What it means to discover online services. What Windows services are needed and which can be disabled

Some users have observed some kind of error on their computer in the form of a system message. Find out what this error is and how to fix it in the article below.

To understand why this error appears, first you need to establish what kind of program is causing it. You can find out the path to the program by clicking on the Program Information link located at the bottom of the error window.

As you can see from the error itself, it occurs due to the partial incompatibility of the program with the Windows operating system.

What to do if the program is incompatible with Windows. In this case, you can use the launch of the program in compatibility mode with a particular operating system.

To run the program in compatibility mode, right-click on the program's shortcut and select Properties.

In the properties window go to the tab Compatibility and check the box opposite Run the program in compatibility mode .

You can also set the privilege level to run this program as an administrator.

Another reason why the error may appear is that the so-called Online Service Discovery service is running.

How to disable online services

In order to disable online services on the computer, click Control PanelAdministrationServices (even easier - Start → in the search bar enter Services).

In Windows Services, search for. Double click on this service -\u003e in the line Launch type select Manually , and in the section condition click Stop .

Alternatively, you can reinstall the program. Perhaps it was previously installed incorrectly, as a result of which an error appeared. The program running on this computer is trying to display a message. Or due to incorrect program update.

Your company's CFO has sent you a simple email with a "small request" that he needs a complete inventory of computers in your company, including the location of computers and

software installed on each computer. To the end of the week. This is necessary for the following reason (select one or more).

  • Now is the time to plan your budget for next year, and you need to determine the amount of funds allocated for software licensing.
  • A Software Audit Notice has been received, and now you need to prove compliance by providing sufficient licenses for a specific product.
  • The CEO has instructed to lower IT infrastructure costs, and he believes that standardizing applications is one way to achieve that goal.

What are you going to do?

IT Asset Management has evolved over the past ten years, with organizations now focusing on the effective management of software assets. The main reason for this is that software is now a significantly larger investment than before, and there is a need to pay attention to growing security, policy and legal issues. The possibility of non-compliance and the need to pay large fees or fines on a true-up basis further increased the need for precise license management.

Large organizations typically use tools and resources to manage software. These tools are often large end-to-end solutions designed not only for tracking hardware and software resources, but also for managing software installation on workstations, monitoring performance, and other production functions. What is left for organizations that cannot use such solutions or lack the resources and expertise to implement and manage such complex solutions?

Meeting the needs of both large and small businesses has been one of the main ideas behind the program as a service (SaaS) concept. Microsoft's Software plus Services strategy is joining forces to develop service-based solutions to effectively manage software assets. One of the first such services, Microsoft® Asset Inventory Service, will be released to Software Assurance customers as part of the Desktop Optimization Pack for Software Assurance later this year.

The Asset Inventory Service (AIS), shown in Fig. 1 is an easy-to-deploy and easy-to-use hosted service for collecting information about software installed on computers in an organization. This information is accessed through browser reports, and the next version of the service plans to include the ability to analyze Microsoft Volume Licensing deployments.

Figure: 1 Microsoft Asset Inventory Service

The nature of online services

What are the reasons for using an interactive solution? There are several good reasons, including immediate availability of updates and new versions, ease of implementation, and reduced deployment and management costs.

Online services are dynamic: like a web page, content and functionality can be continually updated by providers to improve the user experience and reflect ongoing technology changes. This provides an exceptional level of flexibility and allows software vendors to provide the most up-to-date features, solutions, and knowledge that enable administrators to manage their desktops much more ahead of the curve.

The advantage of online services is that they are universally available. Modern IT environments can range from fully networked computers with direct connections to network resources to remote users and branch offices accessing resources over the Internet from a wide variety of locations. Throw in mobile users, who almost always connect to your network through web-based mailers, and taking a full inventory of your company's IT assets becomes very difficult. This has historically been a major problem with inventory tools, especially on-premises solutions that lacked support for remote / offline cases.

However, most, if not all of your computers have Internet connectivity, so you can use online services to manage them without taking special steps to provide access to your own client / server solutions. The service is accessed for management functions over a secure Internet connection, so computers with your managed account can be managed from anywhere with Internet access.

Deployment is straightforward; all you need to do is create an online account to get started. You don't need servers for your environment and no investment in new network infrastructure and software platforms. All of this means lower investment and administrative costs. Technical support is also simplified because the organization does not need to worry about maintenance and upgrades, as new versions of the service are now part of a service agreement.


Service usage

Promoting the development of a networked community

The Asset Inventory Service and System Center Online help develop a successful community of users who can influence the evolution of online services. The software catalog (wiki style) is a great example of what the user community can contribute; service users can provide suggestions, corrections, and advice.

