• 网络与数据中心管理
  • 服务器与应用性能管理
  • IT服务管理
  • Windows AD域管理
  • 终端管理
  • IT安全
  • MSP
  • IT运维平台
 
 
应用性能管理(APM)
保证物理、虚拟、云环境的应用性能
 
 
简化终端设备管理
全面管控PC计算机、智能手机以及平板电脑,确保网络安全
 
 
IT运维外包服务工具
多租户模式,为您的客户提供更好的服务
IT运维管理平台
统一监控、集中运维
 

Securing Windows Desktops

Desktop Central, the Complete Desktop Management Software, leverages the Windows Active Directory of the Windows 2000/2003 Domains to perform the configuration tasks. With over 20 predefined configurations, administrators can perform almost all the regular desktop management activities with ease. It helps to secure and standardize the Windows desktops across the network. The Web-based user interface allows for applying the configuration to a single or group of desktops using a powerful filtering capability.

Given below are the various tasks that help in securing your network using Desktop Central:

Configure Desktops to Ensure Security

Protect the Windows desktops from unauthorized access and other vulnerabilities

Security Policies: Enable or disable windows security policies under Active Desktop, control panel, MMC, etc., modules to maintain network privacy.

Alerts: Warn users about password expiry and less disk space to enable users to act on them.

Legal notice: Popup messages during system startup to notify users about company policies that are of prime importance.

Firewall: Enable XP Firewall and configure exceptions in Windows XP machines to secure the machine from unauthorized access.

User Management: Create/Modify/Delete Local users in the remote computer.

Group Management: Create/Modify/Delete Local Groups in the remote computer.

Permission Management: Manage File, Folder, and Registry permissions for users.

Folder redirection: Redirect start menu, my documents, my pictures, recent files and history folders to a centralized location to enable users access these information from anywhere in the network.

Common Folder Redirection: Redirect common shell folders, such as common start menu, common desktop, common programs group etc., to a centralized location to enable users access these information from anywhere in the network.

Drive Mapping: Map shareable resources as network drives or disconnect old drives for easy resource sharing.

Registry settings: Manipulate registry values and keys of the computer from remote.

Windows Services: Manage essential Windows services from remote.

Keep Applications and OS with Up-to-Date Patches Installed

Software vulnerabilities can create security weakness, corrupt critical system data or cause system unavailability that can be a nightmare to Network administrators. Administrators can't even think of a good patch management solution, without understanding how vulnerable the systems are. So, Administrators are constantly looking out for a solution that scans for vulnerabilities, identify missing patches and updates, apply them immediately and mitigate risk, not just a patch deployment software.

Desktop Central's patch management solution handles every aspect of Windows patch management like System discovery, scanning for vulnerabilities, identifying the required windows updates, deploying relevant patches and patch reports to make network administrators job simpler. Administrators can also opt for a completely automated solution and don't have to worry about patching windows systems ever.

Monitor and Detect Unauthorized Software Usage

Every organization prohibits using certain software in accordance with the company policies. Detecting such prohibited software will help in tackling the compliance issues that might arise later. Desktop Central provides an option to add the list of software that are prohibited in the company. When any such software is detected it can be configured to be notified through an email to take necessary action.

Enable and Maintain User Logon Details for Auditing

User Logon Reports provides the detailed information about the users' login details along with their history. These agent-based reports are more accurate and also provides the details of the user, their logon time, logoff time, the computer from which they logged on, the domain controller they reported, etc., along with their logon history.

我们的客户

展开