Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Download Your Favorite Windows 10 Lock Screen Images

Tip of the Week: How to Download Your Favorite Windows 10 Lock Screen Images

What happens when you lock your Windows 10 PC? Unless you’ve changed your lock screen settings, you’re greeted with a dynamic background image that changes every day or so. Sometimes, Windows will show you an image that’s so good that you’ll want to download it so you can look at it more. But how does one go about this? For this week’s tip, we’ll show you how!

Unlike previous versions of Windows where lock screen images are pulled from a local folder with a few ho-hum stock photos in it, Windows 10 gets its lock screen images from a built-in feature called Windows Spotlight.

Unfortunately, due to the way that Windows Spotlight is set up, downloading an image from Spotlight isn’t as easy as opening a folder and dragging and dropping what you like. However, despite the fact Windows Spotlight isn’t very user friendly, navigating the feature to locate and download the photo you want is possible.

To get started, open Windows Explorer and click on the View tab (located to the right of Computer). Next, be sure to check both boxes for File name extensions and Hidden items.

windows 10 ib 0

Now you’ll copy and paste the file directory provided below into the Windows Explorer file path.
C:\Users\username\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\LocalState\Assets

In the file path, replace “username” with your user name and then hit Enter. This will take you to a window populated with files. These are the files that have been utilized by Windows Spotlight.

windows 10 ib 1

In order to put the photos at the top of this list, select the Size tab.

Next, make a new folder somewhere on your drive for you to move these Windows Spotlight images to, like on your Desktop or Pictures, and then open your new folder.

You will now want to move these photos to your new folder so you can sift through them and use them for however you please. Do this by selecting all the files greater in size than 100KB. Perform this task by selecting the file at the top of the list, then, while holding the Shift key, scroll down and select the one file that is greater than 100KB. With 30 or so files selected, you will next copy these files (Ctrl+C), and paste them in your new folder (Ctrl+P).

windows 10 ib 2

This move will bring up a prompt by Windows Security.

windows 10 ib 3

Go ahead and select OK. You don’t have to worry about these files harming your computer, since they’re already on your computer.

Now, with the files copied in your new folder, you’re going to want to rename each one and add a file extension to them so you can see what they are. Do this by right clicking the file and then selecting Rename.

windows 10 ib 4

By renaming the file to something simple like 1.PNG and then selecting Enter, you will see the icon for the file change to that of a photo. Also, go ahead and click View > Large icons if this makes renaming files more manageable for you.

windows 10 ib 5

With the file format changed, go ahead and double click the file to open it and reveal the image. With the image revealed, go ahead and name your file accordingly. Also, with the file saved on your PC, you can now access this folder and use these photos for however you fancy; like for your PC’s wallpaper, sharing over social media, memes, or whatever else you can think of.

Admittedly, this is a lot of work to go through in order to locate and isolate a photo that’s caught your eye. Although, when it comes to great art, they say that procuring it is half the fun!

For more great PC tips and tutorials, subscribe to Voyage Technology’s blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 22 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Managed Service Ransomware Mobile Device Microsoft Productivity Quick Tips Passwords Saving Money Communication AI Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Holiday Information Automation Artificial Intelligence Facebook Miscellaneous Covid-19 Training Compliance Gadgets Cloud Computing Server Remote Work Managed Service Provider Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Data Management Business Continuity Government Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Vendor Two-factor Authentication Mobile Office Managed Services Data Security Apps Mobile Device Management Tip of the week Chrome Gmail Budget Voice over Internet Protocol WiFi Apple Networking App Employer-Employee Relationship BYOD Computing Physical Security Hacker Information Technology HIPAA Avoiding Downtime Applications Marketing Access Control Office 365 Conferencing Managed IT Services How To BDR Computers Virtual Private Network Risk Management Router Website Health Office Tips Analytics Augmented Reality 2FA Help Desk Retail Storage Password Bring Your Own Device Healthcare Big Data Operating System Solutions Display Printer Paperless Office Infrastructure Windows 11 Monitoring Firewall Document Management Excel The Internet of Things Scam Managed IT Service Remote Workers Data loss Telephone Social Going Green Patch Management Cooperation Free Resource Project Management Save Money Windows 7 Remote Monitoring Vulnerability End of Support Customer Service Vendor Management Cybercrime Microsoft 365 Presentation VPN YouTube Meetings Cryptocurrency Wireless Technology Computer Repair Employees Integration Virtual Desktop Data storage User Tip LiFi Modem Mobile Security Processor Word Outlook Holidays Machine Learning Money Data Storage Smart Technology Supply Chain Humor Video Conferencing Managed Services Provider Professional Services Safety Saving Time Maintenance Virtual Machines Antivirus Sports Mouse Downloads Administration iPhone Licensing Vulnerabilities Entertainment Data Privacy Robot Customer Relationship Management Settings Images 101 Printing Wireless Mobility Telephone System Multi-Factor Authentication Content Filtering Hacking IT Management Cost Management Content Remote Working Wearable Technology Memory Vendors Network Congestion Knowledge Comparison Google Play Be Proactive Google Drive User Error Health IT User Motherboard Data Breach Assessment Electronic Health Records Permissions Workforce Directions Videos Point of Sale Wasting Time Threats 5G Experience Specifications Security Cameras Workplace Strategies IP Address Google Docs Unified Communications Trend Micro Bitcoin Network Management Internet Exlporer Software as a Service Running Cable Tech Support Fraud Meta Microchip Google Wallet Username Managing Costs Amazon Monitors Black Friday SSID Recovery eCommerce Hard Drives Windows 8 Database Surveillance Laptop Websites Virtual Assistant Outsource IT Domains Drones IT Technicians Virtual Machine Environment Media Electronic Medical Records Cyber Monday Medical IT SharePoint Proxy Server Reviews Cookies Refrigeration Tactics Development Halloween Hotspot Transportation Small Businesses Public Speaking Lenovo Mirgation Hypervisor Displays Writing Virtual Reality PowerPoint Lithium-ion battery Shopping Nanotechnology Optimization Hacks Server Management Addiction Entrepreneur Scary Stories Private Cloud Language Employer/Employee Relationships Outsourcing Superfish Management PCI DSS Identity Theft Chatbots Fun Navigation Twitter Distributed Denial of Service Workplace Gig Economy Deep Learning Screen Reader Undo Service Level Agreement Internet Service Provider Error Computing Infrastructure Teamwork Hiring/Firing Regulations Compliance Education Identity Social Engineering Evernote Paperless Smart Tech Memes Remote Computing Co-managed IT Bookmark Mobile Computing Download Net Neutrality Alerts SQL Server Technology Care Business Communications Financial Data Tablet History Search Connectivity IT Alert Break Fix Scams Browsers Smartwatch Application Best Practice Managed IT Upload Procurement Buisness File Sharing Azure Hybrid Work Dark Data Multi-Factor Security Tech Human Resources IBM Legal Social Network Telework IT solutions Cyber security How To IoT Communitications Notifications Dark Web Cables CES Business Growth Trends Supply Chain Management Travel Google Calendar Term Google Apps Techology Customer Resource management FinTech Google Maps Regulations Cortana Star Wars IT Assessment Microsoft Excel IT Maintenance Data Analysis Alt Codes Competition Gamification Flexibility Downtime Unified Threat Management Staff Value Business Intelligence Legislation Shortcuts Unified Threat Management Organization Hosted Solution Social Networking Typing Smart Devices Ransmoware Fileless Malware Digital Security Cameras

Blog Archive