XP Network Log-on for Home Users

  • May 17, 2005
  • Read 62,327 times

Table of Contents

  1. Introduction
  2. Requirements
  3. Instructions


Want your logon screen to look like this?

Figure 1.1


If you use a computer at work, school, library, or where ever a computer is on a network, you've probably seen the logon screen where it tells you to press Ctrl+Alt+Del. This is the logon prompt that XP Professional users and Windows 2000 users receive when the machine is configured to log on to a network. If this type of login is more comfortable for you to use and you would like to change your XP Home logon to do this as well, then please read on.


There are only two (2) things you need to have in order to use this logon type:

  1. You need to have Microsoft Windows XP Home or Professional.
  2. You need to have access to an administrator account on the computer.


Very first thing you need to do is to turn off your current logon type.

  1. Click Start

  2. Click Control Panel
  3. In the Classic View of the Control Panel, double click on User Accounts.
  4. Click Change the way users log on or off. If you get a pop-up about "Fast Switching," just click cancel.
  5. Uncheck Use Fast User Switching and Use the Welcome Screen
  6. Click Apply Options
  7. Click on the Guest account
  8. Click Turn OFF the Guest Account
  9. Close out of the User Accounts windows by clicking the little X.

Now that you have turned off your old logon, now you have configure your new logon. :)

  1. Right Click on the TaskBar

  2. Click Properties
  3. Click the Start Menu tab
  4. Click the Radio Button option Start Menu
  5. Then click Customize
  6. Click the Advanced tab
  7. Scroll down and click the Radio Button option under "System Administrative Tools," labeled Display on the All Programs menu and the Start Menu.
  8. Click Ok, then click Ok.
  9. Now you have to adjust our "preferences." You should be viewing your desktop.
  10. Click Start
  11. Click Administrative Tools while the rollover menu is still there, click Local Security Policy
  12. On the left side of the screen click the + so its a – on the Local Policies menu.
  13. Then click on Security Options
  14. Then make sure the following is changed to or is the option in bold.
    1. Interactive logon: Do not display last user name. Change it to Enabled
    2. Interactive logon: Do not require CTRL+ALT+DEL. Change it to Disabled*
    3. Interactive logon: Message text for users attempting to log on. Change it to anything you want, on mine it is: "Welcome to YanoNet! By touching this computer you are agreeing to the EULA. Thank you. If you need an account please contact the administrator."(This text will appear as shown in Figure 1.3)
    4. Interactive logon: Message title for users attempting to log on: Change it to anything you want. Mine is: Welcome to YanoNet!" (White text in the top bar of Figure1.3)
    5. System cryptography: User FIPS compliant algorithms for encryption, hashing, and signing. Enabled
    6. System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links) Enabled

If you have followed these steps correctly your computer is now set to login as if you are on a network. Next time you reboot you will see a screen like this.


Figure 1.2

To start the login process, press Control-Alt-Delete. You will now be presented with the message text that you created in step 14.3 and 14.4.

Figure 1.3


Press OK to accept the message and you will be presented with the logon screen as show below.


Figure 1.4


You can now enter your account information to logon to Windows.

As always if you have any questions please do not hesitate to ask them in the computer help forums.

Bleeping Computer Microsoft Advanced Concepts Tutorial
BleepingComputer.com: Computer Help & Tutorials for the beginning computer user.



Users who read this also read:

  • What is Domain Name Resolution Image
    What is Domain Name Resolution

    When using the Internet most people connect to web sites, ftp servers or other Internet servers by connecting to a domain name, as in www.bleepingcomputer.com. Internet applications, though, do not communicate via domain names, but rather using IP addresses, such as Therefore when you type a domain name in your program that you wish to connect to, your application must first convert ...

  • TCP and UDP Ports Explained Image
    TCP and UDP Ports Explained

    In this tutorial we will discuss the concept of Ports and how they work with IP addresses. If you have not read our article on IP addresses and need a brush up, you can find the article here. If you understand the concepts of IP addresses, then lets move on to TCP and UDP ports and how they work.

  • All about Networks Image
    All about Networks

    With so much of Computer use these days revolving around the Internet and communicating with others, its important that you understand what exactly a network is. Without networks, all communication between your computer and other computers whether it be instant messaging, email, web browsing, or downloading music could not be achieved. This tutorial will strive to teach you about networks and ...

  • Tutoriel HijackThis - Comment utiliser HijackThis pour supprimer les pirates de navigateur, les pubs & les espiogiciels Image
    Tutoriel HijackThis - Comment utiliser HijackThis pour supprimer les pirates de navigateur, les pubs & les espiogiciels

    HijackThis ne doit être utilisé que dans le cas où votre navigateur ou votre ordinateur continue à avoir des problèmes après l'exécution de Spybot-S&D ou d'un autre nettoyeur d'Espiogiciels (Spyware)/Pirates (Hijackers). HijackThis est un outil évolué, et par conséquent il requiert des connaissances approfondies ...

  • IP Addresses Explained Image
    IP Addresses Explained

    Every machine on the the Internet has a unique number assigned to it, called an IP address. Without a unique IP address on your machine, you will not be able to communicate with other devices, users, and computers on the Internet. You can look at your IP address as if it were a telephone number, each one being unique and used to identify a way to reach you and only you.



blog comments powered by Disqus
search tutorials


Remember Me
Sign in anonymously