5 Essential Windows Commands Every Business Should Know (And How We Use Them for You)
The Windows Command Prompt is full of small, powerful utilities that can save time, especially when you’re troubleshooting or documenting a system. In this article, we’ll look at five useful commands that our IT support team uses every day:
-
ipconfig /all | clip -
cipher /w:C: -
driverquery -
assocandftype -
systeminfo | findstr /B /C:"OS"
We’ll walk through what each one does, why it matters for your business, and how our team at EazyTek Services, your local IT support provider in West Hills and surrounding areas, uses them to keep systems running smoothly.
1. ipconfig /all | clip – Capture Full Network Info to the Clipboard
What the Command Does
-
ipconfigdisplays the IP configuration of your network adapters. -
The
/allswitch shows detailed information, including:-
IP addresses
-
Subnet masks
-
Default gateways
-
DNS servers
-
MAC addresses
-
DHCP details
-
Adding | clip at the end sends the output directly to the Windows clipboard instead of the screen.
Example:
ipconfig /all | clip
After running this, you can press Ctrl + V to paste the full network configuration into an email, chat, or document.
Why It’s Useful for Businesses
-
Makes it easy for employees to send accurate network information to IT support
-
Speeds up troubleshooting—no screenshots or partial information
-
Helps with documentation and asset records for ongoing IT management
2. cipher /w:C: – Securely Wipe Free Space on a Drive
(The correct command is cipher, not “cypher.”)
What the Command Does
cipher is a built-in Windows tool for file encryption (EFS). With the /w switch, it becomes a free-space wiping tool.
Example:
cipher /w:C:
This:
-
Does not delete existing files
-
Overwrites free space on the C: drive
-
Makes it much harder to recover previously deleted files with recovery tools
Why It’s Useful for Businesses
-
Helps protect sensitive or confidential data that has been deleted
-
Useful before repurposing, reassigning, or disposing of company computers
-
Supports better security and compliance practices for regulated industries
Note: This command can take a long time on large or nearly full drives and should be run from an elevated Command Prompt.
3. driverquery – List Installed Drivers
What the Command Does
driverquery lists installed device drivers and important details like:
-
Driver name
-
Display name
-
Driver type
-
Link date (when it was built/installed)
Common Uses:
driverquery
driverquery /v
driverquery /fo list
driverquery /si
These variations provide more detail, different formats, or signed-driver information.
Why It’s Useful for Businesses
-
Troubleshooting blue screens, hardware issues, and system instability
-
Checking for outdated or inconsistent drivers across multiple PCs
-
Creating driver inventories for audits, support, and compliance
-
Spotting unsigned or suspicious drivers that could pose a risk
4. assoc and ftype – Control File Associations
Windows uses two layers to decide how to open a file:
-
assocmaps file extensions to file types -
ftypemaps file types to the command/program that opens them
assoc – Extension → File Type
assoc
assoc .txt
assoc .log=txtfile
You can view and change which file type an extension belongs to.
ftype – File Type → Open Command
ftype
ftype txtfile="C:\Program Files\Notepad++\notepad++.exe" %1
You can control which application opens a given file type.
Why They’re Useful for Businesses
-
Fix file types opening in the wrong application
-
Standardize user environments (e.g., all PDFs open in the same approved reader)
-
Improve productivity and reduce frustration for employees
5. systeminfo | findstr /B /C:"OS" – Quickly Check OS Details
What the Command Does
systeminfo prints detailed system information. On its own, it’s very long.
systeminfo
To filter for just OS details:
systeminfo | findstr /B /C:"OS"
This shows concise lines like:
-
OS Name
-
OS Version
Why It’s Useful for Businesses
-
Quickly identify which Windows edition and build a system is running
-
Useful when opening support tickets or checking software compatibility
-
Helpful in scripts or inventories to log OS versions across multiple business computers
How Our Team at EazyTek Services Uses These Tools for Your Business
These commands are powerful, but they’re most effective when they’re part of a structured IT strategy. That’s where our team at EazyTek Services comes in. We provide managed IT services and technical support for small and mid-sized businesses in West Hills and surrounding areas.
1. Proactive System Documentation & Asset Management
We use tools and scripts (including the commands in this article) to automatically:
-
Document your PCs, laptops, and servers
-
Track drivers, OS versions, and hardware details
-
Maintain an accurate inventory for support, audits, and compliance
This helps us troubleshoot issues faster, reduce downtime, and plan upgrades more effectively.
2. Standardized Troubleshooting and Support Playbooks
Instead of treating every issue as a one-off, we build clear procedures using commands like:
-
ipconfig /allfor network diagnostics -
driverqueryfor driver-related problems -
systeminfofor OS and system identification
This lets us resolve problems quickly and consistently across your organization.
3. Secure System Cleanup and Data Handling
Commands like cipher /w:C: are very powerful. Used correctly, they help protect sensitive data.
We:
-
Securely wipe free space as part of a decommissioning or repurposing process
-
Align data-wipe procedures with your security and compliance requirements
-
Ensure the right systems are cleaned in the right way—without touching live data
4. Fixing and Standardizing File Associations for Productivity
Broken or inconsistent file associations slow people down.
We:
-
Use
assocandftypein scripted, controlled ways -
Standardize file behavior across all users and locations
-
Ensure documents, images, and line-of-business files always open with the correct, approved applications
5. Ongoing Managed IT & Help Desk Support
With our IT support in West Hills and surrounding areas, your staff doesn’t have to guess at commands.
You get:
-
A responsive help desk your team can contact for support
-
Remote diagnostics using tools like those in this article
-
Proactive monitoring and maintenance to prevent many issues before they affect your business
Call to Action
If you’d rather have a trusted IT team handle all of this for you, we’re here to help. EazyTek Services, serving West Hills and surrounding areas, can monitor, maintain, and troubleshoot your systems so your staff can stay focused on work—not on command lines and error messages.
📞 Call or text us at (818) 266-4374 or visit eazytekservices.com to schedule a quick assessment and see how we can simplify IT for your business.