Endpoint Central, the Complete Server and Desktop Management Software, leverages the Windows Active Directory and Group Policy Objects of the Windows 2000/2003 Domains to perform the configuration tasks. With over 20 predefined configurations, administrators can perform almost all the regular desktop management activities with ease. It helps to secure and standardize the Windows desktops across the network. The Web-based user interface allows for applying the configuration to a single or group of desktops using a powerful filtering capability.
Given below are the various desktop configurations that can be accomplished using Endpoint Central, in addition to other Desktop Management Features:
Helps administrators to manage the user settings to maintain consistency across the network
Set search path for various applications to help users easily access the required applications.
Map shareable resources as network drives or disconnect old drives for easy resource sharing.
Set Environment Variables to provide users uniform environment throughout the network.
Configure an IP-based printer available in the windows network.
Set wall papers and other display settings to maintain consistent the look and feel across the network.
Launch the required application at user logon as per user or organization need.
Configure shared printer available in the windows network.
Copy, move, rename, and delete files and folders of the users.
Redirect start menu, my documents, my pictures, recent files and history folders to a centralized location to enable users access these information from anywhere in the network.
Create shortcuts in desktops, quick launch bar, start menu, etc., to enable easy access of important applications.
Popup important information and warning messages during the user logon.
Manage File, Folder, and Registry permissions for users.
Administrators can choose to install specific fonts for users/computers, thereby restricting them to use specific fonts.
This is for configuring the general settings for computers, such as displaying the last user name, synchronizing the system time with Time Server, and so on.
Helps to provide standardized environment for all the users using the computer
Launch essential applications at system startup.
Install or uninstall software (MSI format) from remote.
Schedule tasks and applications to run at defined time interval.
Create/Modify/Delete Local users in the remote computer.
Create/Modify/Delete Local Groups in the remote computer.
Create/Modify/Delete power schemes in the remote computer.
Manage essential Windows services from remote.
Manipulate registry values and keys of the computer from remote.
Execute custom scripts to accomplish organizational specific tasks during system startup or shutdown
Redirect common shell folders, such as common start menu, common desktop, common programs group etc., to a centralized location to enable users access these information from anywhere in the network.
Popup important information and warning messages during the system startup.
Configuring WiFi profiles for all the managed windows devices in the network is made easy using Endpoint Central. You can now create, modify or delete Wifi profiles.
Helps administrators in configuring the Microsoft applications across the network
Configure several Microsoft Outlook settings, such as new mail arrival settings, auto archive settings, message formatting, etc., from a central location.
Modify default file locations of Microsoft Office to enable access to the documents irrespective of which machine the user logs on from.
Configure browser settings for the most commonly used browsers across any organization such as Internet Explorer, Firefox, Google Chrome and Microsoft Edge to combat browser-based threats.
Configuring Exchange profile for outlook users consumes a lot of time and effort. Endpoint Central helps you to automate this by creating a configuration to create/delete the exchange profile for outlook users.
Protect the Windows desktops from unauthorized access and other vulnerabilities
Enable or disable windows security policies under Active Desktop, control panel, MMC, etc., modules to maintain network privacy.
Warn users about password expiry and less disk space to enable users to act on them.
Popup messages during system startup to notify users about company policies that are of prime importance.
Enable XP Firewall and configure exceptions in Windows XP machines to secure the machine from unauthorized access.
Using this configuration, you can distribute certificates such as SSL Certificates for browsers, AD CA Root Certificates to authenticate users on your WiFi network, etc.
The Secure USB configuration is used for both users and computers to block or unblock the usage of USB devices. This configuration is applicable to users irrespective of the computers they use.
For more details on every Configuration, refer to the respective Configuration topic in the online help.