# Windows Desktop Configuration | ManageEngine Endpoint Central Endpoint Central, the Complete Server and Desktop Management Software, leverages the Windows Active Directory and Group Policy Objects of the Windows 2000/2003 Domains to perform the configuration tasks. With over 20 predefined configurations, administrators can perform almost all the regular desktop management activities with ease. It helps to secure and standardize the Windows desktops across the network. The Web-based user interface allows for applying the configuration to a single or group of desktops using a powerful filtering capability. Given below are the various desktop configurations that can be accomplished using Endpoint Central, in addition to other Desktop Management Features: ## Desktop Configurations Helps administrators to manage the user settings to maintain consistency across the network ### Path Configuration Set search path for various applications to help users easily access the required applications. ### Drive Mapping Map shareable resources as network drives or disconnect old drives for easy resource sharing. ### Environment Variables Set Environment Variables to provide users uniform environment throughout the network. ### IP Printer Configure an IP-based printer available in the windows network. ### Display settings Set wall papers and other display settings to maintain consistent the look and feel across the network. ### Launch application Launch the required application at user logon as per user or organization need. ### Shared Printer Configure shared printer available in the windows network. ### File and Folder Operation Copy, move, rename, and delete files and folders of the users. ### Folder redirection Redirect start menu, my documents, my pictures, recent files and history folders to a centralized location to enable users access these information from anywhere in the network. ### Shortcut Create shortcuts in desktops, quick launch bar, start menu, etc., to enable easy access of important applications. ### Message Box Popup important information and warning messages during the user logon. ### Permission Management Manage File, Folder, and Registry permissions for users. ### Fonts Administrators can choose to install specific fonts for users/computers, thereby restricting them to use specific fonts. ### General This is for configuring the general settings for computers, such as displaying the last user name, synchronizing the system time with Time Server, and so on. ## Computer Configurations Helps to provide standardized environment for all the users using the computer ### Launch application Launch essential applications at system startup. ### Windows installer Install or uninstall software (MSI format) from remote. ### Scheduler Schedule tasks and applications to run at defined time interval. ### User Management Create/Modify/Delete Local users in the remote computer. ### Group Management Create/Modify/Delete Local Groups in the remote computer. ### Power Management Create/Modify/Delete power schemes in the remote computer. ### Windows Services Manage essential Windows services from remote. ### Registry settings Manipulate registry values and keys of the computer from remote. ### Custom Scripts Execute custom scripts to accomplish organizational specific tasks during system startup or shutdown ### Common Folder Redirection Redirect common shell folders, such as common start menu, common desktop, common programs group etc., to a centralized location to enable users access these information from anywhere in the network. ### Message box Popup important information and warning messages during the system startup. ### WiFi Configuring WiFi profiles for all the managed windows devices in the network is made easy using Endpoint Central. You can now create, modify or delete Wifi profiles. ## User Configurations Helps to provide configurations specific to each user in the network ### Alerts Alert Configuration enables you to warn the users about the password expiration, lower hard disk space, and larger temp file size. ### Certificate distribution Using the Certificate Distribution configuration, you can distribute certificates such as SSL Certificates (for web browsers like Chrome), AD CA Root Certificates (to authenticate users on your WiFi network) to specified targets. ### Secure USB devices Secure USB helps to secure computers by detecting malicious USB devices ### Custom Scripts Custom scripts enable users to carry out administrative tasks and chores customisable to other organisations ### Power Management The power management configuration enables you to adjust your power settings to save energy. ### IP Printer The IP Printer configuration in Endpoint Central helps you assign specific printing devices to a group of computers or even a remote office using the IP address. ### Display The Display Configuration is for customizing the display settings for wallpaper and screensaver. ### File Folder Operation The file folder operation helps you to copy, delete, move, rename files and folders in a computer. ### Message Box A message box is a small dialog box that displays a piece of information to the user. ## Application Configurations Helps administrators in configuring the Microsoft applications across the network ### MS Outlook Configure several Microsoft Outlook settings, such as new mail arrival settings, auto archive settings, message formatting, etc., from a central location. ### MS Office Modify default file locations of Microsoft Office to enable access to the documents irrespective of which machine the user logs on from. ### Browser Settings Configure browser settings for the most commonly used browsers across any organization such as Internet Explorer, Firefox, Google Chrome and Microsoft Edge to combat browser-based threats. ### Outlook Exchange profile Configuring Exchange profile for outlook users consumes a lot of time and effort. Endpoint Central helps you to automate this by creating a configuration to create/delete the exchange profile for outlook users. ## Windows Security Configurations Protect the Windows desktops from unauthorized access and other vulnerabilities ### Security Policies Enable or disable windows security policies under Active Desktop, control panel, MMC, etc., modules to maintain network privacy. ### Alerts Warn users about password expiry and less disk space to enable users to act on them. ### Legal notice Popup messages during system startup to notify users about company policies that are of prime importance. ### Firewall Enable XP Firewall and configure exceptions in Windows XP machines to secure the machine from unauthorized access. ### Certificate Distribution Using this configuration, you can distribute certificates such as SSL Certificates for browsers, AD CA Root Certificates to authenticate users on your WiFi network, etc. ### Secure USB The Secure USB configuration is used for both users and computers to block or unblock the usage of USB devices. This configuration is applicable to users irrespective of the computers they use. For more details on every Configuration, refer to the respective Configuration topic in the [online help](https://www.manageengine.com/products/desktop-central/help/windows_remote_configurations.html#Windows-Configurations).