Chat now with support
Chat with Support

Quest has tools and processes in place to identify, protect, detect, and remediate vulnerabilities and incidents when they occur, including external security partners. As part of our standard security operations, Quest does not use CrowdStrike in any of our operations. We are reviewing our third parties, and so far, there is minimal affect. It is Quest's policy not to provide further technical details unless they directly impact customer data.

KACE Desktop Authority 11.3 - Administrator Guide

Administrator's Guide
Product Improvement Program Installation Help Concepts User Interface Validation Logic Configuration Computer Management User Management Reference File Paths
Setup Tool

Delete Database and Backup

If you want the uninstall to remove the database from MS SQL, select the appropriate boxes.

You have the opportunity to backup your databases before they are removed. If you would like to back them up for safekeeping, select the appropriate checkboxes and specify a location. The default location is in the MS SQL folder. If you want to specify a different folder, it must be local to the MS SQL server and have enough permissions for the backup to be created.

Logon Scripts

Desktop Authority User Management configurations are applied to client computers based on a logon script that is assigned to a user in Active Directory. This dialog of the uninstall gives you the option of removing the Desktop Authority logon script from the Active Directory user account. Select the box to remove the assignment.

Review

The installation is about to begin. To run Desktop Authority following the installation of its files, click the Launch Desktop Authority Manager after installation checkbox. Click Install to proceed with the installation.

The uninstall is about to begin. Click Uninstall to begin the first part of the removal of files. This will remove all program files and data if specified in the uninstall dialogs.

Removal Complete

As part of the uninstall process, an uninstall GPO will be created which will in turn remove any client side services. There will be a second part to the uninstall to remove the GPO when you are satisfied the services are removed from all client computers.

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating