Endpoint Security: ScriptLogic's Desktop Authority 7.5
ScriptLogic's Desktop Authority 7.5
ENDPOINT SECURITY
Desktop Authority 7.5
REVIEWED BY HARRIS WEISMAN
ScriptLogic
Price: $30-$40 per seat
@exb
![]() |
![]() |
![]() |
![]() |
|||
![]() |
![]() |
![]() |
![]() |
|||
![]() |
||||||
![]() |
![]() |
![]() |
![]() |
|||
![]() |
||||||
![]() |
||||||
![]() |
![]() |
![]() |
![]() |
|||
![]() |
||||||
![]() |
As the name suggests, ScriptLogic's Desk-top Authority 7.5 is a centralized desktop management solution. What makes this product unique is the optional add-ons that address patch management, spyware removal and USB/port security. The total package makes this a useful tool for day-to-day desktop and security management.
Configuration/Management | B+ |
When a user logs on to the network, Desktop Authority executes a script, SLogic, that installs the client software and configures the registry. This script is assigned to users through User Manager for Domains or Microsoft Active Directory, or from within Desktop Authority itself.
Through a dedicated central console, admins can manage the configuration of the user's environment, maintain a complete inventory of the enterprise's hardware and software, and support users remotely.
Granular profiles allow for group and individual user management for various environments. As the user logs on to the network--either on the network or by connecting remotely--the script activates and applies the group's rules to the workstation. This allows admins to maintain consistent and updated policy controls.
Desktop Authority bundles several optional security components, including patch management via Shavlik Technologies and antispyware from Aluria Software (antispyware deployment relies on the installation of the Shavlik module). ScriptLogic also offers its USB/ port control tool, which secures data against theft or accidental loss.
Policy Control | B+ |
The USB/port control component can manage use of Bluetooth, CD/DVD drives, FireWire devices, floppy disks, hard disks, infrared ports, Zip disks, MP3 players, modems, PCMIA controllers, PDAs, USB devices, parallel/serial ports and Wi-Fi devices.
Administrators have granular control of what can be accessed; for example, you can grant read-only access to CD-ROM burners, allowing users to access portable disk content but not copy sensitive data.
Effectiveness | B+ |
Reporting | A |
Verdict |
Testing methodology: Our test platforms included Windows 2000 Server, Windows XP Home and Windows XP Professional.
Start the conversation
0 comments