
Surprisingly the problem occurs to some users only. When the user runs “control userpasswords2” or “netplwiz” commands, the checkbox is missing in these programs. The latest Windows 10 version 2004 (or May 2020 Update) doesn’t show the required “Users must enter a user name and password to use this computer” checkbox to some selected users. The problem started when Microsoft released version 2004 of Windows 10 operating system.

You can disable auto login at any time.Whichever method you choose to set auto login, always use a unique password created just for this purpose.Don’t log in automatically with an admin user.Please read and understand this description and the cited Microsoft documentation.Before using Classic Auto Login, always make sure that the convenience of auto login is worth the security risks involved.However, I only log on to my work computer with a password. For example, I use multiple physical and VirtualBox virtual machines with auto login for software testing. There are some other special cases where automatic login is not a problem. Its use is only justified in case of computers exclusively used for gaming and/or media consumption. So using auto login is not recommended in most cases. The password stored by netplwiz can be retrieved in the same way as in case of Autologon. The issues described so far are also present during the configuration by netplwiz, which is available as part of the operating system. So the current user of the computer can find out the password if he/she uses the appropriate method. Despite the encryption, this method unfortunately provides no additional security compared to Classic Auto Login, as point one above is also fulfilled by this software. Microsoft has officially made available a similar software ( Autologon), which stores the password in an encrypted format at another place in the Registry.

The password of auto login is stored in the Registry in an unencrypted text format, so you can obtain the password knowing the required method.All the data and software that are available on the computer can be accessed, run, edited, deleted by practically anyone who has physical access to the computer.
