Desktop Authority Management Suite


Desktop Authority Management Suite - Profile Home

Desktop Authority Management Suite Profile Home

Configure your questions-and-answers user profile and manage your passwords.

Desktop Authority Management Suite - Add New Domain

Desktop Authority Management Suite Add New Domain

Specify the domain that will be added to the user scope.

Desktop Authority Management Suite - Default Management Policies

Desktop Authority Management Suite Default Management Policies

Apply default management policies for self-service workflows. The addition of new management policies is available as well.

Desktop Authority Management Suite - Instance Initialization

Desktop Authority Management Suite Instance Initialization

Select a unique instance or replica of an existing instance for the type of instance you want to create.

Desktop Authority Management Suite - Password Policy

Desktop Authority Management Suite Password Policy

Set up the policy rules that define which passwords to accept or reject.

Desktop Authority Management Suite - Report

Desktop Authority Management Suite Report

Create reports with standard parameters to view changed passwords, users registered, profiles changed, profiles locked, passwords reset and accounts unlocked.

Desktop Authority Management Suite - Reports List

Desktop Authority Management Suite Reports List

Run reports that provide data on lists of users, summary of actions performed by each user, monthly number of users registered and more.

Centralized, secure and consistent desktop management software for Windows environments

  • Easily target user configurations
  • Customize user-based configurations without logon scripts
  • Balance security with user productivity
  • Keep mobile users working while also maintaining a secure network


Desktop Authority Management Suite is comprised of two solutions: Desktop Authority Standard and Privilege Manager. Together, these desktop management software solutions enable admins to proactively provision and manage the Windows user environment. With this suite, you can easily create a secure, consistent environment for each user, and ensure that applications run with only the privileges and access needed.

Easily target user configurations

Easily establish who among the tens, hundreds or thousands of users within an organization should get a particular configuration setting. Let Desktop Authority and Privilege Manager ensure that the right configurations and administrative privileges are always presented to the right users, no matter where they are or how they log in.

Customize user-based configurations without logon scripts

Combine traditional desktop management software with user environment management for a simple yet robust way to automate user configurations. Easily configure each user environment as a unique mix of OS, applications, printers and more, as well as corresponding drivers, Registry edits, proxy settings or other configuration changes.

Balance security with user productivity

Selectively target configurations and privileges to ensure security is balanced with productivity. You can keep sensitive data from exiting your organization and vulnerabilities from being introduced by end users, without limiting capabilities or causing productivity issues for users on daily tasks.

Keep mobile users working while also maintaining a secure network

Support users anywhere. Remotely manage issues “behind the screen” using more than 30 different management tasks without disturbing users or remote control the desktop to resolve a problem.


