XP Network Log-on for Home Users

Yanowhiz
  • May 17, 2005
  • Read 66,640 times
 

Table of Contents

  1. Introduction
  2. Requirements
  3. Instructions

Introduction

Want your logon screen to look like this?
 


Figure 1.1

 

If you use a computer at work, school, library, or where ever a computer is on a network, you've probably seen the logon screen where it tells you to press Ctrl+Alt+Del. This is the logon prompt that XP Professional users and Windows 2000 users receive when the machine is configured to log on to a network. If this type of login is more comfortable for you to use and you would like to change your XP Home logon to do this as well, then please read on.


Requirements

There are only two (2) things you need to have in order to use this logon type:

  1. You need to have Microsoft Windows XP Home or Professional.
  2. You need to have access to an administrator account on the computer.


Instructions

Very first thing you need to do is to turn off your current logon type.

  1. Click Start

  2. Click Control Panel
  3. In the Classic View of the Control Panel, double click on User Accounts.
  4. Click Change the way users log on or off. If you get a pop-up about "Fast Switching," just click cancel.
  5. Uncheck Use Fast User Switching and Use the Welcome Screen
  6. Click Apply Options
  7. Click on the Guest account
  8. Click Turn OFF the Guest Account
  9. Close out of the User Accounts windows by clicking the little X.


Now that you have turned off your old logon, now you have configure your new logon. :)

  1. Right Click on the TaskBar

  2. Click Properties
  3. Click the Start Menu tab
  4. Click the Radio Button option Start Menu
  5. Then click Customize
  6. Click the Advanced tab
  7. Scroll down and click the Radio Button option under "System Administrative Tools," labeled Display on the All Programs menu and the Start Menu.
  8. Click Ok, then click Ok.
  9. Now you have to adjust our "preferences." You should be viewing your desktop.
  10. Click Start
  11. Click Administrative Tools while the rollover menu is still there, click Local Security Policy
  12. On the left side of the screen click the + so its a – on the Local Policies menu.
  13. Then click on Security Options
  14. Then make sure the following is changed to or is the option in bold.
    1. Interactive logon: Do not display last user name. Change it to Enabled
    2. Interactive logon: Do not require CTRL+ALT+DEL. Change it to Disabled*
    3. Interactive logon: Message text for users attempting to log on. Change it to anything you want, on mine it is: "Welcome to YanoNet! By touching this computer you are agreeing to the EULA. Thank you. If you need an account please contact the administrator."(This text will appear as shown in Figure 1.3)
    4. Interactive logon: Message title for users attempting to log on: Change it to anything you want. Mine is: Welcome to YanoNet!" (White text in the top bar of Figure1.3)
    5. System cryptography: User FIPS compliant algorithms for encryption, hashing, and signing. Enabled
    6. System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links) Enabled

If you have followed these steps correctly your computer is now set to login as if you are on a network. Next time you reboot you will see a screen like this.

 


Figure 1.2
 

To start the login process, press Control-Alt-Delete. You will now be presented with the message text that you created in step 14.3 and 14.4.
 


Figure 1.3

 

Press OK to accept the message and you will be presented with the logon screen as show below.

 


Figure 1.4

 

You can now enter your account information to logon to Windows.


As always if you have any questions please do not hesitate to ask them in the computer help forums.

--
Yanowhiz
Bleeping Computer Microsoft Advanced Concepts Tutorial
BleepingComputer.com: Computer Help & Tutorials for the beginning computer user.

 

 

Users who read this also read:

  • How to sign in directly to the Windows 8.1 desktop Image
    How to sign in directly to the Windows 8.1 desktop

    One of the biggest issues many people have had with Windows 8 is that it automatically logs you into the Windows 8 Start screen rather than the traditional Windows desktop. For those people who do not want to use the Start screen and instead work off the desktop this change has been very frustrating. If this has been an issue for you, Windows 8.1 allows you to skip the Start screen and boot ...

  • What is Domain Name Resolution Image
    What is Domain Name Resolution

    When using the Internet most people connect to web sites, ftp servers or other Internet servers by connecting to a domain name, as in www.bleepingcomputer.com. Internet applications, though, do not communicate via domain names, but rather using IP addresses, such as 192.168.1.1. Therefore when you type a domain name in your program that you wish to connect to, your application must first convert ...

  • TCP and UDP Ports Explained Image
    TCP and UDP Ports Explained

    In this tutorial we will discuss the concept of Ports and how they work with IP addresses. If you have not read our article on IP addresses and need a brush up, you can find the article here. If you understand the concepts of IP addresses, then lets move on to TCP and UDP ports and how they work.

  • All about Networks Image
    All about Networks

    With so much of Computer use these days revolving around the Internet and communicating with others, its important that you understand what exactly a network is. Without networks, all communication between your computer and other computers whether it be instant messaging, email, web browsing, or downloading music could not be achieved. This tutorial will strive to teach you about networks and ...

  • Using Blacklight to detect and remove Rootkits from your computer Image
    Using Blacklight to detect and remove Rootkits from your computer

    Rootkits are scary and becoming a larger and larger menace to our computers every day. In the past if our computers were infected with a piece of malware, we simply removed it and we were clean of the infection. Now that rootkits are commonly bundled with other malware, this cleaning process has become even harder to do. This tutorial will cover how to use F-Secure Blacklight to scan your computer ...

 

Comments:

blog comments powered by Disqus
search tutorials
Mandiant mWise Conference 2024

Login