How to lock the computer automatically when we stop using it for a while

Windows 10 offers us different security options when it comes to protecting access to our computer either through a password, with an image pattern, with a PIN code or through Windows Hello technology with Intel's Real Sense cameras that are able to detect our face and unlock the device.

But if we also have a smartphone with Windows 10 Mobile and our computer has a bluetooth connection, Windows also allows us to link both devices so that when we move away with the smartphone, this being automatically blocks preventing access to anyone other than us.

But not everyone has a smartphone with Windows 10 Mobile, although with a few little tricks we can activate this function with an Android smartphone. Natively, Windows 10 also allows us to set an option with which we can set a specific time, which once it has elapsed will be in charge of blocking access to our computer by closing the session in which it is.

Incomprehensibly, this option is hidden within Windows security options and it is not easy to get to if you do not know exactly where it is located. Here are the steps to follow to be able to automatically block the PC with Windows 10 when a preset time has elapsed.

  • First of all we must go to the Cortana search box and type «gpedit.msc »
  • Next we go to Security options, where we can enable or disable some security functions related to the login, the operation of the devices we connect, limit access to accounts ...
  • But what interests us is found within the option «Interactive login: computer inactivity limit«.
  • By clicking twice on this option, a dialog box will open in which we have to set the number of seconds, after which the device will be locked, closing the user account and disabling access to it until Let's re-enter the password.

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.