Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Endpoint Security: ScriptLogic's Desktop Authority 7.5

ScriptLogic's Desktop Authority 7.5

This article can also be found in the Premium Editorial Download: Information Security magazine: Tips for navigating the maze of global security regulations


Desktop Authority 7.5

Price: $30-$40 per seat



As the name suggests, ScriptLogic's Desk-top Authority 7.5 is a centralized desktop management solution. What makes this product unique is the optional add-ons that address patch management, spyware removal and USB/port security. The total package makes this a useful tool for day-to-day desktop and security management.

Configuration/Management B+  
Server installation was straightforward: The software recognized that the base Windows 2000 software was missing several core components and added them.

When a user logs on to the network, Desktop Authority executes a script, SLogic, that installs the client software and configures the registry. This script is assigned to users through User Manager for Domains or Microsoft Active Directory, or from within Desktop Authority itself.

Through a dedicated central console, admins can manage the configuration of the user's environment, maintain a complete inventory of the enterprise's hardware and software, and support users remotely.

Granular profiles allow for group and individual user management for various environments. As the user logs on to the network--either on the network or by connecting remotely--the script activates and applies the group's rules to the workstation. This allows admins to maintain consistent and updated policy controls.

Desktop Authority bundles several optional security components, including patch management via Shavlik Technologies and antispyware from Aluria Software (antispyware deployment relies on the installation of the Shavlik module). ScriptLogic also offers its USB/ port control tool, which secures data against theft or accidental loss.

Policy Control B+  
Desktop Authority makes it easy to administer several key security functions. Patches can be tailored to each individual group's needs and deployed accordingly. This also works for the antispyware component. One nice feature is the ability to exempt specific "spyware" applications, which is how many security tools are classified.

The USB/port control component can manage use of Bluetooth, CD/DVD drives, FireWire devices, floppy disks, hard disks, infrared ports, Zip disks, MP3 players, modems, PCMIA controllers, PDAs, USB devices, parallel/serial ports and Wi-Fi devices.

Administrators have granular control of what can be accessed; for example, you can grant read-only access to CD-ROM burners, allowing users to access portable disk content but not copy sensitive data.

Effectiveness B+  
In our testing, we focused on the security modules, developing a series of groups that denied and granted access to specific devices and media. The system prevented us from violating the assigned access control lists. Using these same groups, we also deployed patches to Windows XP desktops and laptops. We deployed the antispyware component using the patch management tool.

Reporting A  
The reporting tool is very effective, allowing the administrator to use either packaged or custom reports. All three security components use Desktop Authority's reporting tool, which allowed us to generate canned reports on antispyware, USB/port and patch activity, as well as administrative desktop management. Each of these areas features several detailed options; for example, under USB/port management, you can generate reports by a specific type of device or workstation. Each canned report can be modified to suit the enterprise's needs.

rity is an effective desktop management/ security tool. While it does not work with non-Windows systems, it would be a cost-effective solution in a Windows shop.

Testing methodology: Our test platforms included Windows 2000 Server, Windows XP Home and Windows XP Professional.

This was last published in February 2007

Dig Deeper on Endpoint protection and client security

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.