Chat now with support
Chat with Support

KACE Desktop Authority 11.1 - Installation and Upgrade Guide

What is Desktop Authority?

Quest® Desktop Authority®, the leading desktop management platform for Windows-based networks, significantly reduces total cost of desktop and application ownership by enabling administrators to proactively secure, manage, support and inventory desktops and applications from a central location. Desktop Authority centralizes control over desktop configurations, combining the functionality of logon scripting, group policies, user profiles and computer profiles into one comprehensive solution.

Desktop Authority is available in three versions, Desktop Authority Professional, Desktop Authority Standard and Desktop Authority Essentials. Desktop Authority Essentials is a scaled down version of Desktop Authority Professional. It does not include the following standard features included by default in the full version -- Software Management, USB/Port Security, Hardware and Software Inventory, Custom Reporting and the Desktop Authority Remote Management tool.

Desktop Authority Standard is a version of Desktop Authority that is geared towards enterprises who already use KACE Systems Management Appliance (SMA, previously known as K1000) or Microsoft's System Center Configuration Manager (SCCM) or other similar management tools. Since they provide tools for Software Distribution and Asset Management, Desktop Authority does not include its own built-in Software Distribution or Asset Management capabilities.

NOTE: Currently Desktop Authority Standard is the only version available to new customers for purchase.

This product includes a set of standard documents, such as the Administrator Guide, online help, Release Notes, and other manuals. For the latest version of the Desktop Authority documentation, visit the Technical Documentation page on the Quest Support Portal: https://support.quest.com/kace-desktop-authority/technical-documents.

Desktop configuration (user and computer management)

From a single server-based installation point, Desktop Authority assists administrators with the never-ending chore of configuring each desktop attached to the network. When a user logs on or off, their personalized configurations are applied to their environment. The Operating System and applications get "fine-tuned" to the specific user. Best of all, Desktop Authority does this without requiring you to reduce overall security, without maintaining separate security policies and without the need for a network administrator to visit each computer.

Desktop Authority allows administrators to centrally manage over 30 different categories of desktop settings including drive mappings, search paths, printer deployment,  Windows Firewall ports, Internet configuration & proxy settings, Microsoft Office paths, service pack, Group Policy Templates, Security Policies, desktop shortcuts, automatic mail profile creation for Outlook/Exchange, file operations, registry settings and more.

Desktop Authority also attends to each computer in the enterprise. Using a computer based agent, each computer can be configured and inventoried, independent of the users that log on to the computer.

Desktop Authority uses its patented Validation Logic technology to determine how each desktop will be configured.  The Validation Logic technology is based on over 20 validation types including the class of computer (such as desktop or portable), client operating system, group membership, Active Directory sites, OUs, and registry and file properties. Selection can be enhanced further using AND/OR expressions to combine multiple Validation Logic rules. Custom validation types can also be defined to allow configuration by desktop attributes list, Asset Tags or hardware configuration.

Software Management

Note: Not available in Desktop Authority Essentials.

MSI packages contain all necessary files an application needs in order for it to be installed using Microsoft's Windows Installer. Desktop Authority manages a repository of Microsoft Windows Installer (MSI) packages. Packages can be deployed to and/or removed from specified desktops based on User and/or Computer specifications.

USB/Port Security

Note: Not available in Desktop Authority Essentials

The myriad of portable storage mediums today make it essential for corporations to prohibit or monitor the use of certain devices on the company network. These devices can be very harmful to a corporation. Confidential data can easily be copied to any portable device, viruses can be introduced to the network and spread corporate wide and illegal software can be copied to the company network.

Since most portable devices are small in size it is simple for any employee to use these devices regardless of a written or verbal company policy. The user's ability to use these devices and/or transfer data to and from these devices must be restricted. The USB/Port Security object will do just this.

Users and/or groups of users can be restricted from using certain types of removable storage devices. Desktop Authority's USB/Port Security object will protect the company network against unauthorized usage of devices such as MP3 players, PDAs, WiFi and more.

The USB/Port Security Option can help to free the enterprise of unwanted removable storage devices, easily and quickly.

Role Based Administration

In larger organizations there are typically multiple levels of administrators, with junior ones assigned to specific geographical locations or restricted administration tasks. Desktop Authority’s new architecture allows Super Users to restrict other administrators to only view, change, and add or delete a limited set of configuration objects. By defining roles and applying those roles to users or groups at the profile level, SuperUsers can ensure that administration of Desktop Authority follows enterprise security boundaries.

Hardware and Software Inventory and Custom Reporting

Note: Not available in Desktop Authority Essentials.

Desktop Authority profiles and their configurations are stored in an SQL database, along with information about the managed desktop.  Built-in and custom reporting puts vital information at the fingertips of administrators, including reports on hardware and software inventory, and user activity.

Comprehensive Reporting includes built-in and custom reporting on Hardware/Software Inventory, User Activity and Desktop Authority configuration.

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating