  • Resource values: percentage and absolute values

3.1.2 Performance Tab

  • Real-time graphs: CPU, Memory, Disk, Ethernet/Wi-Fi, GPU
  • CPU: Utilization, speed, processes, threads, handles, uptime
  • Memory: In use, available, committed, cached, paged/non-paged pool
  • Disk: Active time, transfer rate, read/write speed
  • Network: Throughput, link speed
  • Open Resource Monitor for detailed analysis

3.1.3 App History Tab

  • CPU time and network usage for apps over time
  • Delete usage history option

3.1.4 Startup Tab

  • Enable/disable startup programs
  • Startup impact rating
  • Publisher, status, startup impact

3.1.5 Users Tab

  • View logged-in users
  • CPU and memory usage per user
  • Disconnect or sign off users

3.1.6 Details Tab

  • PID (Process ID), status, user name, CPU, memory
  • Set priority (Realtime, High, Above Normal, Normal, Below Normal, Low)
  • Set affinity (assign process to specific CPU cores)
  • End process tree

3.1.7 Services Tab

  • View running and stopped services
  • Start, stop, restart services
  • Open Services console for full management

3.2 Microsoft Management Console (MMC)

3.2.1 Computer Management

Snap-inFunctions
Task SchedulerCreate, manage automated tasks based on triggers (time, event, login)
Event ViewerView system logs (Application, Security, Setup, System, Forwarded Events)
Shared FoldersView shares, sessions, open files
Local Users and GroupsCreate, delete, modify local user accounts and groups
PerformancePerformance Monitor, Data Collector Sets
Device ManagerManage hardware devices and drivers
Disk ManagementCreate, delete, format, resize partitions; assign drive letters; convert disks
ServicesStart, stop, configure Windows services

3.3 Event Viewer (eventvwr.msc)

3.3.1 Log Types

LogPurpose
ApplicationApplication events, errors, warnings, information
SecurityAudit events (successful/failed logins, resource access, policy changes)
SetupEvents during Windows installation and updates
SystemWindows system component events (driver failures, service issues)
Forwarded EventsEvents collected from remote computers

3.3.2 Event Levels

  • Critical: Severe issue requiring immediate attention
  • Error: Problem that may affect functionality
  • Warning: Potential future problem
  • Information: Successful operation or status
  • Audit Success: Successful audited security event
  • Audit Failure: Failed audited security event

3.3.3 Key Functions

  • Filter current log by event level, source, time range
  • Create custom views for specific event criteria
  • Attach tasks to events (run program, send email, display message)
  • Save logs for archival or analysis
  • Clear log option

3.4 Disk Management (diskmgmt.msc)

3.4.1 Disk Operations

OperationDescription
Initialize DiskPrepare new disk for use (MBR or GPT partition style)
Convert to DynamicConvert basic disk to dynamic for spanning, striping, mirroring
Convert to GPT/MBRChange partition table type (disk must be empty)
Online/OfflineBring disk online or take offline

3.4.2 Volume Operations

  • Create simple volume, spanned volume, striped volume (dynamic disks)
  • Extend volume: Add unallocated space to existing volume
  • Shrink volume: Free up unallocated space from existing volume
  • Delete volume
  • Format volume: File system (NTFS, FAT32, exFAT), allocation unit size, volume label
  • Change drive letter and paths
  • Mark partition as active (for boot)

3.4.3 Partition Styles

StyleCharacteristics
MBRMaximum 2TB disk size, 4 primary partitions or 3 primary + 1 extended with logical drives
GPTSupports disks over 2TB, up to 128 partitions, required for UEFI boot, more reliable

3.5 Device Manager (devmgmt.msc)

3.5.1 Device Status Icons

  • Yellow exclamation mark: Device has problem
  • Red X: Device is disabled
  • Down arrow: Device is disabled by user
  • No icon: Device working properly

3.5.2 Driver Management

  • Update driver: Search automatically or browse for driver software
  • Roll back driver: Revert to previous driver version
  • Uninstall driver: Remove device and driver
  • Disable device: Keep installed but prevent use
  • View driver details: Files, version, provider, date

3.5.3 Key Functions

  • Scan for hardware changes
  • Show hidden devices (View menu)
  • View resources by type or connection
  • Properties: General, Driver, Details, Events, Resources
  • Device instance path, hardware IDs

3.6 Local Security Policy (secpol.msc)

3.6.1 Account Policies

Policy TypeKey Settings
Password PolicyEnforce password history, maximum/minimum age, minimum length, complexity requirements, reversible encryption
Account Lockout PolicyAccount lockout threshold (failed attempts), lockout duration, reset counter after time

3.6.2 Local Policies

  • Audit Policy: Success/failure auditing for account logon, account management, object access, policy change, privilege use, system events
  • User Rights Assignment: Logon rights, privileges (backup files, change system time, shut down system)
  • Security Options: Interactive logon settings, network access, account behavior, UAC settings

3.7 Performance Monitor (perfmon.msc)

3.7.1 Monitoring Tools

  • Performance Monitor: Real-time and logged data viewing with graphs, histograms, reports
  • Data Collector Sets: Collect performance data on schedule or continuously
  • Reports: View collected performance data

3.7.2 Key Performance Counters

ObjectImportant Counters
Processor% Processor Time, % Idle Time, Interrupts/sec
MemoryAvailable MBytes, Pages/sec, % Committed Bytes In Use
PhysicalDisk% Disk Time, Avg. Disk Queue Length, Disk Reads/sec, Disk Writes/sec
Network InterfaceBytes Total/sec, Output Queue Length, Packets/sec

3.8 Group Policy Editor (gpedit.msc)

  • Available in Windows Pro, Enterprise, Education editions only
  • Computer Configuration: Applies to computer regardless of user
  • User Configuration: Applies to specific users
  • Software Settings, Windows Settings, Administrative Templates
  • Configure security settings, software deployment, scripts, folder redirection
  • gpupdate /force command to force immediate policy refresh

3.9 Certificate Manager (certmgr.msc)

3.9.1 Certificate Stores

StorePurpose
PersonalUser certificates with private keys
Trusted Root Certification AuthoritiesCertificates from trusted root CAs
Intermediate Certification AuthoritiesCertificates from intermediate CAs
Trusted PublishersCertificates from trusted software publishers
Untrusted CertificatesExplicitly distrusted certificates

3.9.2 Key Functions

  • Import/export certificates
  • View certificate details (issued to, issued by, validity period, purposes)
  • Delete certificates
  • Request new certificate
  • Check certificate path and status

3.10 Services (services.msc)

3.10.1 Service Startup Types

TypeBehavior
AutomaticStarts at system boot
Automatic (Delayed Start)Starts shortly after boot to speed up startup
ManualStarted by user, program, or dependent service
DisabledCannot be started

3.10.2 Service Management

  • Start, Stop, Pause, Resume, Restart service
  • Change startup type
  • Configure recovery options (restart service, run program, restart computer)
  • Dependencies: Services this service depends on and services that depend on it
  • Log On As: Local System, Network Service, Local Service, or specific account

3.10.3 Common Critical Services

  • DNS Client: Resolves DNS names
  • DHCP Client: Obtains IP address automatically
  • Windows Update: Checks and installs updates
  • Windows Defender Antivirus Service: Malware protection
  • Windows Firewall: Network protection
  • Print Spooler: Manages print jobs
  • Task Scheduler: Runs scheduled tasks
  • Remote Desktop Services: Enables remote connections
  • Workstation: Creates and maintains network connections
  • Server: Provides file, print, named pipe sharing

3.11 Task Scheduler (taskschd.msc)

3.11.1 Trigger Types

  • On a schedule (daily, weekly, monthly, one time)
  • At log on (specific user or any user)
  • At startup (system boot)
  • On idle (when computer is idle)
  • On an event (Event Viewer event)
  • At task creation/modification
  • On connection/disconnect from user session
  • On workstation lock/unlock

3.11.2 Actions

  • Start a program: Run application or script
  • Send an email: Email notification (deprecated)
  • Display a message: Show message box (deprecated)

3.11.3 Conditions and Settings

  • Conditions: Idle time, power (AC/battery), network availability
  • Settings: Allow on demand, run if missed, restart on failure, stop if runs too long
  • Security options: Run whether user logged on or not, run with highest privileges

4. System Information & Configuration Tools

4.1 System Information (msinfo32.exe)

4.1.1 System Summary

  • OS Name, Version, Build Number
  • System Manufacturer and Model
  • Processor type, speed, core count
  • BIOS Version/Date, SMBIOS Version
  • Installed Physical Memory (RAM)
  • Total/Available Virtual Memory
  • Page File location and size
  • Boot Device, Windows Directory, System Directory
  • Hardware Abstraction Layer (HAL) version

