For the best web experience, please use IE11+, Chrome, Firefox, or Safari

KACE Desktop Authority

Centralized, secure desktop management software for Windows environments. With KACE® Desktop Authority you can proactively configure, manage, secure and support each unique user workspace, quickly and easily, through a single console. Minimize the hassles of deploying and securing individual devices by customizing devices at the first log-in while configuring the firewall and controlling browser security for physical, virtual and published Windows environments.

KACE Desktop Authority
Configure, Manage and Secure Unique User Workspaces with KACE Desktop Authority 02:01

Secure, privileged access to systems and data

Business stakeholders require greater flexibility in IT operations, but administrators must still maintain a secure and consistent user environment. They can no longer rely on the traditional model of managing only the machine. Each user needs to be granted the right access to the right resources regardless of the device used.

KACE Desktop Authority is the foundation for our centralized, secure desktop management software for Windows environments, KACE Desktop Authority Management Suite. Along with KACE Privilege Manager, you can maintain the balance between security and user productivity while saving IT resources.

Benefits

Customize Devices

Customize devices while configuring the firewall and controlling browser security for physical, virtual and published Windows environments.

Manage Applications

Make sure applications are always available and maintain access to network resources.

Maintain Identities

Shape user environments while instantly configuring drives, printers, folders, shortcuts, Outlook profiles, and more.

Empower Users

Let users customize their computers — within the limits you specify and without giving them local admin rights.

Features

Real-time targeting engine

Tailor settings and configurations by user, computer, network address or dozens of other criteria using patented Validation Logic targeting engine.

User environment configuration

Provide access to company resources, manage security settings, and configure Outlook profiles and Office settings, and more.

Windows environment management

Take control of your Windows environment by deploying software and service packs, controlling power schemes and inactivity settings, and tracking hardware and software.

Device security

Set security policies, manage the firewall, lock inactive computers and manage browser security and privacy settings for machines, applications and data.

Remote user support

Leverage the ExpertAssist remote management system to manage more than 40 computer tasks without interrupting the user.

Tour

Lock down USB ports
Reduce power consumption
Import and configure GP templates
Target configurations with granularity
Secure desktops when users are away
Seamlessly deploy MSI packages
Lock down USB ports

Lock down USB ports

Control exactly which USB devices are allowed on the network.

Specifications

Operating systems
  • Windows Server 2019
  • Windows Server 2008 R2 Standard/Enterprise
  • Windows Server 2012 R2 Standard/Enterprise
  • Windows Server 2008 Standard/Enterprise (32/64 bit)
  • Windows Server 2012
  • Windows Server 2016 
Domain controllers
  • Windows Server 2008 domain
  • Windows Server 2012 domain
  • Windows Server 2016 domain 
  • Windows Server 2008 R2 domain
  • Windows Server 2012 R2 domain
Database server
  • Microsoft SQL Server version 2008 or higher
Installed if necessary
  • Microsoft .NET Framework version 3.5 SP1
  • Microsoft Visual C++ 2005 Redistributable Package
  • Microsoft Internet Information Services (IIS) 7 or higher
  • Microsoft .NET Framework, Hotfix KB981119
  • Microsoft SQL Server 2008/2014 R2 Express — Installed if an existing SQL Server instance is not selected
Browsers supported (Console)
  • Internet Explorer® 11
  • Chrome™ 44 or higher
  • Firefox® 3.8 or higher
  • Microsoft Edge™ 25 or higher
Screen resolution
  • 1024x768
Operating systems
  • Windows 7
  • Windows 10
  • Windows Server 2008 R2
  • Windows Server 2012 R2
  • Windows Server 2019
  • Windows 8.1
  • Windows Server 2008
  • Windows Server 2012
  • Windows Server 2016 
Installed if necessary
  • Microsoft Windows Installer 3.1
  • Microsoft .NET 2.0 SP1
Browsers supported
  • Internet Explorer® 11
  • Chrome™ 44 or higher
  • Firefox® 3.8 or higher
  • Microsoft Edge™ 25 or later
Screen resolution
  • 1024x768
  • One admin-level account with read/write access to all NETLOGON share(s) and to be a member of the local Administrators group on all applicable workstations
  • One domain user-level account

Resources

Datasheet

KACE Desktop Authority Datasheet

Seamless and centralized desktop management for true Windows environment management.
Infographic

Facing the Endpoint Reality: Unified Endpoint Management (UEM) Trends

Endpoint security is one of the primary benefits of having a UEM solution in place. Uncover strategies to implement compliance ...
White Paper

Report: Industry Insights - Trends in Unified Endpoint Management

Read this Unified Endpoint Management report to learn about trends, solutions and strategies to enhance your unified endpoint m...
Infographic

Automate endpoint security with KACE

Check out this infographic showing how unified endpoint management and KACE by Quest helps you discover, manage and secure your...
Case Study

Credit union cuts disk imaging and deployment time by 70 percent

Coastal Community Credit Union’s IT department needed to deploy and manage its growing number of endpoints to keep up wit...
White Paper

Build better endpoint security to protect your entire network

Discover how the KACE Systems Management Appliance helps you secure and manage your entire endpoint landscape.
White Paper

Access Denied: Threats to Endpoint Security in the Federal Government

Learn how Quest’s UEM solution help Federal organizations' IT departments face the challenges of endpoint security, compliance ...
Case Study

One-person IT department automates patching, security, ticketing, inventory, remote access and b...

One-person IT team uses KACE SMA, QoreStor and Desktop Authority to automate patching and security and back up 7+ TB of data in...

Get started now

Control and secure your privileged management access.

Support and services

Product Support

Self-service tools will help you to install, configure and troubleshoot your product.

Support Offerings

Find the right level of support to accommodate the unique needs of your organization.

Professional Services

Search from a wide range of available service offerings delivered onsite or remote to best suit your needs.

Education Services

Training courses delivered through online web-based, on-site or virtual instructor-led.