leave his workstation locked at times

Posted on 2007-07-26
Last Modified: 2013-12-04
Hi i have a user that leave his station locked at times, for some reason other users may go to his TEST workstations and login as themselves overwriting and exiting all applications when logging off the user.
This is what happens: The user simply see the computer locked hits CTRL-ALT-DELETE, and over rides the users name with his user name logging in and kicking off the other user.

How do i prevent that on happening on for 1 workstation only? So he can be only one logged in and no one can unlock his username/Over ride his info.

Thanks for any ideas!!!!!


Question by:jcollazo81
    LVL 29

    Accepted Solution

    Only members of the Local Administrators Group can unlock a machine, suggest removing other users from Local Administrators Group.

    LVL 11

    Expert Comment

    Agreed. Hi Jcollzao you got the solution excatly just follow it and shld work like charm.

    LVL 8

    Expert Comment


                I will agree with matrixnz that the Only members of the Local Administrators Group or Domain administrator  can unlock a machine, suggest removing other users from Local Administrators Group.
    Why i have mentioned Domain Administrator in above lines  because by default he has all the permission to access the networked computer from anywhere. Or u can do one thing u have do deny access permission for each users to whom u dont want to give the permissionsby using active directory users & computer,

    But it will work for u in that condition when ur workstation is in Domain

    if u want more options then please put a clear senario to me i 'll try try my best to assist u.....


    Milan Ojha
    LVL 1

    Expert Comment

    Forced accept.

    EE Admin

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Free Trending Threat Insights Every Day

    Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

    Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
    ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
    Migrating to Microsoft Office 365 is becoming increasingly popular for organizations both large and small. If you have made the leap to Microsoft’s cloud platform, you know that you will need to create a corporate email signature for your Office 365…
    This video discusses moving either the default database or any database to a new volume.

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    11 Experts available now in Live!

    Get 1:1 Help Now