4.1.2 Hardware Resources

  • Conflicts/Sharing: IRQ and I/O port conflicts
  • DMA channels, I/O addresses, IRQs, Memory addresses
  • Forced hardware assignments

4.1.3 Components

  • Multimedia: Audio/video codecs, sound devices, display adapters
  • Display: Monitor, graphics card details, driver info, resolution
  • Storage: Drives, SCSI, IDE/ATA controllers
  • Network: Adapter details, MAC address, IP configuration
  • USB: USB controllers and connected devices

4.1.4 Software Environment

  • System Drivers: All loaded drivers with status
  • Environment Variables: System and user variables
  • Running Tasks: All running processes
  • Startup Programs: Programs configured to run at startup
  • Windows Error Reporting: Error logs
  • Print Jobs: Current print queue

4.2 System Configuration (msconfig.exe)

4.2.1 General Tab

Startup SelectionDescription
Normal StartupLoad all device drivers and services
Diagnostic StartupLoad basic devices and services only (like Safe Mode)
Selective StartupChoose to load system services, startup items

4.2.2 Boot Tab

  • Boot options: Safe boot (Minimal, Alternate shell, Network, Active Directory repair)
  • No GUI boot: Skip Windows logo during startup
  • Boot log: Create log file (ntbtlog.txt) of boot process
  • Base video: Start with generic VGA driver
  • OS boot information: Show driver names during boot
  • Timeout: Seconds to display boot menu
  • Advanced options: Number of processors, maximum memory
  • Make all boot settings permanent option

4.2.3 Services Tab

  • Enable/disable services at startup
  • Hide all Microsoft services option
  • Used for troubleshooting service conflicts

4.2.4 Startup Tab

  • Opens Task Manager Startup tab (Windows 8/10/11)
  • Legacy location for startup program management

4.2.5 Tools Tab

  • Quick access to common system tools
  • Shows launch command for each tool
  • About Windows, Change UAC Settings, Action Center, Windows Troubleshooting, Computer Management, System Information, Event Viewer, Command Prompt, Registry Editor

4.3 Resource Monitor (resmon.exe)

4.3.1 Overview Tab

  • Summary of CPU, Disk, Network, Memory usage
  • Key processes in each category
  • Real-time graphs for all resources

4.3.2 CPU Tab

  • Processes: PID, average CPU%, threads, description
  • Services: Associated services per process
  • Associated Handles: File handles opened by processes
  • Associated Modules: DLLs loaded by processes
  • CPU usage graph per logical processor

4.3.3 Memory Tab

  • Processes: Working set (RAM in use), shareable, private memory
  • Physical Memory: Used, available, free, hardware reserved
  • Memory composition bar: Hardware Reserved, In Use, Modified, Standby, Free

4.3.4 Disk Tab

  • Processes with Disk Activity: Read/write bytes per second
  • Disk Activity: File being accessed, read/write speed
  • Storage: Active time percentage, available space, disk queue length

4.3.5 Network Tab

  • Processes with Network Activity: Send/receive bytes per second
  • Network Activity: Address, protocol, bytes sent/received
  • TCP Connections: Local/remote address and port, packet loss
  • Listening Ports: Processes listening on network ports

4.4 Registry Editor (regedit.exe)

4.4.1 Root Keys (Hives)

HivePurpose
HKEY_CLASSES_ROOT (HKCR)File associations, COM object registration, OLE information
HKEY_CURRENT_USER (HKCU)Settings for currently logged-in user
HKEY_LOCAL_MACHINE (HKLM)Computer-wide settings, hardware, software, security
HKEY_USERS (HKU)Settings for all user profiles on computer
HKEY_CURRENT_CONFIG (HKCC)Current hardware profile information

4.4.2 Data Types

  • REG_SZ: String value (text)
  • REG_BINARY: Binary data
  • REG_DWORD: 32-bit number
  • REG_QWORD: 64-bit number
  • REG_MULTI_SZ: Multi-string value (array of strings)
  • REG_EXPAND_SZ: Expandable string (contains variables like %SystemRoot%)

4.4.3 Key Functions

  • Create, delete, rename keys and values
  • Modify value data
  • Export registry keys to .reg file (backup)
  • Import .reg files to restore or apply settings
  • Find: Search for keys, values, data
  • Load/unload hive for offline editing
  • Connect to network registry

