
- Windows 11 auto login requires you to first disable modern sign-in options like PINs and biometrics in Windows Hello.
- Common tools to configure auto login include the `netplwiz` utility, the Registry Editor (`regedit`), Sysinternals Autologon, and auto login based on user proximity.
Before You Begin: Keep in Mind the Security Risks of Auto Login
Enabling automatic login trades security for convenience. Before you proceed, it's crucial to understand exactly what you're giving up. While this feature might seem suitable for a physically secure, single-user machine, it introduces a significant attack vector in almost any other context, especially professional ones.
The primary defense of any computer is its login screen. By enabling auto login, you remove that barrier entirely. Anyone with physical access to your machine can simply turn it on and gain immediate, unrestricted access to all your files, applications, and saved credentials. This includes your emails, financial data, and any sensitive business information stored on the device.
Key Methods for Windows 11 Auto Login;
When it comes to setting up auto-login on Windows 11, there are various methods to choose from. These options vary in both complexity and security. Depending on your needs — whether you prioritize convenience or strong protection — you can pick the method that best suits your situation. Some of these methods store passwords in plain text in the Windows registry, which offers a lower level of security. On the other hand, more secure solutions encrypt the password, offering stronger protection against unauthorized access.
|
Method |
Password Storage Mechanism |
Security Level |
|
Registry Editor (regedit) |
Stored in plaintext in the Registry |
Extremely low |
|
netplwiz Utility |
Stored in a secure part of the Registry (LSA) |
Low |
|
Autologon for Sysinternals |
Stored encrypted in the Registry (LSA) |
Medium |
|
Passwordless auto logon based on user proximity |
Password replaced with passwordless second factor. It verifies ownership of an authenticator (mobile phone or a hardware token), and checks the physical presence. |
High |
In this section, we’ll explore different auto-login methods, starting with the most secure options designed for corporate environments, and moving toward simpler, built-in methods that are more convenient but less secure.
Prerequisite: Disabling Windows Hello Sign-in Options
Windows 11 prioritizes modern sign-in methods like PINs, facial recognition, and fingerprint readers through its Windows Hello framework. Windows Hello is designed to actively verify your identity at login.
A PIN is more secure than a password because it's tied to the specific device and its TPM (Trusted Platform Module), while biometrics confirm your physical presence. The core function of these tools is to require an explicit sign-in action. Therefore, to enable a feature that bypasses this action, you must first disable the security mechanisms that enforce it.
How to Remove Your PIN or Biometric Sign-in
You must revert to using a traditional account password before you can configure auto login.
-
Press `Win + I` to open Settings.
-
Navigate to Accounts > Sign-in options.
-
Click on the PIN (Windows Hello) section to expand it and select Remove. You will need to confirm your account password to proceed
-
If you have fingerprint or facial recognition set up, remove those sign-in methods as well.
-
Ensure the option "For improved security, only allow Windows Hello sign-in for Microsoft accounts on this device" is turned Off.
Method 1: Proximity-based login using Hideez
For environments with shared workstations, such as retail or warehouses, Hideez offers a proximity-based authentication solution that ensures both convenience and security. This method automatically locks the workstation when the user steps away, using Bluetooth to detect when they move out of range. As a result, the system remains secure without requiring manual logins or logouts, making it ideal for dynamic work environments where employees frequently switch between stations.
Supported authentication tools include Hideez’s mobile app or hardware security keys. With the Hideez Key, the workstation automatically unlocks when the key comes within range via Bluetooth, or users can tap the key on an NFC reader to unlock it. The Hideez Mobile App offers three options: users can unlock the workstation by pressing the 'Approve' button on their phone via Bluetooth, scanning a dynamic QR code displayed on the workstation screen, or tapping the phone against an NFC sticker placed near the workstation.

When the user steps away from the workstation, Hideez automatically locks it, using Bluetooth proximity to detect when the user moves beyond a defined range. This simple yet effective security measure ensures that the workstation is always protected, even in environments where multiple employees share the same device.
This is a highly secure and scalable solution which supports 10+ users per workstation and provides detailed event logs for administrators to track who accessed the system and when. The best part is that you can try it out by creating a free account on the cloud portal, with the option of an on-premise version or a private cloud tailored for your company. You can also book a personalized demo to see how it works within your organization and discover the additional benefits it offers.
Method 2: Using the Microsoft 'Autologon' Tool
For those who need to script or automate this process, the Autologon tool from the official Windows Sysinternals suite is the best option. It's a small, standalone executable that safely handles the configuration.
Unlike the manual registry edit, the Autologon tool does not store your password in plaintext. It encrypts the password and stores it in the Local Security Authority (LSA) secret area of the registry, which is the same method used by `netplwiz`. While still insecure compared to an active login, it is vastly superior to the plaintext method.
How to Download and Configure the Tool
Download the Autologon tool from the Microsoft Sysinternals website. It's a portable application, so no installation is required. Simply run `Autologon.exe`. The interface is minimal: enter your username, domain (for local accounts, this is typically the computer's name), and password, then click Enable.
