Prior to downloading this Software, you must review the Software Transaction Agreement located here and confirm, by clicking the I agree check box below, that your organization accepts and is bound by the terms and conditions of the Software Transaction Agreement for this Software.
If you purchased the licenses for this Software by executing an order form with Quest or if you have an agreement with Quest that states that all purchases are governed by such agreement, then the terms and conditions of that agreement supersedes and takes precedence over the Software Transaction Agreement.
With KACE Desktop Authority you can proactively configure, manage, secure and support each unique user workspace, quickly and easily, through a single console. Minimize the hassles of deploying and securing individual devices by customizing devices at the first log-in while configuring the firewall and controlling browser security for physical, virtual and published Windows environments.
With KACE Desktop Authority you can proactively configure, manage, secure and support each unique user workspace, quickly and easily, through a single console. Minimize the hassles of deploying and securing individual devices by customizing devices at the first log-in while configuring the firewall and controlling browser security for physical, virtual and published Windows environments.A new mino...
Please refer to the KACE Desktop Authority 11.3.0.5010 Full Build Update Release Notes below for additional information and instructions on implementing this update. Immediately after installation or upgrade it is highly recommended to follow KB article SL4593 to configure your anti-virus exclusions. Note: if upgrading from v10.2 or earlier with NLA (Network Location awareness) enabled, please ref...
With KACE Desktop Authority you can proactively configure, manage, secure and support each unique user workspace, quickly and easily, through a single console. Minimize the hassles of deploying and securing individual devices by customizing devices at the first log-in while configuring the firewall and controlling browser security for physical, virtual and published Windows environments.