4.4.4 Important Registry Locations

  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run: Startup programs (all users)
  • HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run: Startup programs (current user)
  • HKLM\SYSTEM\CurrentControlSet\Services: Windows services configuration
  • HKLM\SOFTWARE: Installed software settings
  • HKCU\Software: User-specific software settings

4.5 DirectX Diagnostic Tool (dxdiag.exe)

4.5.1 System Tab

  • Computer name, OS version, language, BIOS
  • Processor, memory, page file
  • DirectX version

4.5.2 Display Tab

  • Graphics card name, manufacturer, chip type
  • Display memory (dedicated and shared)
  • Current display mode and resolution
  • Driver version, date, WHQL certification
  • DirectDraw, Direct3D, AGP Texture Acceleration status
  • Notes section shows problems detected

4.5.3 Sound Tab

  • Sound device name, manufacturer, driver info
  • Hardware acceleration level
  • Test DirectSound functionality

4.5.4 Input Tab

  • Connected input devices (keyboard, mouse, game controllers)
  • Device status and driver information

4.6 Disk Cleanup (cleanmgr.exe)

  • Delete temporary files, downloaded program files, recycle bin contents
  • Delete system files (Windows Update cleanup, previous Windows installations, delivery optimization files)
  • Compress old files option
  • View files before deletion
  • Calculate space savings for each category
  • Clean up system files requires administrator rights

4.7 Disk Defragmenter (dfrgui.exe)

  • Analyze drive fragmentation percentage
  • Defragment and optimize drives
  • Schedule automatic optimization (daily, weekly, monthly)
  • For SSDs: TRIM operation instead of defragmentation
  • HDD: Reorganize fragmented files for faster access
  • Current status shows last run time and fragmentation level

4.8 Windows Memory Diagnostic (mdsched.exe)

  • Test RAM for hardware errors
  • Restart now and check for problems (recommended)
  • Check for problems next time computer starts
  • Basic, Standard, Extended test options
  • F1 during test to access options (test mix, cache, pass count)
  • Results shown after restart in Event Viewer or notification

5. Command-Line System Configuration

5.1 Network Configuration Commands

5.1.1 ipconfig

CommandFunction
ipconfigDisplay IP address, subnet mask, default gateway for all adapters
ipconfig /allDisplay detailed configuration (MAC address, DHCP, DNS servers, lease times)
ipconfig /releaseRelease DHCP-assigned IP address
ipconfig /renewRequest new IP address from DHCP server
ipconfig /flushdnsClear DNS resolver cache
ipconfig /displaydnsDisplay DNS resolver cache contents
ipconfig /registerdnsRefresh DHCP leases and re-register DNS names

5.1.2 ping

  • Test connectivity to IP address or hostname
  • ping [hostname/IP] - Send 4 ICMP echo requests
  • ping -t [hostname/IP] - Continuous ping until stopped
  • ping -n [count] [hostname/IP] - Send specific number of requests
  • ping -l [size] [hostname/IP] - Send packet of specific size (bytes)
  • Reply shows bytes, time (ms), TTL (Time To Live)
  • Destination host unreachable: No route to host
  • Request timed out: No response (firewall or offline host)

5.1.3 tracert

  • Trace route to destination showing all hops
  • tracert [hostname/IP]
  • Shows each router/hop IP address and response time
  • Maximum 30 hops by default
  • Asterisks (*) indicate timeout at that hop
  • Useful for identifying where connection fails

5.1.4 nslookup

  • Query DNS servers to resolve hostnames
  • nslookup [hostname] - Query default DNS server
  • nslookup [hostname] [DNS server IP] - Query specific DNS server
  • Interactive mode: Type nslookup then enter queries
  • Shows authoritative vs. non-authoritative answers
  • Can query specific record types (A, MX, NS, SOA)

5.1.5 netstat

CommandFunction
netstatDisplay active TCP connections
netstat -aDisplay all connections and listening ports
netstat -nDisplay addresses and ports in numerical form
netstat -bDisplay executable involved in creating each connection (requires admin)
netstat -oDisplay owning process ID (PID) for each connection
netstat -rDisplay routing table
netstat -sDisplay statistics per protocol (IP, ICMP, TCP, UDP)
  • Connection states: LISTENING, ESTABLISHED, CLOSE_WAIT, TIME_WAIT, SYN_SENT