Using Command-Line Arguments for Automation
The real power of Autologon is its command-line support, making it ideal for deployment scripts. The syntax is straightforward:
`autologon.exe [user] [domain] [password]`
For a local account, you can use a period (`.`) for the domain. A script might look like this:
`autologon.exe LocalAdmin . Pa$$w0rd123`
Method 3: The Easiest Way Using the 'netplwiz' Utility
The `netplwiz` command opens the classic User Accounts control panel, which provides the most straightforward way to enable auto login. This method is the best choice for most users who have made the decision to proceed.
With Windows Hello options removed, the process is simple:
-
Press `Win + R` to open the Run dialog box.
-
Type `netplwiz` and press Enter.
-
In the User Accounts window, select the user account you want to automatically log in.
-
Uncheck the box that says "Users must enter a user name and password to use this computer."

After clicking Apply, a new window titled "Automatically sign in" will appear. You must enter the password for the selected user account twice to confirm. Windows will save these credentials and use them to sign you in automatically on the next boot. This is the moment your password gets stored for later use, bypassing the login screen.
Method 4: Advanced Configuration via the Registry Editor
This method achieves the same result as `netplwiz` but involves manually creating the registry keys. It is highly discouraged because it requires you to store your account password in plaintext, making it visible to anyone or anything that can read the registry.
Creating and Configuring 'AutoAdminLogon'
Navigate to the following key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
In the right-hand pane, find the string value `AutoAdminLogon`. If it doesn't exist, right-click in the empty space, select New > String Value, and name it `AutoAdminLogon`. Double-click it and set its value to `1`.
Adding Your 'DefaultUserName' and 'DefaultPassword'
In the same `Winlogon` key:
-
Find the `DefaultUserName` string value and ensure it's set to the username of the account you want to auto-login (e.g., `user@outlook.com` or `LocalUser`).
-
Right-click in the empty space and select New > String Value. Name it `DefaultPassword`.
-
Double-click `DefaultPassword` and enter your account password in the "Value data" field. Click OK.
Your password is now stored in plaintext and is visible in this location. This is a significant security risk that modern authentication solutions are designed to eliminate entirely by removing the password from the authentication flow.
Troubleshooting Options
Problem 1. A common issue in Windows 11 is that the crucial checkbox in `netplwiz` is simply not there. In this case, this option is hidden if the setting "For improved security, only allow Windows Hello sign-in for Microsoft accounts on this device" is enabled under `Settings > Accounts > Sign-in options`. Even after disabling it, the checkbox may not reappear immediately. A registry edit is the most reliable way to force it to show up.
Problem 2. If disabling the Windows Hello requirement in Settings doesn't work, a quick registry modification will solve it.
-
Press `Win + R`, type `regedit`, and press Enter to open the Registry Editor.
-
Navigate to the following key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PasswordLess\Device -
In the right-hand pane, find the DWORD value named `DevicePasswordLessBuildVersion`.
-
Double-click it and change its value from `2` to `0`.
-
lick OK and close the Registry Editor. Relaunch `netplwiz`, and the checkbox will now be visible.
How to Stop Requiring a Password After Waking From Sleep
Configuring auto login at boot does not affect the password requirement when your PC wakes from sleep. This option is located in the main Sign-in options menu.
-
Open Settings (`Win + I`).
-
Go to Accounts > Sign-in options.
-
Scroll down to the "Additional settings" section.
-
Find the dropdown menu labeled "If you've been away, when should Windows require you to sign in again?".
You can choose between two options in terms of when Windows should require sign-in:
-
When the PC wakes up from sleep: This is the default and recommended setting for security.
-
Never: Select this option to prevent the login screen from appearing when you wake your computer.
Advanced Scenarios and Common Issues (FAQ)
Can I use auto login on a domain-joined computer?
Technically, yes, the methods above work for domain accounts. However, doing so is an extremely poor security practice and likely violates your organization's IT policies. It exposes domain credentials and creates a significant security hole that would fail any serious security audit. If you need guidance on how to enable auto-login securely for your specific scenario, contact us and we’ll walk through your case during a free consultation.
What about accounts with no password?
Creating a local account with no password at all will also result in an automatic login. However, Windows 11 strongly discourages this and will persistently prompt you to create a password. It's generally better to use a strong password and one of the auto-login methods if you absolutely need this functionality for a non-critical machine.
How to Temporarily Bypass Auto Login (The Shift Key Trick)
If you need to log into a different account on a machine configured for auto login, you don't need to disable it first. As the computer is booting, simply hold down the Shift key. This will interrupt the auto-login process and present you with the normal user login screen.
Auto Login Stopped Working After a Windows Update (e.g., 23H2)
Major Windows feature updates can sometimes reset security-related registry keys or re-enforce Windows Hello policies. If auto login stops working after an update, your first step should be to run `netplwiz` again. You may find the checkbox has been re-checked. If so, simply uncheck it and re-enter your credentials. If the checkbox is missing, you may need to re-apply the `DevicePasswordLessBuildVersion` registry fix.
