Possible Solutions to Fix High Disk Usage on Windows 10

If you have recently upgraded to Windows 10, and after a while you’ve noticed several performance issues, system not responding at startup, applications not opening, not responding clicks etc., open Task Manager and check your Disk usage percentage. In case it’s almost 100%, we have some tips for you to get it fixed.

Usually 100% disk usage occurs when a process or an app forces the OS to utilize the hard drive to its full capacity. It can be Chrome’s “prefetch” feature – Google Chrome feature that caches pages that are linked to the web page you are currently on. This allows the page to load a little bit faster when accessing it; also, it can be a bug in a Windows driver, virus/malware infection, Hard Drive error, corrupted system files etc. Whatever the reason, here are several applicable solutions to the issue.

Check and fix Google Chrome causing 100% Disk Usage

In the case of Google Chrome, the web page pre-load feature is at fault. You can turn it off by going to Settings > Advanced > Privacy (chrome://settings/privacy). Here, toggle off the option called “Use a prediction service to load pages more quickly”.

Toggle of the option

Check for Virus / Malware infection

Install a good antivirus software with the latest updates and perform a full scan of your system to make sure there’s no virus/malware infection causing the issue. Also, it could be a good idea to install a free system optimizer like Ccleaner to clean up cache, system errors, memory dump files etc. Run Registry cleaner to fix broken registry errors. After that, restart Windows to see if the issue was properly handled.

Also, start windows 10 into clean boot state to check and identify if any third-party application is causing the High Disk usage problem.

Disable tricks and suggestions

Some users on Microsoft Forum have reported that disabling Windows Notifications has helped them fix high resource usage like: 100% Disk Usage, High CPU or memory leak etc. You can disable this Windows notification from Notifications and actions settings. Simply turn off the “Get tips, tricks and suggestions as you use Windows”.

toggle off get tips

Also, open windows services (press Windows + R, type services.msc and click OK) then temporarily disable Superfetch Service, Background Intelligence Transfer Service, Windows search service. To do this double click on the service on properties window and stop the service next to Service status. Restart Windows and check if the problem persists.

Create A High-Performance Power Plan

On some computers, the hard drives are smart and will try to power down or change RPM to save power. Open Control Panel and go to Hardware and Sound > Power Options to see which power plan you are currently using. Create a High-Performance Power Plan.

create a power plan

Run System File Checker & DISM Command

Run System File Checker Tool, which scans and restore missing or corrupted system files from special cache folder located on %WinDir%\System32\dllcache. To do this, open command prompt as administrator, type sfc /scannow and hit the Enter key. Wait until the scanning process is complete and then restart Windows.

If System File Checker reports errors – corrupted files that weren’t fixed, run the DISM command:

dism /online /cleanup-image /restorehealth

This will scan and repair the Windows image allowing SFC to work properly. After that, run System File Checker again and restart Windows.

Check for Disk Errors

Windows has a built-in tool that will scan your drive for errors and attempt to fix them. Open the Command Prompt as Administrator and type: chkdsk.exe /f /r and hit Enter. On the next row type: Y and hit Enter. This will start the scanning and repairing process. After completion, restart Windows and check if the high disk usage issue was solved.

Are you in need of business IT support? Let us help you out, get your free, no obligation quote today!

WaaS, or DaaS, or is it VDI?

The confusion.

Technology is changing and evolving at a staggering pace, to the point where it has become difficult to keep up with the nomenclatures. Around 2006, the term VDI was being used, then around 2012 you started to hear DaaS, and then WaaS came into play. So what do they all mean, and what is the difference?

What is Virtual Desktop Infrastructure (VDI)?

To simply put it, VDI is a virtual desktop computer with the infrastructure sitting in a datacenter. VDI is the technology for providing and managing virtual desktops. VDI deploys a user desktop operating system, for example Windows, from a virtual machine sitting in a datacenter. This is done by taking a standard server and creating virtual standalone independent desktop computers within the server. Deploying such a solution requires highly technical engineers and constant oversight, from managing the hardware, software, licensing, and deployment.

What is Desktop-as-a-Service (DaaS)?

DaaS is very similar to VDI but differs because instead of hosting desktops in an on-premise datacenter, where most cases your IT department has to manage the environment, DaaS uses a cloud-based back-end. DaaS is a VDI that is hosted in the cloud, and basically shifts the management of the hardware to a cloud provider. DaaS basically takes the worry of the infrastructure from IT, from load balancing to resource provisioning.

Instead of incurring the investment, resource as well as infrastructure, to develop a VDI solution, DaaS offers businesses the opportunity to have VDI capabilities but in a subscription model. Many companies can utilize DaaS vendors to provide such a solution. Unfortunately, the need of internal IT resources is still required. Though Desktop as a Service outsources the management of the infrastructure, the management of the applications, data, and security still requires IT resources.

What is Workspace-as-a-Service (WaaS)?

DaaS may provide the virtual desktop in a cloud-based back-end, but it doesn’t provide all the necessary, and many times needed, features. In other words, view DaaS as the framework of the house, but the inside of the house is empty. WaaS provides the necessary features, or basically adds the furniture and living space of the house. For example, WaaS provides data storage, anti-virus, data back-up, and application management features.