5.1.6 net Commands

CommandFunction
net userDisplay all user accounts
net user [username] [password] /addCreate new user account
net user [username] /deleteDelete user account
net user [username] *Change user password (prompts for new password)
net localgroupDisplay all local groups
net localgroup [groupname] /addCreate new local group
net localgroup [groupname] [username] /addAdd user to group
net useDisplay mapped network drives
net use [drive:] \\[computer]\[share]Map network drive
net use [drive:] /deleteDisconnect mapped drive
net shareDisplay shared resources
net viewDisplay computers in domain or workgroup

5.1.7 netsh

  • Network shell for advanced network configuration
  • netsh interface ip show config - Display IP configuration
  • netsh interface ip set address - Set static IP address
  • netsh interface ip set dns - Configure DNS servers
  • netsh wlan show profiles - Display saved wireless profiles
  • netsh wlan show profile name="[profile]" key=clear - Show wireless password
  • netsh advfirewall - Configure Windows Firewall
  • netsh int ip reset - Reset TCP/IP stack
  • netsh winsock reset - Reset Winsock catalog

5.2 System Management Commands

5.2.1 sfc (System File Checker)

  • sfc /scannow - Scan and repair protected system files immediately
  • sfc /verifyonly - Scan only, do not repair
  • sfc /scanfile=[file] - Scan specific file
  • sfc /verifyfile=[file] - Verify specific file integrity
  • Requires administrator privileges
  • Results logged to CBS.log file

5.2.2 chkdsk (Check Disk)

  • chkdsk [drive:] - Check disk for errors (read-only)
  • chkdsk [drive:] /f - Fix errors on disk (requires exclusive access)
  • chkdsk [drive:] /r - Locate bad sectors and recover readable information (implies /f)
  • chkdsk [drive:] /x - Force volume to dismount first if necessary
  • Schedule check on next boot for system drive
  • Requires administrator privileges

5.2.3 diskpart

  • Command-line disk partitioning utility
  • list disk - Show all disks
  • select disk [number] - Select disk to work with
  • list partition - Show partitions on selected disk
  • select partition [number] - Select partition
  • list volume - Show all volumes
  • select volume [number] - Select volume
  • clean - Remove all partitions from selected disk
  • create partition primary - Create primary partition
  • format fs=ntfs quick - Quick format partition as NTFS
  • assign letter=[letter] - Assign drive letter
  • active - Mark partition as active (bootable)
  • convert gpt - Convert disk to GPT (must be empty)
  • convert mbr - Convert disk to MBR (must be empty)

5.2.4 DISM (Deployment Image Servicing and Management)

  • DISM /Online /Cleanup-Image /CheckHealth - Quick check for corruption
  • DISM /Online /Cleanup-Image /ScanHealth - Thorough scan for corruption
  • DISM /Online /Cleanup-Image /RestoreHealth - Repair corrupted system files
  • DISM /Online /Cleanup-Image /StartComponentCleanup - Remove superseded components
  • Run before sfc /scannow if corruption suspected
  • Requires administrator privileges and internet connection

5.2.5 shutdown

CommandFunction
shutdown /sShutdown computer
shutdown /rRestart computer
shutdown /lLog off current user
shutdown /hHibernate computer
shutdown /aAbort shutdown (during countdown)
shutdown /t [seconds]Set time delay before shutdown
shutdown /c "comment"Comment on reason for shutdown
shutdown /fForce running applications to close

5.2.6 powercfg

  • powercfg /list - List all power schemes
  • powercfg /query - Display current power scheme settings
  • powercfg /setactive [GUID] - Set active power scheme
  • powercfg /hibernate on|off - Enable or disable hibernation
  • powercfg /energy - Generate energy efficiency report
  • powercfg /batteryreport - Generate battery usage report
  • powercfg /sleepstudy - Analyze sleep/standby efficiency
  • powercfg /lastwake - Show what woke computer from sleep

5.2.7 gpupdate

  • gpupdate - Refresh Group Policy settings
  • gpupdate /force - Force reapplication of all policies
  • gpupdate /target:computer - Update computer policies only
  • gpupdate /target:user - Update user policies only
  • gpresult /r - Display Resultant Set of Policy (RSoP) summary
  • gpresult /h [filename.html] - Generate detailed HTML report

