Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Loggin Off An Idled Win2k/WinXP workstation!!

Posted on 2004-08-20
5
204 Views
Last Modified: 2010-05-18
OK guys, here we go....

The last time I was looking for a solution to lock up idled workstations, and I found it (thanks to you).  The Problem (now) is that if the worksation is locked, it needs to be unlocked by an Administrator or the person that was using last.

I need to have the workstations log off the violators when left idled for more than 5 minutes.

Can this be done via scripts or some other trick??

Running native (AD) Win2k, with Win 2003 member servers; all worksations are either Win2k or WInXP

Help PLease
0
Comment
Question by:unvega
5 Comments
 
LVL 15

Accepted Solution

by:
adamdrayer earned 35 total points
ID: 11855217
That's tricky.. What if they are in the middle of writing  a document, do you save changes?  do you not save changes?  I wouldn't log someone off completely.  But you can use the shutdown command to restart the computer and force close all applications.

just type "shutdown" or "shutdown /?" at a dos prompt for an explanation on how to use it.  If you use /R, you can force a restart which will arrive back at the windows login box.
0
 
LVL 15

Assisted Solution

by:Yan_west
Yan_west earned 35 total points
ID: 11857279
Check this out..

http://groups.google.com/groups?selm=3FB6E343.FB3AE435@hydro.com

Note, you can also restart the computer using this, not only shut it down.
0

Featured Post

Easy, flexible multimedia distribution & control

Coming soon!  Ideal for large-scale A/V applications, ATEN's VM3200 Modular Matrix Switch is an all-in-one solution that simplifies video wall integration. Easily customize display layouts to see what you want, how you want it in 4k.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

861 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question