Windows 8: System Recovery Options

This section describes recovery options if your Windows 8 system is corrupted, or infected by a malicious software: restore point, system images, and factory reset.

If you have a malicious software infected your Windows 8 system and it is very hard to remove it. You may consider to run a system recovery process to restore the system to a clean point before the malicious software infected your system.

Windows 8 offers the following recovery options:

1. Using "Restore Point" - This is the first option for recovering from a corrupted Windows 8 system.

A restore point is like a backup of system files. Restoring to a restore point will return system to the point when that restore point was made. Only system files and settings will be restored. Application programs and personal documents are kept as is.

Windows 8 system automatically creates restore points and stores them on the hard disk on a regular basis. You can also make restore points yourself when you are planning to make any changes to the systems. These restore points will help you to rollback your changes, if needed.

2. Using "System Image" - This is the second option for recovering from a corrupted Windows 8 system.

A system image is a true backup of the entire computer system including system files, application programs and your own personal documents. Restoring to a system image will return system to the point when that system image was made. All files, including system files, application programs and personal documents, will be restored.

Windows 8 does not create system images automatically. You should create system images yourself on a regular basis. These restore points will help you to recover the entire system including your personal documents.

3. Using "Factory Reset" - This is the last option for recovering from a corrupted Windows 8 system.

A factory reset is a backup of the entire system originally installed on your computer by the manufacture, Restoring to the factory recovery will restore only the original system and some default applications. Other applications installed by yourself and all your personal documents will be removed.

Last update: 2013.

Table of Contents

 About This Windows Security Book

 Windows 8: System Security Review

 Windows 8: System Security Protection

Windows 8 System Recovery

Windows 8: System Recovery Options

 Windows 8: View Available Restore Points

 Windows 8: Restore Point Settings

 Windows 8: Create Restore Point

 Windows 8: Apply Restore Point

 Windows 8: Create System Image

 Windows 8: Create System Repair Disc

 Windows 8: Boot from Repair Disc

 Windows 8: Modify UEFI Boot Order in BIOS

 Windows 8: Recovery Option 2 - System Image

 Windows 8: Verify Factory Reset

 Windows 8: Recovery Option 3 - Factory Reset

 Windows 8 Defender for Real-Time Protection

 Windows 7: System Security Review

 Windows 7: System Security Protection

 Windows 7 System Recovery

 Windows 7 Forefront Client Security

 Norton Power Eraser - Anti-Virus Scan Tool

 McAfee Virus and Malware Protection Tools

 Spybot - Spyware Blocker, Detection and Removal

 Keeping Firefox Secure

 Keeping IE (Internet Explorer) Secure

 Malware (Adware, Spyware, Trojan, Worm, and Virus)

 HijackThis - Browser Hijacker Diagnosis Tool

 IE Add-on Program Listing and Removal

 "Conduit Search" - Malware Detection and Removal

 "Tube Dimmer", "Scorpion Saver" or "Adpeak" Malware

 Malware Manual Removal Experience

 Vundo (VirtuMonde/VirtuMundo) - vtsts.dll Removal

 Trojan and Malware "Puper" Description and Removal

 VSToolbar (VSAdd-in.dll) - Description and Removal

 PWS (Password Stealer) Trojan Infection Removal

 MS08-001 Vulnerability on Windows Systems

 Antivirus System PRO

 References

 PDF Printing Version