KACE Desktop Authority

Centralized, secure desktop management software for Windows environments

Secure, privileged access to systems and data

Proactively configure, manage, secure, and support your users’ unique workspaces quickly and easily, through a single console with KACE Desktop Authority. Minimize the hassles of deploying and securing individual devices by customizing devices at the first log-in while configuring the firewall and controlling browser security for physical, virtual and published Windows environments. For software and applications, ensure applications are always available to users and maintain access to network resources.

Part of the KACE Desktop Authority Management Suite (DAMS), KACE Desktop Authority is the foundation for our centralized, secure desktop management software for Windows environments.

Customize Devices
Customize devices while configuring the firewall and controlling browser security for physical, virtual and published Windows environments.
Manage Applications
Make sure applications are always available and maintain access to network resources.
Maintain Identities
Shape user environments while instantly configuring drives, printers, folders, shortcuts, Outlook profiles, and more.
Empower Users
Let users customize their computers — within the limits you specify and without giving them local admin rights.

Features

Real-time targeting engine

Tailor settings and configurations by user, computer, network address or dozens of other criteria using patented Validation Logic targeting engine.

User environment configuration

Provide access to company resources, manage security settings, and configure Outlook profiles and Office settings, and more.

Windows environment management

Take control of your Windows environment by deploying software and service packs, controlling power schemes and inactivity settings, and tracking hardware and software.

Device security

Set security policies, manage the firewall, lock inactive computers and manage browser security and privacy settings for machines, applications and data.

Remote user support

Leverage the ExpertAssist remote management system to manage more than 40 computer tasks without interrupting the user.

    Lock down USB ports

  • Control exactly which USB devices are allowed on the network.

  • Reduce power consumption

  • Centrally configure power schemes and reduce power consumption across your network.

  • Import and configure GP templates

  • Seamlessly add support for products with ADMX file(s) using the Group Policy Template feature.

  • Target configurations with granularity

  • Get the correct configurations to the correct users, on or off the network.

  • Secure desktops when users are away

  • Automate security responses when users leave computers unattended.

  • Seamlessly deploy MSI packages

  • Silently deploy critical installation packages to endpoint devices with the MSI package feature.

Specifications

Operating systems

  • Windows Server 2008 Standard/Enterprise (32/64 bit)
  • Windows Server 2008 R2 Standard/Enterprise
  • Windows Server 2012
  • Windows Server 2012 R2 Standard/Enterprise
  • Windows Server 2016 

Domain controllers

  • Windows Server 2008 domain
  • Windows Server 2008 R2 domain
  • Windows Server 2012 domain
  • Windows Server 2012 R2 domain
  • Windows Server 2016 domain 

Database server

  • Microsoft SQL Server version 2008 or higher

Installed if necessary

  • Microsoft .NET Framework version 3.5 SP1
  • Microsoft .NET Framework, Hotfix KB981119
  • Microsoft Visual C++ 2005 Redistributable Package
  • Microsoft SQL Server 2008/2014 R2 Express — Installed if an existing SQL Server instance is not selected
  • Microsoft Internet Information Services (IIS) 7 or higher

Browsers supported (Console)

  • Internet Explorer® 11
  • Firefox® 3.8 or higher
  • Chrome™ 44 or higher
  • Microsoft Edge™ 25 or higher

Screen resolution

  • 1024x768

Operating systems

  • Windows 7
  • Windows 8.1
  • Windows 10
  • Windows Server 2008
  • Windows Server 2008 R2
  • Windows Server 2012
  • Windows Server 2012 R2
  • Windows Server 2016 

Installed if necessary

  • Microsoft Windows Installer 3.1
  • Microsoft .NET 2.0 SP1

Browsers supported

  • Internet Explorer® 11
  • Firefox® 3.8 or higher
  • Chrome™ 44 or higher
  • Microsoft Edge™ 25 or later

Screen resolution

  • 1024x768
  • One admin-level account with read/write access to all NETLOGON share(s) and to be a member of the local Administrators group on all applicable workstations
  • One domain user-level account

Resources

Desktop Authority Management Suite
Datasheet
Desktop Authority Management Suite
Desktop Authority Management Suite
Proactively configure, manage, secure and support all of your desktops
Read Datasheet
Quest Unified Endpoint Management
White Paper
Quest Unified Endpoint Management
Quest Unified Endpoint Management
Quest overview of Unified Endpoint Management and how to build an effective strategy.
Read White Paper
Mapping Your Requirements to the NIST Cybersecurity Framework
White Paper
Mapping Your Requirements to the NIST Cybersecurity Framework
Mapping Your Requirements to the NIST Cybersecurity Framework
To better understand how agencies can leverage the NIST Cybersecurity Framework to navigate the changing threat landscape, GovLoop partnered with Quest, a leader in helping build and manage modern, secure and more resilient IT architecture.
Read White Paper
Facing the Endpoint Reality: Unified Endpoint Management (UEM) Trends
Infographic
Facing the Endpoint Reality: Unified Endpoint Management (UEM) Trends
Facing the Endpoint Reality: Unified Endpoint Management (UEM) Trends
Endpoint security is one of the primary benefits of having a UEM solution in place. Uncover strategies to implement compliance mandates and reduce complexities.
View Infographic
Report: Industry Insights - Trends in Unified Endpoint Management
White Paper
Report: Industry Insights - Trends in Unified Endpoint Management
Report: Industry Insights - Trends in Unified Endpoint Management
Read this Unified Endpoint Management report to learn about trends, solutions and strategies to enhance your unified endpoint management.
Read White Paper
Credit union cuts disk imaging and deployment time by 70 percent
Case Study
Credit union cuts disk imaging and deployment time by 70 percent

Get Started Now

Control and secure your privileged management access.

Support and Services

Product Support

Self-service tools will help you to install, configure and troubleshoot your product.

Support Offerings

Find the right level of support to accommodate the unique needs of your organization.

Professional Services

Search from a wide range of available service offerings delivered onsite or remote to best suit your needs.

Education Services

Training courses delivered through online web-based, on-site or virtual instructor-led.