5.2.8 tasklist and taskkill

  • tasklist - Display all running processes with PID
  • tasklist /svc - Show services hosted in each process
  • tasklist /m - Show DLL modules loaded by each process
  • taskkill /pid [PID] - Terminate process by PID
  • taskkill /im [processname.exe] - Terminate process by image name
  • taskkill /f - Force termination
  • taskkill /t - Terminate process tree (parent and children)

5.2.9 sc (Service Control)

  • sc query - List all services and their status
  • sc query [servicename] - Query specific service status
  • sc start [servicename] - Start service
  • sc stop [servicename] - Stop service
  • sc config [servicename] start= [auto|demand|disabled] - Configure startup type
  • sc qc [servicename] - Query service configuration

5.3 File and Directory Management

5.3.1 attrib

  • Display or change file attributes
  • attrib [filename] - Display attributes
  • attrib +r [filename] - Set read-only
  • attrib -r [filename] - Remove read-only
  • attrib +h [filename] - Set hidden
  • attrib -h [filename] - Remove hidden
  • attrib +s [filename] - Set system file
  • attrib +a [filename] - Set archive bit
  • attrib /s - Process files in subdirectories

5.3.2 robocopy

  • Robust file copy utility for large transfers
  • robocopy [source] [destination] - Copy all files and subdirectories
  • robocopy [source] [destination] /e - Copy subdirectories including empty ones
  • robocopy [source] [destination] /mir - Mirror directory (delete files in destination not in source)
  • robocopy [source] [destination] /z - Restartable mode (resume interrupted copy)
  • robocopy [source] [destination] /log:[file] - Write output to log file
  • robocopy [source] [destination] /r:[n] - Number of retries on failed copies
  • robocopy [source] [destination] /w:[n] - Wait time between retries (seconds)
  • robocopy [source] [destination] /xo - Exclude older files

5.3.3 cipher

  • Manage encryption on NTFS volumes
  • cipher /e [folder] - Encrypt folder
  • cipher /d [folder] - Decrypt folder
  • cipher /w:[folder] - Securely wipe deleted data from free space
  • cipher /x - Backup EFS certificate and key

5.4 System Information Commands

5.4.1 systeminfo

  • Display detailed system configuration information
  • OS Name, Version, Build Number, Manufacturer
  • System Type, Processor, BIOS Version
  • Total/Available Physical Memory
  • Virtual Memory size and availability
  • Domain, Logon Server, Hotfixes installed
  • Network Adapter information
  • systeminfo /s [computer] - Query remote computer

5.4.2 hostname

  • Display computer name
  • Simple command with no parameters

5.4.3 whoami

  • whoami - Display current username and domain
  • whoami /user - Display username and SID
  • whoami /groups - Display group memberships
  • whoami /priv - Display user privileges
  • whoami /all - Display all information

5.4.4 winver

  • Display Windows version dialog box
  • Shows edition, version number, build number, registered user
  • Simple GUI command

6. User Profile and Environment Configuration

6.1 User Profile Structure

6.1.1 Profile Location

  • Default location: C:\Users\[username]
  • Roaming profiles: Stored on network server, follow user between computers
  • Mandatory profiles: Read-only profile enforced by administrator
  • Temporary profiles: Created when user profile cannot be loaded

6.1.2 Key Profile Folders

FolderContents
DesktopFiles and shortcuts on user desktop
DocumentsUser documents and files
DownloadsDownloaded files from browsers
PicturesUser photos and images
VideosUser video files
MusicUser audio files
AppData\RoamingApplication data that roams with user profile
AppData\LocalApplication data specific to local machine
AppData\LocalLowLow-integrity application data (Protected Mode IE)

6.1.3 Hidden Profile Files

  • NTUSER.DAT: User registry hive (HKEY_CURRENT_USER)
  • NTUSER.DAT.LOG: Transaction log for registry hive
  • UsrClass.dat: User class registration data

6.2 Environment Variables

6.2.1 System Variables

VariablePurpose
%SystemRoot%Windows installation folder (usually C:\Windows)
%SystemDrive%Drive containing Windows (usually C:)
%ProgramFiles%Program Files folder (C:\Program Files)
%ProgramFiles(x86)%32-bit programs on 64-bit Windows (C:\Program Files (x86))
%WinDir%Windows directory
%ComputerName%Name of computer
%PATH%Directories searched for executable files
%TEMP% / %TMP%Temporary files folder

