Automatically log user into domain and bypass login screen

Posted on 2009-02-24
Last Modified: 2013-11-21
I am running a server with 2003, and have set up a small domain for roughly 35 computers.  Each workstation has to log into the domain everytime they start the computer.  I'd like to make this automatic as the users rarely remember the login information (user, password, domain name).  Is there a script that can do this, and how do I write/install it?
Question by:bethstc
    LVL 57

    Accepted Solution

    There are some steps here:
    However I can not stress enough that this is not a good idea in a domain environment!!!!
    Enabling something like this is a huge security risk and should not be done.  The users should be able to remember a username and password.   They do this with ATM cards, online email sites, online bill payment etc.  
     If they are having that hard of a time remember a password you could go to two-factor authentication with a smart card for instance and then they have to only know their PIN.
    LVL 38

    Expert Comment

    by:Philip Elder
    An Acceptable Use Policy signed by all of the users delineating what they can and cannot do with company IT property would fix that in 5 minutes. Along with some training that is.
    An AUP would make it clear that it is the user's responsibility to make sure they use good passwords.
    Protecting company assets such as data should be seen in the same light as their bank card information.

    Author Closing Comment

    Your solution worked, Guru. Much thanks. I agree that this is not the best option, but we are not in the best environment (an urban school) and require as much automation as possible. One final question . . . is there a way to enact this using the server, or will I need to go from workstation to workstation? Thanks!
    LVL 57

    Expert Comment

    by:Mike Kline
    No easy way to enact it at the server because each username and password is different.  

    Featured Post

    Maximize Your Threat Intelligence Reporting

    Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

    Join & Write a Comment

    Learn about cloud computing and its benefits for small business owners.
    Find out how to use Active Directory data for email signature management in Microsoft Exchange and Office 365.
    This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
    This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …

    734 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    25 Experts available now in Live!

    Get 1:1 Help Now