Automating Do Not Disturb Based on Location


Recommended Posts

The default do not disturb only allows you to turn it on / off based on time. 

 

I work different shifts and not all are in my calendar so I don't want an app to read my calendar but rather use location to turn on do not disturb.

 

IFTTT seems to work but I was reading something about "Automate" by Llama that can "learn" when I am at work based on cell towers.

 

Can anyone shed anymore light on this? Tried Automate and couldn't understand the flows thing or what I needed it to check.

 

Or are there any other apps I should consider?

 

Cheers

What Android/Phone are you using?  With Android 11 you can set up a rules based on location (System > Advanced > Rules > Add rule) with "Do not disturb" being an option.  I don't know if this is just with 11 (I never used 9-10).

You can also do this using Tasker. While I don't use the DnD option on my phone, I have set a rule that says when I am at home (based on my GPS location)  it should switch the profile to silent, and when I leave the house (i.e. when I am outside of that GPS location) it should switch the sounds on (ringtone, notification tone).

  • Like 1

I have a P30 Pro, which I assume is on Android 10 as I don't have that "rule" option.

 

Will take a look at tasker, although when I used IFTTT, it seemed to drain my battery a little more, even though the location (GPS) is on all the time anyway.

  On 15/10/2020 at 19:47, Sir Topham Hatt said:

I have a P30 Pro, which I assume is on Android 10 as I don't have that "rule" option.

Expand  

Oh sorry, I should clarify that I created the rule in Tasker! It's a great app for doing all kind of things like this.

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Posts

    • AS data is written to 1 disk its also written to the other disk in the raid pool. RAID - Wikipedia
    • Its still there, but annoyingly you have to left click the word now and not right click as many millions of peoples muscle memory are quickly finding out.
    • Their initial offerings (AV) were fine, but then there was just absolute stagnation and they had no idea what to do with themselves so they created solutions to problems that really didn't exist, convinced users they did but then realised nobody was buying into it, so bundled their bloated crap with OEM builds. Arguably, the whole AV market got a bad name with end consumers for a period because of companies such as Norton.
    • Windows Server 2025 security baseline to get more frequent updates, streamlines settings by Paul Hill Microsoft has announced the release of the June 2025 revision of its security baseline package for Windows Server 2025 (v2506), it is now available to download from the Microsoft Security Compliance Toolkit. After downloading it, you can test the recommended configurations in your environment and customize or implement them as you see fit. To deal with the evolving threat landscape, new Windows features, and community feedback, Microsoft is planning to revise the Windows Server baseline more frequently in the future. Windows Server security baselines are a collection of Microsoft-recommended configuration settings that help administrators establish secure and consistent Windows Server environments. This is the first security baseline update for Windows Server 2025 since January, a summary of the changes is presented in this table: Security Policy Change Summary Deny log on through Remote Desktop Services Allow remote logon for non-admin local accounts on MS and add “BUILTIN\Guests” to both DC and MS. WDigest Authentication Remove from the baseline Allow Windows Ink Workspace Remove from the baseline Audit Authorization Policy Change Set to “Success” in both DC and MS Include command line in process creation events Enable in both DC and MS Control whether exclusions are visible to local users Moved to Not Configured as it is overridden by the parent setting. Of these changes, the removal of WDigest Authentication and the addition of Include command line in process creation events are significant. Microsoft said it removed WDigest Authentication from the security baseline because it is no longer necessary for Windows Server 2025. The policy was originally enforced so that WDigest couldn’t store plaintext passwords in memory, which was a significant theft risk. Since the 24H2 update in Windows Server 2022, the policy has been deprecated, so there’s no need to enforce this setting. The update also adds Include command line in process creation events to improve the visibility of how processes are executed across the system. By capturing the command-line arguments, it makes it easier to detect and investigate malicious activity that may otherwise seem legitimate. If you want to learn more about the other changes in a bit more depth, refer to Microsoft’s announcement of this security baseline update.
  • Recent Achievements

    • One Month Later
      Leonard grant earned a badge
      One Month Later
    • Week One Done
      pcdoctorsnet earned a badge
      Week One Done
    • Rising Star
      Phillip0web went up a rank
      Rising Star
    • One Month Later
      Epaminombas earned a badge
      One Month Later
    • One Year In
      Bert Fershner earned a badge
      One Year In
  • Popular Contributors

    1. 1
      +primortal
      537
    2. 2
      ATLien_0
      205
    3. 3
      +FloatingFatMan
      167
    4. 4
      Michael Scrip
      151
    5. 5
      Som
      127
  • Tell a friend

    Love Neowin? Tell a friend!