6.2.2 User Variables

VariablePurpose
%UserProfile%Current user profile folder (C:\Users\[username])
%UserName%Currently logged-in username
%AppData%Roaming application data folder
%LocalAppData%Local application data folder
%HomeDrive%Drive containing user profile (usually C:)
%HomePath%Path to user profile relative to drive

6.2.3 Managing Environment Variables

  • System Properties → Advanced → Environment Variables
  • Separate user and system variable sections
  • Add, Edit, Delete variables
  • PATH variable: Semicolon-separated list of directories
  • Changes to system variables require administrator rights
  • New Command Prompt/PowerShell needed to see changes

6.3 Local Users and Groups

6.3.1 Built-in User Accounts

AccountDescription
AdministratorBuilt-in account with full system control (disabled by default in Windows 10/11)
GuestLimited account for temporary access (disabled by default)
DefaultAccountSystem-managed account for default profile template (disabled)
WDAGUtilityAccountWindows Defender Application Guard account

6.3.2 Built-in Local Groups

GroupPermissions
AdministratorsFull control of computer, install software, modify system settings, access all files
UsersStandard user permissions, run applications, use devices, limited system changes
Power UsersLegacy group (limited use in modern Windows), more rights than Users but less than Administrators
Backup OperatorsCan backup and restore files regardless of permissions
Remote Desktop UsersCan connect via Remote Desktop
Network Configuration OperatorsCan modify TCP/IP settings, renew/release DHCP leases
Performance Monitor UsersCan use Performance Monitor tools
Event Log ReadersCan read Event Viewer logs

6.3.3 User Account Management

  • Access via: Computer Management → Local Users and Groups
  • Create new user: Set username, full name, password, password options
  • Password options: User must change at next logon, cannot change password, password never expires, account is disabled
  • Account properties: Member Of (groups), Profile (path, logon script, home folder)
  • Rename accounts without losing permissions/settings
  • Disable accounts to preserve data while preventing logon

6.4 User Account Control (UAC)

6.4.1 UAC Levels

LevelBehavior
Always notifyPrompt for all system changes, desktop dims (Secure Desktop)
Notify only when apps make changes (default)Prompt for apps but not Windows settings, desktop dims
Notify only when apps make changes (no dim)Prompt for apps, desktop does not dim (less secure)
Never notifyNo UAC prompts (not recommended)

6.4.2 UAC Prompts

  • Blue shield icon: Windows feature requires elevation
  • Yellow/orange shield: Application from verified publisher requires elevation
  • Red shield: Blocked by administrator or unknown publisher
  • Administrator accounts: Prompt to allow or deny
  • Standard user accounts: Prompt for administrator credentials

6.4.3 Secure Desktop

  • Separate desktop environment for UAC prompts
  • Prevents malware from simulating or automating UAC prompts
  • Screen dims and only UAC prompt is accessible
  • Enabled on highest UAC levels

6.5 Login Options

6.5.1 Password Policies

  • Minimum password length
  • Password complexity requirements (uppercase, lowercase, numbers, symbols)
  • Password history (prevent reuse)
  • Maximum/minimum password age
  • Account lockout threshold and duration
  • Configured via Local Security Policy → Account Policies

6.5.2 Alternative Login Methods

  • PIN: Numeric code tied to specific device (more secure than password for device)
  • Picture Password: Touch gestures (circles, lines, taps) on chosen image
  • Windows Hello: Biometric authentication (face, fingerprint, iris)
  • Security Key: FIDO2-compliant physical key
  • Smart Card: Certificate-based authentication

6.5.3 Auto-Logon Configuration

  • netplwiz command opens Advanced User Accounts
  • Uncheck "Users must enter a user name and password" to enable auto-logon
  • Enter username and password for automatic login
  • Not recommended for security but useful for kiosks or single-user systems

7. Display and Accessibility Settings

7.1 Display Configuration

7.1.1 Display Settings

SettingOptions
ResolutionPixel dimensions (1920x1080, 2560x1440, 3840x2160, etc.), native resolution recommended
Scale and layout100%, 125%, 150%, 175%, 200% - adjust text, apps, UI element size
OrientationLandscape, Portrait, Landscape (flipped), Portrait (flipped)
Multiple displaysDuplicate, Extend, Show only on 1, Show only on 2
Refresh rate60Hz, 75Hz, 120Hz, 144Hz, 240Hz (depends on monitor)