In the future, the catalog itself can also be a valuable resource for end users exploring options for purchasing software. The service can collect a variety of anonymous statistics to determine the rate of implementation of software and hardware; the information collected will be useful to end users involved in this work.

The community will also determine the overall focus of the service by providing feedback on priority areas to address specific business needs.


To provide online desktop management services, the Microsoft System Center Online team is expanding a platform that will not only provide short-term support for the Asset Inventory Service, but also future services. The service is designed with security, scalability and reliability in mind. AIS is a complete hosted solution with all servers located in Microsoft computer centers. To deploy the solution, clients need to install a small program on all client computers that must be included in managed inventory.

The Asset Inventory Service is managed by the professionals responsible for running Microsoft.com. It is a multi-owner web application that uses web services to maintain the privacy and security of individual users; a combination of client and web applications is used to store client data. Agents running on the client site upload the software inventory to the Microsoft IIS web service. Mutually authenticated SSL protects client data, client-to-service communication, and the AIS Web site; for storage purposes, the site uses SQL Server ™.

Users log on to the service to manage accounts and view reports using their Windows Live ™ IDs. The client site also uses SSL to protect client data, and uses SQL Server Reporting Services for reporting. The SQL Server databases are mirrored and load balancing is used for Web site high availability. In addition, inventory data is split into scalable chunks to provide even greater availability.

Asset Inventory Service is subscribed to by purchasing licenses for the Microsoft Desktop Optimization Pack under your Microsoft Volume Licensing Agreement. You can then activate your Asset Inventory Service subscription from the Microsoft Volume Licensing services website at licensing.microsoft.com. A valid Windows Live ID is required for successful authentication and registration with AIS.

During activation, the License Administrator assigns the Asset Inventory Service Subscription Administrator by specifying a Windows Live ID. The Subscription Administrator registers with the AIS using a Windows Live ID and completes the AIS activation process. The administrator can then add other users to the service by specifying their Windows Live ID.


Inventory agent

The client, installed on all computers, is a small, easy-to-deploy agent packaged as a Windows® Installer (MSI) package. Downloading the agent installer and managing the client deployment is done from the online service. (Figure 2 shows the management and support interface.) The agent works similarly to the Windows Update Agent in that it also communicates regularly with the System Center Online servers. The purpose of this is to update the inventory profile at a specific frequency and update itself when a new version of the agent is available.



Figure: 2 Account Management and Client Deployment

The inventory is scheduled to run automatically, no user intervention is required. Also available is the ability to run inventory manually if needed. The first time an agent contacts a service, the credentials of a public key infrastructure (PKI) certificate are used to provide a user ID to the service and create a unique ID for the computer running the agent. The agent itself, which runs only on a schedule, does not require user intervention, therefore it requires a minimum amount of resources and runs in the background. The size of the downloaded files is small so as not to cause "bursts" of network traffic.

The inventory process itself is simple and efficient. The agent searches the registry entries, MSI database, and other sources for installation information, as opposed to traditional management systems that degrade user productivity by searching for and resolving all executable files on the computer. This process returns software inventory data with friendly names and metadata to identify and classify items so that they can be used in various license management activities.


Reporting services

After the inventory data is loaded, it is identified and cataloged to prepare for displaying the data in reports. The inventory data is mapped to a central software catalog, which categorizes the data. This is one of the most important features of the service: the inventory data of all customers provides unique signatures to the central software catalog. The Microsoft development team verifies non-confidential and unclassified software signatures and, using a structured taxonomy of categories and software families, classifies the applications represented by the signatures according to their type and function. The purpose of these categories is to provide reports with a higher level of awareness, allowing users to quickly select the types of software they want, such as anti-virus applications only.

Software signatures are also used to consolidate the data displayed in reports. For example, there may be multiple versions of the publisher name — one application might report the publisher name as Contoso Software, and another as Contoso, so there might be two titles in the report. Consolidating publisher and application names improves the accuracy of these criteria reporting and the value of the data displayed.

After the user selects the desired dataset using filters and groups, the report content can be exported to various supported formats using SQL Server Reporting Services, including CSV files, Microsoft Word documents, Microsoft Excel® tables, and PDF files (see Figure 3). This allows you to perform additional external analysis and processing or use the report as input for other enterprise management systems.



Figure: 3 Inventory report

A future feature of the service will improve the way Microsoft licenses are handled, making the process much easier for users. Users will be given the option to download volume license agreement pairs, which will then be used to retrieve license types from the Microsoft Customer License Information store. This license rights information will then be used to generate a report that contains information about all licensed Microsoft software installed and the number of qualifying licenses.