Targeted criteria-based configuration settings
Easily define configurations based on user or organizational identity, type of machine and operating system, virtual or physical environment, connection type and more. Desktop Authority presents more than 40 predefined criteria to automatically deploy unique desktop configurations. Those criteria encompass the user, the computer, type of desktop (physical, terminal or virtual) and deployment timing.
Easy user management
Automate updates of targeting criteria. Desktop Authority evaluates the targeting criteria at the time the profile is applied, and changes targeting automatically when users move to different locations, log in to different machines or access Terminal Servers. If a user changes something, Desktop Authority will re-apply the desired setting the next time the profile refreshes
Configuration of groups and elements
Configure and deploy more than 30 unique elements quickly and easily, and to the appropriate subset of the organization. Combine configuration elements into profiles to represent locations and groups of users—even a disaster recovery configuration—to make it even easier to meet the current business needs of your users.
Targeted administrative privileges
Avoid the need to create and maintain many overlapping security groups to try and target rules at the desired targets. Privilege Manager uses a subset of Validation Logic criteria to target elevated administrative privileges for users and applications that need this access to be productive.
Maintained privileges regardless of location
Keep your mobile users working, and your network secure. Validation Logic’s advanced targeting features ensure the correct elevation settings always apply when a user travels between offices.
Elimination of logon scripts
Select (instead of code) desktop configurations through a simple web interface, and avoid taking the time to write and test—as well as execute—custom logon scripts at each login. Selections include drive mappings, Registry settings, Office and Outlook settings, printers, message boxes, PC power management and more.
Reduced, simplified Group Policy management
Precisely target the deployment of 2,400-plus available Group Policies. Desktop Authority parses ADM/ADMX templates and allows deployment of Windows configuration settings using more than 40 criteria of Validation Logic.
Controlled Internet browser behaviors
Bring virtually every aspect of Internet Explorer and Mozilla Firefox under your direct control with Desktop Authority’s Internet Browser management object. With more and more applications delivered via an Internet browser, cohesively managing browser configurations is a mission-critical task.
Configuration across various environments
Gain precise configuration control across every delivery infrastructure – physical, virtual, or published – all from a single solution. Physical desktops are no longer the only devices users work with. Today’s business computing optimizes user interactions across virtual desktops and published environments.
Secure installation of trusted apps
Allow users to simultaneously install the latest version of Adobe Reader or apply the latest Java update themselves with Privilege Manager. Simultaneously maintain endpoint security by preventing installation of viruses and unwanted apps. Users are also able to request elevated privileges by sending a request to the administrator who can deny or approve and notify the user on request status.
Endpoint lock down
Control both device usage (like flash drives, printers, cameras and mobile devices) as well as port access (such as serial, infrared, USB and more)—all according to each user's unique levels of authentication and access—with the Desktop Authority USB and Port Security component. Choose which level of access you provide by targeting Read, Write, Full Access or Full Deny. Secure user environments aren't only about the software and permissions configured for a user. They're also about the devices each user can introduce into that configuration.
Quick admin-privilege applications discovery
Discover which applications being used require administrative privileges with Privilege Manager. Once discovered, you can easily create privilege elevation rules so users can use applications without disruption
Centralized deployment of remote management
Ensure security, privacy and productivity. All remote desktop management functionality is deployed as part of the desktop configuration, complete with multiple security and user experience settings.
Management of remote user desktops
Enable remote Windows support professionals using any standard Java-enabled browser over a 128-bit SSL session to work "behind the screen" to resolve issues without needing to interact with the user. Save time and prevent frustration, while allowing user productivity to remain high.
Remote control of user desktops
Enable the same browser-based support session to be used to establish IT remote control or remote viewing of the desktop that needs attention when issues require the support professional to interact with the user. IM with users during the session and, if needed, blank the screen when entering credentials.
User, device, and admin control
Easily determine whether privilege policies need modification to meet compliance requirements by gathering all privilege usage information into a central database and run domain-level analysis. Desktop Authority provides turnkey and custom reports on user activity by collecting information about each user and computer under management. The USB and Port Security component provides reporting on access and details on transferred data.


Desktop Authority Standard

Server Requirements

Operating systems
  • Microsoft® Windows Server® 2003 (32-Bit or 64-Bit)
  • Windows Server R2 SP2 (32-Bit or 64-Bit)
  • Windows Server 2008(32-Bit or 64-Bit)
  • Windows Server 2008 R2
  • Windows Server 2012
Domain controllers
  • Windows Server 2003 domain
  • Windows Server 2008 domain
  • Windows Server 2008 R2 domain
  • Windows Server 2012 domain
Database server
  • Microsoft SQL Server version 2005 or higher
Installed if necessary
  • Microsoft .NET Framework version 3.5 SP1
  • Microsoft .NET Framework, Hotfix KB981119
  • Microsoft Visual C++ 2005 Redistributable Package
  • Microsoft SQL Server 2005 Backward Compatibility
  • Microsoft SQL Server 2008 R2 Express – Installed if an existing SQL Server instance is not selected.
  • Microsoft Internet Information Services (IIS) 6 or higher

Client requirements

Browser supported
  • Internet Explorer 8 or higher
  • Firefox 3.6 or higher
Screen resolution
  • 1024x768
Software application
  • Microsoft Windows Installer 3.1
  • Microsoft .NET 2.0 SP1

User permissions

User permission
  • One admin level account with read/write access to all NETLOGON share(s) and to be a member of the local Administrators group on all applicable workstations
  • One domain user level account

back to top

Privilege Manager

Console requirements

System requirements
  • .NET Framework 3.5 Service Pack 1 or later
  • Microsoft Group Policy Management Console (required to run Privilege Manager)
Operating systems
  • Windows XP SP3 or higher
  • Windows Server 2003 SP1 or higher
  • Windows Vista
  • Windows Server 2008
  • Windows Server 2008 R2
  • Windows 7
  • Windows 8
  • Windows Server 2012
  • Microsoft SQL Express 2008 or later version.
  • Microsoft SQL Server 2008 or later version.

Privilege Manager should be deployed as a part of the Active Directory infrastructure.

User permissions
  • Local administrator rights to start Privilege Manager Console
  • Write permissions to Group Policy Objects to be configured

Client requirements

Operating systems
  • Windows XP SP3 or higher
  • Windows Server 2003 SP1 or higher
  • Windows Vista
  • Windows Server 2008
  • Windows Server 2008 R2
  • Windows 7
  • Windows 8
  • Windows Server 2012

back to top

Detailed requirements

Download free trial to see the full list of system requirements.