Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Lock Your Computer By Simply Walking Away With Dynamic Lock

Tip of the Week: Lock Your Computer By Simply Walking Away With Dynamic Lock

Security best practices demand that a workstation should never be left unlocked. However, it can be really tempting to leave it unlocked if you only plan on stepping away for a moment--but unfortunately, that moment can easily turn into many if you are distracted from your task. Fortunately, there is now a fix that relies on the one device most of us are never without: our phones.

If your computer has the Windows 10 Creators Update in place, you can connect your phone to your PC via Bluetooth so that the PC will automatically lock if the two devices are separated. This is accomplished with the help of a piconet, a short-range radio-wave network that Bluetooth devices use to function. Depending on the strength of the piconet, the devices can remain connected while further and further apart from each other.

The Creators Update allows you to create a piconet between your desktop and your phone, which keeps the Dynamic Lock from activating. However, if the phone is taken out of the piconet’s range, Dynamic Lock will lock the computer, protecting it from unauthorized users using it to access the network.

However, it must be said that Dynamic Lock is not instantaneous. First, your device has to be out of range, and secondly, the computer has to register the fact that the connection has been lost before Dynamic Lock will take affect. Regardless, activating Dynamic Lock is more secure than leaving a workstation unlocked indefinitely.

How to Set Dynamic Lock
Pairing your phone to your PC is a fairly simple process, but you should be sure to confirm the configuration with your IT department before activating Dynamic Lock.

If IT has approved the use of the Dynamic Lock feature, here is how it can be set up.

With Bluetooth enabled on the mobile device you want paired, open Settings and access Bluetooth & Other Devices. Make sure that Bluetooth is set to on. Click Add Bluetooth or Other Device, and a dialog box Add a device will open.

Once it does, select Bluetooth. Once you do, Windows will take a few moments to locate your device. Once it does, you will be prompted to confirm that the codes displayed on both your computer and your mobile device match. Once you click Done, you will be taken back to the Bluetooth & Other Devices page in Settings, where you should see your device displayed.

Now, select Home, navigate to Accounts, and select Sign-In Options. Find Dynamic Lock and make sure the box labelled Allow Windows To Detect When You're Away And Automatically Lock The Device is checked. Restart to ensure the settings are saved, and Dynamic Lock should be enabled and linked to your mobile device.

Your device should now automatically lock your workstation if brought too far out of range.

For more tips, be sure to subscribe to our blog!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 30 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support IT Services Privacy Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Small Business Microsoft Backup Productivity Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Android AI Disaster Recovery Data Recovery Upgrade Business Management VoIP Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Facebook Miscellaneous Holiday Automation Artificial Intelligence Information Gadgets Cloud Computing Training Covid-19 Remote Work Compliance Server Managed Service Provider Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Government Data Management Virtualization Wi-Fi Blockchain Windows 10 Business Technology Bandwidth Vendor Apps Data Security Two-factor Authentication Mobile Office WiFi Apple App Networking Employer-Employee Relationship Managed Services Voice over Internet Protocol BYOD Mobile Device Management Chrome Gmail Budget Tip of the week Applications How To BDR Conferencing Computing Hacker Information Technology Avoiding Downtime Marketing Office 365 Access Control HIPAA Router Storage Password Retail Bring Your Own Device 2FA Big Data Help Desk Managed IT Services Operating System Computers Healthcare Risk Management Website Virtual Private Network Analytics Office Tips Health Augmented Reality Document Management Windows 11 The Internet of Things Social Scam Excel Data loss Monitoring Going Green Patch Management Customer Service Remote Workers Cybercrime Save Money Remote Monitoring End of Support Vulnerability Telephone Vendor Management Physical Security Cooperation Free Resource Project Management Display Windows 7 Printer Paperless Office Infrastructure Microsoft 365 Firewall Solutions Safety Employees Sports Integration Mouse Modem User Tip Processor Maintenance Mobile Security Supply Chain Administration Antivirus Holidays Data Storage Smart Technology Video Conferencing Managed Services Provider Customer Relationship Management Saving Time Settings Virtual Machines Professional Services Printing Wireless Robot Content Filtering Hacking Managed IT Service YouTube Presentation Downloads iPhone Data Privacy Cryptocurrency IT Management Wireless Technology Licensing VPN Meetings Entertainment Vulnerabilities Virtual Desktop Data storage LiFi Images 101 Computer Repair Word Multi-Factor Authentication Mobility Outlook Telephone System Cost Management Money Humor Machine Learning Trend Micro Writing Specifications Security Cameras Outsource IT Deep Learning Lenovo Media Microchip Undo Internet Exlporer Software as a Service Virtual Reality Fraud Environment Education Server Management Username Private Cloud Managing Costs Identity Theft eCommerce Black Friday SSID Small Businesses Superfish Mobile Computing Database Surveillance Twitter Virtual Assistant Displays Search Error IT Technicians Virtual Machine Application Cookies Social Engineering Cyber Monday Medical IT Outsourcing Best Practice Proxy Server Reviews Buisness Tactics Development Remote Computing Hotspot Transportation Legal Workplace IT solutions IBM Mirgation Hypervisor Shopping Tablet Nanotechnology Optimization PowerPoint Hiring/Firing Business Growth Paperless Addiction Alert Language Employer/Employee Relationships Chatbots Dark Data Navigation Co-managed IT Managed IT Management PCI DSS Cortana File Sharing Gig Economy Screen Reader How To Distributed Denial of Service Technology Care Alt Codes Business Communications Downtime Competition Service Level Agreement Internet Service Provider Notifications Computing Infrastructure Teamwork Identity Evernote Scams Hosted Solution Regulations Compliance Travel Bookmark Google Maps Smart Tech Memes Hybrid Work Typing Techology Human Resources Download Net Neutrality Alerts SQL Server History Google Drive Cables Financial Data Knowledge Unified Threat Management User Browsers Smartwatch Connectivity IT Break Fix Unified Threat Management Google Apps Upload Procurement 5G Azure Cyber security Network Congestion Multi-Factor Security Tech Google Docs IT Maintenance Unified Communications IP Address Social Network Telework Experience CES Running Cable IoT Communitications Dark Web Business Intelligence Bitcoin User Error Google Wallet Shortcuts Trends Supply Chain Management Recovery Regulations Google Calendar Term Ransmoware Customer Resource management FinTech Point of Sale Data Analysis Laptop Hard Drives Star Wars IT Assessment Microsoft Excel Vendors Windows 8 Drones Be Proactive Network Management Domains Gamification Flexibility Tech Support Staff Value Social Networking Monitors Legislation Workforce Organization Fileless Malware Digital Security Cameras Halloween Refrigeration Smart Devices Threats Workplace Strategies Public Speaking Content Remote Working Websites Wearable Technology Memory Motherboard Data Breach Comparison Google Play Meta Lithium-ion battery Health IT Hacks SharePoint Directions Videos Scary Stories Assessment Electronic Health Records Electronic Medical Records Entrepreneur Permissions Amazon Fun Wasting Time

Blog Archive