Desktop Authority Management Suite - Profile Home
Configure your questions-and-answers user profile and manage your passwords.
Desktop Authority Management Suite - Add New Domain
Specify the domain that will be added to the user scope.
Desktop Authority Management Suite - Default Management Policies
Apply default management policies for self-service workflows. The addition of new management policies is available as well.
Desktop Authority Management Suite - Instance Initialization
Select a unique instance or replica of an existing instance for the type of instance you want to create.
Desktop Authority Management Suite - Password Policy
Set up the policy rules that define which passwords to accept or reject.
Desktop Authority Management Suite - Report
Create reports with standard parameters to view changed passwords, users registered, profiles changed, profiles locked, passwords reset and accounts unlocked.
Desktop Authority Management Suite - Reports List
Run reports that provide data on lists of users, summary of actions performed by each user, monthly number of users registered and more.
Centralized, secure and consistent desktop management software for Windows environments
- Easily target user configurations
- Customize user-based configurations without logon scripts
- Balance security with user productivity
- Keep mobile users working while also maintaining a secure network
Desktop Authority and Privilege Manager have robust reporting features for compliance verification, as well as confirmation that the environment is meeting user needs.
Audit user activity: This turnkey solution allows you to generate custom reports on user activity by collecting data on each user and managed computer.
Audit external device access: Desktop Authority’s USB and Port Security component provides audit reporting on secured device access, as well as details on data transferred to removable storage.
Audit administrative privileges: Easily meet your compliance requirements by determining whether privilege policies need modification. This is done by gathering all privilege usage data into a central database and running domain-level analysis. You can easily monitor privilege usage and desktop configuration changes to track compliance with mandates like FDCC/USGCB.