Using the product ID, which is also obtained during inventory, installed software can be categorized by channel: volume license, retail license, and OEM license. This functionality is planned to be included in the next version of the Asset Inventory Service.


Perspectives

The Asset Inventory Service was the first product in System Center Online, but by no means the last. As mentioned earlier, the System Center Online group has a long-term goal of providing comprehensive desktop management services that are fully available as online services.

Potential products currently under consideration include IT asset management for hardware and software inventory and tracking, software distribution and release with similar capabilities to Windows software update services over the Internet, and hybrid online / local services. In addition, other desktop management services are being investigated for this type of situation.

For more information on the Microsoft Asset Inventory Service, visit

Many users on all kinds of computer Internet forums complain that in a certain situation, for no apparent reason, for no apparent reason, a notification appears on the screen, in the header of which is the inscription "Detecting interactive services", and an even more incomprehensible description follows. Let's try to consider what it is in general, how to get rid of the constantly appearing message by disabling the corresponding component.

This can be done quite simply. But the most important question is how appropriate it is to perform such actions. Consider all possible situations, and only after that each user will be able to draw a conclusion for himself whether to disable this service or not. But first things first.

What does Online Service Discovery mean?

Let's start by understanding the essence of the Windows component itself. In a sense, he is responsible for the compatibility of legacy software with new operating systems. However, this is not exactly launching applications in compatibility mode, although it is very similar. Here the situation is somewhat different.

Suppose you have a program that was originally designed to modify the Windows Server 2008 R2 server operating system. The system administrator migrates the server to Windows Server 2012 and tries to launch an application that worked in the previous version of the OS, but does not work in the new one. This is where the detection of interactive services is triggered, since the interface of the application itself can be displayed in the new OS only in the so-called session zero mode (during autorun). The new system cannot display the program interface. And that's why the online service discovery process is done for compatibility.

In general, as the official description of the service says, this component warns the user about the need to manually grant permissions to display dialog boxes for running applications, and only as soon as they appear.

But such situations are found not only on server operating systems. There are many options for the appearance of such notifications. Sometimes the message box may indicate that a program needs permission to terminate the process, and the reason, again, is the problem of partial incompatibility of the application being launched with the version of the operating system. But there are even worse situations.

Options for the online service discovery window

Not to mention the manual or automatic launch of outdated programs, quite often you can see a window appear even at the start of desktop versions, which is incredibly annoying for users.

For example, in Windows 7, the detection of interactive services is triggered just after the system and its components are fully loaded. Why is that? There is no exact answer to this question, although it can be assumed that the user somehow activated this service, or installed obviously outdated programs on the system. It is very possible that the uninstallation was not performed in full, and the residual components of the remote application remained in startup (although they may not be displayed in the standard section).

Disabling a service through the appropriate section

Now let's see how to disable this component. There are two main methods for this. The first option is to perform the necessary actions in the services section. You can get into it in the fastest possible way through the "Run" console, in which the services.msc command is entered.

Here you need to find the corresponding component, enter the parameter editing window by double-clicking or RMB menu, and then press the stop button to start.

What type of launcher should I install?

The second point in solving the problem of how to disable the service is related to the choice of the start type. There are two options here: either disable the component by setting the appropriate value, or use manual launch. Which one to prefer?

In this situation, the user needs to decide whether he is going to use old software products in the future that are incompatible with the system installed on his computer. If yes, the start type is set to manual. Otherwise, the service is shut down completely.

Disabling a service through the registry

Online service detection can also be disabled in the system registry. The editor itself is called through the program execution menu with the regedit command.

In it, you need to use the HKLM branch, go through the SYSTEM and CurrentControlSet sections to the Control directory, and open the Windows subfolder in it. On the right, there is a NoInterectiveServices key. Entering the editing menu through the RMB menu or double-clicking, the parameter value should be changed from zero to one. If you still need to start old programs, the parameter should not be changed.

Note: in order not to go through the registry keys for a long time, you can immediately search for a key by name using either the File menu or the combination of Ctrl + F. There is only one such parameter in the registry, so there should be no problems.

Instead of a total

Finally, it should be noted that the system component described above, which is present in all relatively new Windows operating systems, is a unique tool, since it allows you to run any, even the oldest, software product in their environment. If you use the start of such applications in compatibility mode when you activate the corresponding item in the shortcut properties menu, nothing may work, because the outdated systems for which the desired program was designed are simply not in the list. And this component makes it possible to use them almost one hundred percent. Another thing is that current users never actually use such applications, so, of course, they will not need this service under any circumstances.

