Solved

Loggin Off An Idled Win2k/WinXP workstation!!

Posted on 2004-08-20
5
205 Views
Last Modified: 2010-05-18
OK guys, here we go....

The last time I was looking for a solution to lock up idled workstations, and I found it (thanks to you).  The Problem (now) is that if the worksation is locked, it needs to be unlocked by an Administrator or the person that was using last.

I need to have the workstations log off the violators when left idled for more than 5 minutes.

Can this be done via scripts or some other trick??

Running native (AD) Win2k, with Win 2003 member servers; all worksations are either Win2k or WInXP

Help PLease
0
Comment
Question by:unvega
5 Comments
 
LVL 15

Accepted Solution

by:
adamdrayer earned 35 total points
ID: 11855217
That's tricky.. What if they are in the middle of writing  a document, do you save changes?  do you not save changes?  I wouldn't log someone off completely.  But you can use the shutdown command to restart the computer and force close all applications.

just type "shutdown" or "shutdown /?" at a dos prompt for an explanation on how to use it.  If you use /R, you can force a restart which will arrive back at the windows login box.
0
 
LVL 15

Assisted Solution

by:Yan_west
Yan_west earned 35 total points
ID: 11857279
Check this out..

http://groups.google.com/groups?selm=3FB6E343.FB3AE435@hydro.com

Note, you can also restart the computer using this, not only shut it down.
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Control which SSID or Wifi service laptop can connect to 4 92
Peer-to-Peer file sharing Windows 10 Home 4 118
Group Policy Question 7 76
Windows Update Isn't working 41 183
FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

679 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question