For the best web experience, please use IE11+, Chrome, Firefox, or Safari

KACE Desktop Authority

Centralized, secure desktop management software for Windows environments. With KACE® Desktop Authority you can proactively configure, manage, secure and support each unique user workspace, quickly and easily, through a single console. Minimize the hassles of deploying and securing individual devices by customizing devices at the first log-in while configuring the firewall and controlling browser security for physical, virtual and published Windows environments.

KACE Desktop Authority
Configure, Manage and Secure Unique User Workspaces with KACE Desktop Authority 02:01

Secure, privileged access to systems and data

Business stakeholders require greater flexibility in IT operations, but administrators must still maintain a secure and consistent user environment. They can no longer rely on the traditional model of managing only the machine. Each user needs to be granted the right access to the right resources regardless of the device used.

KACE Desktop Authority is the foundation for our centralized, secure desktop management software for Windows environments, KACE Desktop Authority Management Suite. Along with KACE Privilege Manager, you can maintain the balance between security and user productivity while saving IT resources.

Benefits

Customize Devices

Customize devices while configuring the firewall and controlling browser security for physical, virtual and published Windows environments.

Manage Applications

Make sure applications are always available and maintain access to network resources.

Maintain Identities

Shape user environments while instantly configuring drives, printers, folders, shortcuts, Outlook profiles, and more.

Empower Users

Let users customize their computers — within the limits you specify and without giving them local admin rights.

Features

Real-time targeting engine

Tailor settings and configurations by user, computer, network address or dozens of other criteria using patented Validation Logic targeting engine.

User environment configuration

Provide access to company resources, manage security settings, and configure Outlook profiles and Office settings, and more.

Windows environment management

Take control of your Windows environment by deploying software and service packs, controlling power schemes and inactivity settings, and tracking hardware and software.

Device security

Set security policies, manage the firewall, lock inactive computers and manage browser security and privacy settings for machines, applications and data.

Remote user support

Leverage the ExpertAssist remote management system to manage more than 40 computer tasks without interrupting the user.

Tour

Lock down USB ports
Reduce power consumption
Import and configure GP templates
Target configurations with granularity
Secure desktops when users are away
Seamlessly deploy MSI packages
Lock down USB ports

Lock down USB ports

Control exactly which USB devices are allowed on the network.

Specifications

Operating systems
  • Windows Server 2019
  • Windows Server 2008 R2 Standard/Enterprise
  • Windows Server 2012 R2 Standard/Enterprise
  • Windows Server 2008 Standard/Enterprise (32/64 bit)
  • Windows Server 2012
  • Windows Server 2016 
Domain controllers
  • Windows Server 2008 domain
  • Windows Server 2012 domain
  • Windows Server 2016 domain 
  • Windows Server 2008 R2 domain
  • Windows Server 2012 R2 domain
Database server
  • Microsoft SQL Server version 2008 or higher
Installed if necessary
  • Microsoft .NET Framework version 3.5 SP1
  • Microsoft Visual C++ 2005 Redistributable Package
  • Microsoft Internet Information Services (IIS) 7 or higher
  • Microsoft .NET Framework, Hotfix KB981119
  • Microsoft SQL Server 2008/2014 R2 Express — Installed if an existing SQL Server instance is not selected
Browsers supported (Console)
  • Internet Explorer® 11
  • Chrome™ 44 or higher
  • Firefox® 3.8 or higher
  • Microsoft Edge™ 25 or higher
Screen resolution
  • 1024x768
Operating systems
  • Windows 7
  • Windows 10
  • Windows Server 2008 R2
  • Windows Server 2012 R2
  • Windows Server 2019
  • Windows 8.1
  • Windows Server 2008
  • Windows Server 2012
  • Windows Server 2016 
Installed if necessary
  • Microsoft Windows Installer 3.1
  • Microsoft .NET 2.0 SP1
Browsers supported
  • Internet Explorer® 11
  • Chrome™ 44 or higher
  • Firefox® 3.8 or higher
  • Microsoft Edge™ 25 or later
Screen resolution
  • 1024x768
  • One admin-level account with read/write access to all NETLOGON share(s) and to be a member of the local Administrators group on all applicable workstations
  • One domain user-level account

Resources

Datasheet

KACE Desktop Authority Datasheet

Seamless and centralized desktop management for true Windows environment management.
Datasheet

Desktop Authority Management Suite

Proactively configure, manage, secure and support all of your desktops
Infographic

Facing the Endpoint Reality: Unified Endpoint Management (UEM) Trends

Endpoint security is one of the primary benefits of having a UEM solution in place. Uncover strategies to implement compliance ...
White Paper

Report: Industry Insights - Trends in Unified Endpoint Management

Read this Unified Endpoint Management report to learn about trends, solutions and strategies to enhance your unified endpoint management.
E-book

Quest UEM Complete Ebook - Understanding Unified Endpoint Management

In this eBook, we discuss the factors driving endpoint management growth, as well as security and device challenges resolved by...
White Paper

Secure your endpoints: Don't fall victim to cyberattacks

Follow our endpoint security guidelines to address cybersecurity concerns and explore how Quest’s Unified Endpoint Management solution...
White Paper

Successful Microsoft Azure Migration with Quest® Data Empowerment Tools

Quest offers a variety of information and systems management tools, explained in our white paper that will guide you along the ...
White Paper

Access Denied: Threats to Endpoint Security in the Federal Government

Learn how Quest’s UEM solution help Federal organizations' IT departments face the challenges of endpoint security, compliance ...

Get started now

Control and secure your privileged management access.

Support and services

Product Support

Self-service tools will help you to install, configure and troubleshoot your product.

Support Offerings

Find the right level of support to accommodate the unique needs of your organization.

Professional Services

Search from a wide range of available service offerings delivered onsite or remote to best suit your needs.

Education Services

Training courses delivered through online web-based, on-site or virtual instructor-led.