But system administrators of enterprises that use outdated software (for example, "Effect Office" 2.8) will find this service useful. In a sense, it will even become the only panacea that will help to avoid the appearance of compatibility problems. They certainly have no reason to deactivate such a unique component (an "adapter" if you like).

Warning: this process involves some degree of risk, and therefore it is desirable to have at least a general idea of \u200b\u200bwhat we are going to do. If you need to return all services to the default state, then you can download ready-made reg-files. Choose your system and download the archive. After downloading the archive, unpack and run the reg file.

The full description of the services, as well as the name and display name, can be viewed and changed state along this path: Start - Control Panel - Administrative Tools - Services.

However, not all services are required for the computer to function properly. Below is a list of services that are disabled or enabled in my configuration. User one (with administrator rights), to the network not connected... To access the Internet, I use my cell phone as a modem connection.

AST Service (Nalpeiron Licensing Service) - Disabled.

BranchCache (This service caches network content received from caching hosts on the local subnet) - Manually.

DHCP client (Registers and updates IP addresses and DNS records for this computer) - Auto

DNS client (The DNS Client service (dnscache) caches DNS (Domain Name System) names and registers the fully qualified name of this computer.) - Disabled... If there is a network - Auto

KtmRm for Distributed Transaction Coordinator (Coordinates transactions between MS DTC and the Kernel Transaction Manager (KTM).) \u200b\u200b- Manually.

Microsoft .NET Framework NGEN v2.0.50727_X86 (Microsoft .NET Framework NGEN) - Manual.

Parental Controls (This service is a stub for the functionality of the Windows Parental Control Service that existed in Vista OS.) - Manually.

Plug-and-play (Allows the computer to recognize and adjust to changes in installed hardware, either without requiring user intervention or minimizing it) - Auto

Quality Windows Audio Video Experience (Quality Windows Audio Video Experience (qWave) - network platform for streaming audio and video in home networks based on IP protocol) - Manually.

Remote Desktop Configuration (Remote Desktop Configuration) - Manually.

Superfetch (Maintains and improves system performance.) - Auto

Windows Audio (Sound management for Windows programs.) - Auto.

Windows CardSpace (This provides a robust ability to create, manage, and disclose digital identities.) - Manually

Windows Driver Foundation - User-mode Driver Framework (Manage host processes of user mode drivers.) - Manually.

Windows Search (Content indexing, caching properties and search results for files, email, and other content.) - Auto... If you do not use search on your computer, then you can Disable.

WMI Performance Adapter (Provides performance library information from Windows Management Instrumentation (WMI) providers to clients on the network.) - Manually.

WWAN Auto Config (This service manages mobile broadband (GSM and CDMA) data cards and built-in modular adapters, as well as connections and auto-configuring networks.) - Manually.

Offline files (The Offline Files service does the job of maintaining the Offline Files cache,) - Manually.

Network Access Protection Agent (The NAP service agent collects and manages information about the health of client computers on the network) - Manually.

AND iPsec Policy Gent (Internet Protocol Security (IPsec) supports network layer authentication of caching nodes) - Manually.

Adaptive brightness control (Designed to monitor the ambient light sensor and adjust the monitor brightness according to changes in illumination.) - Manually.

Windows backup (Supports backup and restore on Windows.) - Manually.

Windows biometric service (Windows Biometric Service is designed to collect, compare, process and store biometric data in client applications without directly accessing biometric samples or hardware) - Manually.

Windows firewall (Windows Firewall helps prevent unauthorized access to your computer over the Internet or network.) - Disabled... Third party Firewall is used.

Web client (Allows Windows programs to create, access and modify files stored on the Internet) - Manually.

Virtual disk (Providing services for managing disks, volumes, file systems, and storage arrays.) - Manually.

IP Helper (Provides tunnel connectivity using IPv6 transition technologies) - Manually.

Secondary login (Allows to run processes as another user) - Manually.

Grouping network participants (Includes multi-way interactions using peer-to-peer grouping.) - Manually.

Disk Defragmenter (Provides the ability to defragment disks.) - Manually... You can leave and Autoby setting the schedule to run.

Remote Access Automatic Connection Manager (Creates a connection to a remote network when the program accesses a remote DNS or NetBIOS name or address.) - Manually.

Print manager (Loading files into memory to print later) - Auto... If there is no printer, then Disabled.

Remote Access Connection Manager (Manages dial-up and virtual private network (VPN) connections from this computer to the Internet or other remote networks.) - Manually.

Desktop Window Manager Session Manager (Provides startup and maintenance of the desktop window manager) - Auto.

