Chatee ahora con Soporte
Chat con el soporte

KACE Desktop Authority 11.1 - Administrator Guide

Administrator's Guide
Product Improvement Program Installation Help Concepts User Interface Validation Logic Configuration Computer Management User Management Reference File Paths
Setup Tool

Profile Settings

The Profiles branch of the Navigation pane is where all the client configurations take place. The profile tree is broken up into Computer Management Profiles and User Management Profiles. Within each section, profiles are created and objects are configured within each profile. Objects are intuitively divided into their respective sections of the profile tree.

Computer Management profile objects

User Management profile objects

*Note: These features are not available for Desktop Authority Essentials. To obtain these features, Desktop Authority Essentials must be upgraded to the Standard edition of Desktop Authority.

MSI Packages is only available to customers who use Desktop Authority Professional.

Computer Management


© 2019 Quest Software Inc. ALL RIGHTS RESERVED.

This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose other than the purchaser’s personal use without the written permission of Quest Software Inc.

The information in this document is provided in connection with Quest Software products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Quest Software products. EXCEPT AS SET FORTH IN THE TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, QUEST SOFTWARE ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL QUEST SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF QUEST SOFTWARE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Quest Software makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. Quest Software does not make any commitment to update the information contained in this document..

If you have any questions regarding your potential use of this material, contact:

Quest Software Inc.

Attn: LEGAL Dept

4 Polaris Way

Aliso Viejo, CA 92656

Refer to our Web site (https://www.quest.com) for regional and international office information.

Patents

Quest Software is proud of our advanced technology. Patents and pending patents may apply to this product. For the most current information about applicable patents for this product, please visit our website at https://www.quest.com/legal.

Trademarks

Quest, the Quest logo, and Join the Innovation are trademarks and registered trademarks of Quest Software Inc. For a complete list of Quest marks, visit https://www.quest.com/legal/trademark-information.aspx. All other trademarks and registered trademarks are property of their respective owners.

Legend

Warning: A WARNING icon indicates a potential for property damage, personal injury, or death.

Caution: A CAUTION icon indicates potential damage to hardware or loss of data if instructions are not followed.

IMPORTANT, NOTE, TIP, MOBILE, or VIDEO: An information icon indicates supporting information.

 

Desktop Authority Administrator Guide
Updated - December 2019
Software Version - 11.1

What is Computer Management?

Computer Management allows computers in the enterprise to be configured whether or not a user is logged in to the system. Configurations that apply to the computer operating system, as well as configurations that apply to all users, can be configured.

Computer Management configurations are applied by the Computer Management Agent. This agent runs as a Windows service, starting when Windows is started and always available to apply configuration until Windows is shut down. The agent can apply configured settings at Windows Startup and Shutdown, at Refresh intervals, and at any scheduled time established by the admin. Desktop Authority uses patented Validation Logic for Computer Management so the admin can target computer specific settings based on a robust set of selection criteria.

Computer Management is especially helpful in configuring desktops during non-working hours and in configuring servers, where there may be no user logins to trigger configurations and where you want to manage the environment rather than the user’s environment.

Application Launcher

The Application Launcher object allows you to define and launch applications on the client computer at Startup, Shutdown, defined Refresh intervals or based on customized Schedules.  

In addition to launching standard applications, such as Internet Explorer or Outlook, the Application Launcher object is the perfect way to update your client’s anti-virus signatures, using the update executable supplied by the vendor of your anti-virus software.

The Computer Management Application Launcher cannot be used to launch or execute anything that requires user interaction or shows a dialog box. This is because the Computer Management Service runs as a non-interactive service and cannot present anything to a user.

Learn more about the Configuration Element list

Settings

Application
File name including path

Enter the complete path and filename where the application’s executable exists or click Browse to locate the executable’s path. Desktop Authority’s dynamic variable selection is available for this field by pressing F2.

Arguments

Enter any optional parameters (switches) to be passed to the launched application.

Launch asynchronously

Select this check box to run the application asynchronously. In asynchronous mode, the applications will run at the same time. If this check box is cleared, applications will run one after another. Each application must complete before the next one will begin.

Continue execution after xx hours, xx minutes, if the application has not closed

When launching an application, Desktop Authority may stop its processing if the application does not finish processing and close successfully. A machine reboot will allow Desktop Authority to complete. Select this checkbox to allow Desktop Authority to continue processing even if the Application launcher action does not complete. Enter the amount of time, in hours and minutes, for Desktop Authority to wait for the application completion.

If the application is still processing after the time has elapsed, Desktop Authority will execute the profile object element, leaving the current application process started.

Execution Options

Balloon
Show Balloon message to user before element executes

Check this box to show a pop up message from the system tray before each Desktop Authority element is executed on the computer. Enter the message text into the Text box.

Permission
Ask user's permission to execute element

Select this box to pause execution and request permission via a message box to execute an element on the desktop. Enter a message into the Text box. This text will be used on the on permission message box.

Text

Enter the text that will be displayed to the user to request permission to execute the application.

Message box will timeout after xx seconds

When permission is requested from the user, the message box will be displayed for the number of seconds specified here.

Default answer if message box times out

If there is no response during the timeout period, the message box will be accepted or dismissed based on the specified default answer.

Authorized by

Optionally enter then name of the person who authorized the specified configuration to take place.

Reboot
Reboot after element executes

Select this option to determine the timing in which a reboot will take place, if required, by the executed element.

Reboot type
Reboot immediately without user interaction

Allow the required reboot to happen immediately following the element configuration.

Reboot with count down (machine will reboot when count down dialog comes out, unless postponed)

The user will be provided a countdown timer before the reboot event occurs. Specify the number of seconds for the countdown in the Seconds until reboot box.

Remind user that a reboot is required (will not reboot unless user approves)

Select this option to delay the reboot to a time that the user deems acceptable.

Reboot timeout
Seconds until reboot

Enter the number of seconds to count down until reboot occurs.

Allow users to postpone reboot

Select this box to allow the user to postpone the impending reboot.

Timing

Select the Timing tab to configure when this element will be executed. Computer Management objects can execute at computer Startup, Shutdown, defined Refresh intervals or based on customized Schedules.

Validation Logic

Select the Validation Logic tab to set the validation rules for this element.

Notes

Select the Notes tab to create any additional notes needed to document the profile element.

Description

When adding or modifying a profile object element, the description appears above the settings tab. Enter a description to annotate the element. The default value for new profile elements can be changed by going to the system Preferences.

Documentos relacionados

The document was helpful.

Seleccionar calificación

I easily found the information I needed.

Seleccionar calificación