7.1.2 Advanced Display Settings

  • Display adapter properties: View graphics card info and driver details
  • Color calibration: Adjust gamma, brightness, contrast, color balance
  • ClearType text: Optimize text rendering for LCD screens
  • Night light: Reduce blue light in evening (warm color temperature)
  • HDR settings: Enable High Dynamic Range if supported

7.1.3 Multiple Monitor Configuration

  • Identify displays shows number on each screen
  • Arrange displays by dragging icons to match physical layout
  • Set primary display (taskbar and Start menu location)
  • Individual scaling per monitor
  • Different resolutions and refresh rates per monitor
  • Projection modes: PC screen only, Duplicate, Extend, Second screen only (Windows+P)

7.2 Ease of Access (Accessibility)

7.2.1 Vision Settings

FeatureDescription
DisplayMake text bigger, cursor thickness, pointer size and color
MagnifierZoom in on screen content (full screen, lens, docked), invert colors
High ContrastHigh contrast themes for easier visibility (black, white background options)
NarratorScreen reader that reads text, buttons, UI elements aloud
Color filtersFilters for color blindness (deuteranopia, protanopia, tritanopia), grayscale, inverted

7.2.2 Hearing Settings

  • Closed captions: Style, color, transparency, size, effects for media captions
  • Mono audio: Combine left and right audio channels
  • Flash screen for notifications instead of sounds
  • Audio notifications: Visual cues for system sounds

7.2.3 Interaction Settings

FeatureDescription
Speech recognitionControl computer with voice commands
KeyboardOn-Screen Keyboard, Sticky Keys, Toggle Keys, Filter Keys
MouseMouse pointer size and color, control mouse with numeric keypad
Eye controlControl mouse pointer with eye-tracking device

7.2.4 Keyboard Accessibility Features

  • Sticky Keys: Press one key at a time for keyboard shortcuts (e.g., Shift, Ctrl, Alt)
  • Toggle Keys: Sound when Caps Lock, Num Lock, Scroll Lock pressed
  • Filter Keys: Ignore brief or repeated keystrokes
  • On-Screen Keyboard: Virtual keyboard for mouse/touch input
  • Keyboard shortcuts: Activate features quickly (Windows+U for Ease of Access, Windows++ for Magnifier)

7.3 Remote Desktop Configuration

7.3.1 Enable Remote Desktop

  • System Properties → Remote tab → Allow remote connections
  • Settings → System → Remote Desktop → Enable Remote Desktop
  • Only available on Pro, Enterprise, Education editions (not Home)
  • Requires user account with password
  • Network Level Authentication (NLA) recommended for security

7.3.2 Remote Desktop Connection (mstsc.exe)

  • Computer name or IP address required
  • User credentials (username, password, domain if applicable)
  • Display settings: Resolution, multiple monitors, color depth
  • Local Resources: Audio, keyboard, printers, clipboard, drives, devices
  • Experience: Connection speed optimization, desktop background, font smoothing, desktop composition
  • Save connection settings to .rdp file

7.3.3 Remote Desktop Security

  • Windows Firewall must allow Remote Desktop (TCP port 3389)
  • Add authorized users in System Properties → Remote or Settings → Remote Desktop
  • Administrators group has access by default
  • Network Level Authentication requires user to authenticate before session created
  • Encryption level: Client compatible, High, FIPS-compliant

7.3.4 Remote Assistance

  • Different from Remote Desktop: Allows helper to view/control active session
  • User must send invitation (email or file)
  • Session requires acceptance by both parties
  • Helper can view only or request control
  • User can terminate session at any time
  • Enable via System Properties → Remote → Allow Remote Assistance
  • Launch with msra.exe
The document Cheatsheet: System Configuration is a part of the CompTIA A+ Course CompTIA A+ Core 2.
All you need of CompTIA A+ at this link: CompTIA A+

Top Courses for CompTIA A+

Related Searches
mock tests for examination, past year papers, shortcuts and tricks, Cheatsheet: System Configuration, Exam, Summary, practice quizzes, Semester Notes, Cheatsheet: System Configuration, pdf , ppt, Previous Year Questions with Solutions, Extra Questions, Important questions, video lectures, MCQs, study material, Sample Paper, Cheatsheet: System Configuration, Free, Objective type Questions, Viva Questions;