Network Participant Identity Manager (Provides identity services for Peer-to-Peer Name Resolution Protocol (PNRP) and Peer-to-Peer Grouping) - Manually.

Credential manager (Provides secure storage and retrieval of user credentials,) - Manually.

Security Accounts Manager (Starting this service signals to other services that the Security Accounts Manager (SAM) is ready to accept requests.) - Auto.

Access to HID devices (Provides universal access to HID devices) - Manually.

Windows event log (This service manages events and event logs) - Auto.

Performance Logs and Alerts (The Performance Logs and Alerts Service collects data from local and remote computers according to the specified schedule settings, and then writes the data to the log or issues an alert.) - Manually.

Software Protection (Allows download, installation and enforcement of digital licenses for Windows and Windows apps) - Auto.

Windows defender (Protection against spyware and potentially dangerous programs) - Auto... However, it is recommended that you use third-party products to protect your computer from viruses.

CNG key isolation (The CNG Key Isolation Service is hosted in the LSA process) - Manually.

Windows Management Instrumentation (Provides a common interface and object model for accessing operating system, device, application, and service management information.) - Auto.

Application compatibility information (Handling compatibility check requests for apps as they run) - Manually.

Group Policy Client (This service is responsible for applying the settings defined by administrators for computers and users through the Group Policy component.) - Auto.

Changed links tracking client (Supports linking NTFS files moved within a computer or between computers on a network.) - Auto.

Distributed Transaction Coordinator (Coordination of transactions spanning multiple resource managers such as databases, message queues, and file systems.) - Manually.

Windows Presentation Foundation Font Cache (Optimizes the performance of Windows Presentation Foundation (WPF) applications by caching commonly used font data.) - Manually.

SNMP Trap (Receives trap messages generated by local or remote SNMP agents and forwards them to SNMP management programs running on this computer.) - Manually.

Remote Procedure Call (RPC) Locator (On Windows 2003 and earlier versions of Windows, the Remote Procedure Call (RPC) Locator service managed the RPC naming service database.) - Manually.

Routing and remote access (Offers routing services to organizations on LAN and WAN) - Disabled.

IPsec Key Modules for Internet Key Exchange and Authenticated IP (The IKEEXT service contains modules for Internet Key Operations (IKE) and Authenticated IP (AuthIP).) - Auto.

DCOM Server Process Launcher (DCOMLAUNCH service starts COM and DCOM servers in response to object activation requests) - Auto.

NetBIOS over TCP / IP Helper (Provides NetBIOS support over TCP / IP Service (NetBT) and NetBIOS name resolution for clients on the network) - Manually.

Windows Immediate Connections - Configuration Recorder (WCNCSVC service contains Windows Connect Now configuration (Microsoft's implementation of WPS protocol)) - Manually

SSDP detection (Discovers network devices and services that use SSDP discovery protocol such as UPnP devices) - Manually.

Discovery of online services (Includes notifying the user about the need for user input for interactive services, which provides access to dialog boxes created by interactive services as they appear.) - Manually

Computer Browser (Serves a list of computers on the network and issues it to programs upon request) - Manually.

Internet Connection Sharing (ICS) (Provides network address translation, addressing, name resolution, and intrusion prevention services for a home or small office network.) - Disabled.

Determination of enclosure hardware (Provides notifications for autostart events on various devices.) - Auto.

TPM Core Services(Allows access to the Trusted Platform Module (TPM), which provides hardware-based cryptography services to system components and applications.) - Manually

Some users have observed some kind of error on their computer in the form of a system message. Find out what this error is and how to fix it in the article below.

To understand why this error appears, first you need to establish what kind of program is causing it. You can find out the path to the program by clicking on the Program Information link located at the bottom of the error window.

As you can see from the error itself, it occurs due to the partial incompatibility of the program with the Windows operating system.

What to do if the program is incompatible with Windows. In this case, you can use the launch of the program in compatibility mode with a particular operating system.

To run the program in compatibility mode, right-click on the program's shortcut and select Properties.

In the properties window go to the tab Compatibility and check the box opposite Run the program in compatibility mode .

You can also set the privilege level to run this program as an administrator.

Another reason why the error may appear is that the so-called Online Service Discovery service is running.

How to disable online services

In order to disable online services on the computer, click Control PanelAdministrationServices (even easier - Start → in the search bar enter Services).

In Windows Services, search for. Double click on this service -\u003e in the line Launch type select Manually , and in the section condition click Stop .

Alternatively, you can reinstall the program. Perhaps it was previously installed incorrectly, as a result of which an error appeared. The program running on this computer is trying to display a message. Or due to incorrect program update.