Solved

Group Policies

Posted on 2004-04-21
4
321 Views
Last Modified: 2012-05-07
Hi all:

I have several networks running native win2k and win2003,  I want to "lock" all workstations (both 2k and XP) when users walk away from them for more than 5 minutes; making them use ctrl + alt + del to log back on.  Is there an easy way to do this?  If so, could you tell me how to achieve this please?

Thanks for your time guys.
0
Comment
Question by:unvega
  • 3
4 Comments
 
LVL 30

Expert Comment

by:Gareth Gudger
ID: 10880314
Start ==> Run ==> gpedit.msc click ok

Expand

+ User Config
  + Admin Tepmlates
    + Control Panel
      + Display

Set "Screen Saver Timeout" options to 5 mins in seconds.

And set "Password Protect the Screensaver"

This will lock the machine.
0
 

Author Comment

by:unvega
ID: 10881276
Original Post:

 Hi all:

I have several networks running native win2k and win2003,  I want to "lock" all workstations (both 2k and XP) when users walk away from them for more than 5 minutes; making them use ctrl + alt + del to log back on.  Is there an easy way to do this?  If so, could you tell me how to achieve this please?

Thanks for your time guys.

The previous solution will not work since I want to be able to set this up from the win2k and win2003 servers (Group Policies) on the different networks that I have setup already.  I do not want to go ws to ws to set this up.  I wan to push it trough the network via group policies.  Can this be done?  How would I do it?  Please.
0
 
LVL 30

Accepted Solution

by:
Gareth Gudger earned 50 total points
ID: 10881438
Um ok then...

Open Active Directory Users and Computer.
Right click your domain and choose properties.
Click Group Policy tab, select your default policy and click Edit.

Make the same changes to the GPO tree as mentioned above.
0
 
LVL 30

Expert Comment

by:Gareth Gudger
ID: 10881485
:)
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

Suggested Solutions

Enterprise networks where VoIP phones have been deployed frequently use port configurations that allow both a computer and an IP phone to be plugged into the same switch port but use different VLANs. On Cisco equipment I'm referring to the "native V…
Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now