DaaS is the bare bones to allow you to have a virtual desktop, along with the operating system, but it doesn’t provide what is needed in today’s highly regulatory, ever changing, technology driven world. Workspace as a Service provides the full package, from a virtual desktop in a cloud environment, along with all the necessary features to run your business. Many small businesses utilize such an offering because it doesn’t require internal IT resources to manage the infrastructure, applications, data, or security of such a service.


As you think through the investments in your business, and what is needed in today’s technology driven businesses, don’t short change yourself with a costly infrastructure to manage (VDI), or just the shell of the framework needed (DaaS), yet a full solution from the infrastructure, applications, and data that is scalable, flexible, and secure (WaaS). See how we provide a full solution to our customers with our Workspace as a Service offering.

New Security Features for Microsoft 365

On April 30th, Microsoft has announced a series of advanced security features for Microsoft 365 Business to further protect their subscribers against cyber threats to safeguard personal and confidential business information.

Note! Not to be confused with Office 365, Microsoft 365 Business is an integrated solution, bringing together the best-in-class productivity of Office 365 with Windows 10 upgrade rights and advanced security & device management capabilities to help safeguard your business.

Cyber Threats

I. Office 365 Advanced Threat Protection (ATP)

It was originally only available either as an addon or with E5 plans. Now it is part of Microsoft 365 Business. It helps protect your business against complex phishing and ransomware attacks designed to compromise employee or customer sensitive information.

  • Automatic checks of links in email verifying if they are part of a phishing scheme to prevent users from accessing any unsafe web pages.
  • Sophisticated attachment scanner and AI-powered tool that analyses, detects and discards dangerous messages.

II. Windows Exploit Guard Enforcement

Advanced security feature that can protect devices from ransomware and malicious websites at device end points by setting up policies.

Safeguard Sensitive Information

I. Data Loss Prevention (DLP)

DLP was previously only available in E3 and above plans. Now Microsoft automatically included it as part of Microsoft 365 Business. DLP allows you to identify, monitor and protect sensitive information from leaving your organization.

II. Full Intune Availability

This feature was part of the Microsoft 365 Enterprise plans. Now, it is included in the Microsoft 365 Business package. It protects your data across devices with end to end device and application management.

III. Azure Information Protection

It allows you to set permissions, and encryption on files and documents, to further protect your content and how it is accessed.

IV. Exchange Online Archiving

This solution gives users unlimited archive and it allows you to set preservation policies to recover sensitive information, so for instance, when users try to delete their emails, those emails are retained and available for compliance and discovery.

V. Bitlocker Enforcement

It gives users the ability to enforce policies to set Bitlocker on devices, to help protect data in case those devices were either stolen or lost.


Security solutions like Advanced Threat Protection for email, Information Protection for web clients, Exchange Online Archiving, enforcement of Bitlocker and Windows Exploit Guard are publicly available since Microsoft made the announcement on April 30th, 2018.

Coming in the summer we will see Data Loss Prevention and the Office client in Microsoft 365 will be updated to support Data Loss Prevention Policy tips in the Outlook Rich Client, Information Rights Management in email in the Outlook Rich Client and we will also see Advanced Threat Protection coming to Word, Excel and PowerPoint documents.

ComputerSupport.com is a long-time partner of Microsoft. Our experienced engineers can take the pain out of your Office365 migrations, provide the professional advice your business needs, so you can get the most out of your Microsoft 365 Business investment. Contact us today for a free, no obligation quote!

ServiceDesk – 1st line of support for your company

The Business Approach

Doing vital things in a timely manner is crucial and sometimes urgent issues require immediate assistance. Your business infrastructure is no exception, it can generate technical issues that need to be addressed as soon as possible. In certain cases, in-house IT engineers can’t bring tech support calls to full resolutions just because they are overwhelmed with higher priority, more impactful and strategic initiatives.

Create a Robust Work Environment

When you partner with a third party to handle all your organization’s tier-1 technical issues, your in-house engineers are free to focus on bigger tasks: project management, operations, key application support and upgrades to name a few. This creates a satisfying work environment for your in-house engineers, allowing them a more robust career path, and reduces attrition of key IT employees.

Benefits Of Partnering With A Third Party

Many IT leaders don’t want to deal with staff turnover, the cost of training and the impact the turnover has on ensuring consistent tier-1 support occurs to their internal customers. They rather focus on larger more impactful projects that drive business results.


A key aspect in partnering with a third party for tier-1 technical support is collaboration. Your internal IT organization has to provide a seamless and integrated experience with your end-users. A key feature is a co-managed ticketing system. Providing a secure, private, interactive solution that is fully integrated with the outsourced provider’s system is key to provide the ability to share ticket information and workflows. This helps create one image of the IT organization to your end-users.

Common Issues Handled by a Service Desk

• Setting-up new and disabling users (email, AD, and/or applications)
• PC performance troubleshooting
• Printer and scanning management (adding, configuring, uninstalling, removing)
• VPN connectivity and set-up
• Wireless network connectivity
• And much more…


Allow yourself to focus on what is important for you, which is your business, not the tier-1 technical issues. Our ServiceDesk can be the first line of IT support for your employees and an extension of your overall IT team.