Solved

Force Logoff at Certain Time

Posted on 2006-11-01
7
410 Views
Last Modified: 2013-12-04
Hello

Is it possible to log off a user at a certain time.

Logon Restrictions have been enforced in Group policy for the user account.

If a user has been allowed to log onto the domain from 8am to 6pm what do i need to do to restrict that user from being able to log back on, even if that user leaves the computer on without shutting the machine down. If a user was to do this, the user will still have access to network resources. Basically i am after a solution, to force a user logon account to be disconnected at 6PM without the ability for that user to log back on.

From what i have read so far it is not possible.

I am interested in a windows solution and not a third party solution if this is possible.

I hope that this is clear if not please let me know

Thank you for your time.

0
Comment
Question by:agha123
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
  • 2
  • +1
7 Comments
 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 17855219
its always possible - well almost

get a hold of psshutdown from sysinternals and create a small batch file which you run as a scheduled task..just use the logoff switch given in the readme
0
 
LVL 12

Expert Comment

by:gidds99
ID: 17856109
Micrsoft provided a utility (shutdown.exe) which does the same as PsShutdown (if you are only looking to use MS Tools):

http://support.microsoft.com/kb/317371

PsSHutdown is more powerful however:

http://www.sysinternals.com/Utilities/PsShutdown.html

Hope this helps.
0
 
LVL 38

Accepted Solution

by:
Shift-3 earned 250 total points
ID: 17858266
Use the Group Policy setting "Automatically log off users when logon time expires" under Computer Configuration\Windows Settings\Security Settions\Security Options.
http://www.microsoft.com/technet/security/prodtech/windows2000/w2kccadm/usegpacc/w2kadm17.mspx#EFJAC
0
Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

 
LVL 38

Expert Comment

by:Shift-3
ID: 17858295
If that doesn't work right then adjust the logoff interval with the command net accounts /forcelogoff:<minutes> /domain
http://www.jsifaq.com/SF/Tips/Tip.aspx?id=5566
0
 
LVL 22

Expert Comment

by:orangutang
ID: 17860146
Maybe the built-in shutdown command with the -t arguement
0
 
LVL 12

Expert Comment

by:gidds99
ID: 17861813
The link to "Autmatically log users off....", Provided by Shift-3 does not log the PC off - it simply disconnects the user from servers (logs the user off from any servers defined in the policy).  It is explained here:

http://www.windowsitpro.com/WindowsSecurity/Article/ArticleID/25419/25419.html

To actually log the user off the PC, PsShutdown or Shutdown.exe must be used as described above.

Hope this helps.
0
 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 17862812
yah psshutdown is an awesome tool - i would download the entire pstools packages considering ms bought sysinternals and eventually those tools wont be free
0

Featured Post

Get Actionable Data from Your Monitoring Solution

Your communication platform is only as good as the relevance of the information you send. Ensure your alerts get to the right people every time with actionable responses. Create escalation rules that ensure everyone follows the process and nothing is left to chance.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
This is a high-level webinar that covers the history of enterprise open source database use. It addresses both the advantages companies see in using open source database technologies, as well as the fears and reservations they might have. In this…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

695 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question