Sing In Cbass On RegSing In Cbass On TopSing Out

User environment security

loading

Desktop Authority Management Suite - Profile Home

Desktop Authority Management Suite Profile Home

Configure your questions-and-answers user profile and manage your passwords.

Desktop Authority Management Suite - Add New Domain

Desktop Authority Management Suite Add New Domain

Specify the domain that will be added to the user scope.

Desktop Authority Management Suite - Default Management Policies

Desktop Authority Management Suite Default Management Policies

Apply default management policies for self-service workflows. The addition of new management policies is available as well.

Desktop Authority Management Suite - Instance Initialization

Desktop Authority Management Suite Instance Initialization

Select a unique instance or replica of an existing instance for the type of instance you want to create.

Desktop Authority Management Suite - Password Policy

Desktop Authority Management Suite Password Policy

Set up the policy rules that define which passwords to accept or reject.

Desktop Authority Management Suite - Report

Desktop Authority Management Suite Report

Create reports with standard parameters to view changed passwords, users registered, profiles changed, profiles locked, passwords reset and accounts unlocked.

Desktop Authority Management Suite - Reports List

Desktop Authority Management Suite Reports List

Run reports that provide data on lists of users, summary of actions performed by each user, monthly number of users registered and more.

Centralized, secure and consistent desktop management software for Windows environments

  • Easily target user configurations
  • Customize user-based configurations without logon scripts
  • Balance security with user productivity
  • Keep mobile users working while also maintaining a secure network

Secure endpoints: You can’t rely on software configurations and permissions to ensure a secure user environment. You also need to take into account user devices. Desktop Authority USB and Port Security controls device usage such as flash drives, printers, cameras and mobile devices. They also control port access such as serial, infrared, USB and more. Control hinges on the unique level of authentication and access for each user. And you choose the level of access by targeting Read, Write, Full Access or Full Deny.

Set policy with smart USB whitelisting or blacklisting: Set policy through whitelists (blocking everything and then explicitly allowing certain devices) or through blacklists (disallowed devices explicitly entered).

Elevate Windows operations for user flexibility and more: Some Windows features require administrative privileges, even those as simple as changing the time or time zone. Boost the productivity of users by elevating rights on specific processes with Privilege Manager. You can easily elevate the features they need, while keeping the rest locked down.

Discover applications that require elevated privileges: Identify applications in use that require administrative privileges with Privilege Manager’s discover mode. Once discovered, it’s easy to create privilege elevation rules so applications can be used without disruption.

Grant user rights to securely update and install trusted apps: Privilege Manager allows users to easily install the latest version of Adobe Reader or apply the latest Java update themselves. At the same time, endpoints are secured by preventing installation of viruses and unwanted apps. You can also provide users with the ability to request elevated privileges when needed. You can then send a request to the administrator to deny or approve, then notify the user once processed.

Confirm applications are approved for administrative privileges: You can use several methods to determine that an application is the one you intended for elevated privileges. Create elevation rules by application vendor or publisher, based on their digital certificate. This ensures only trusted applications are launched or elevated for users. Use the file hash feature to protect against users who rename files in an attempt to elevate a different application.