Technological trends have challenged enterprise IT departments to manage systems with minimal time and effort. The desktop operating system that dominates the PC market is Windows OS. Along with their ease of use, Windows computers are more compatible and customizable. This creates a need for Windows administration in enterprise networks. In order to simplify Windows administration, system administrators need a tool that automates Windows computer management. Now, using multiple desktop management tools to manage Windows, Mac and Linux computers can be complicated. Desktop Central helps administrators in increasing their efficiency by automating desktop management and managing heterogeneous operating systems using a single console.
Desktop Central can manage the following versions of Windows systems
Desktop Central currently supports the following features to simplify Windows computer management in your enterprise.
- Mitigate security risks by automating patch and service pack deployments.
- Scan the systems periodically to get complete hardware details of Windows computers like hard disk, network adapters, physical memory, processors etc.
- A complete list of all the software details, like the software name, version, manufacturer details etc.
- Manage all the software licenses of your Windows computers by category. It provides the compliant (including over-licensed software) and non-compliant(under-licensed) software used in the network.
- Detect and prohibit the use of software in accordance with the company policies.
- Effective Windows administration by tracking the warranty information of the Windows computers managed by your organization.
- Simplify software deployment with over 1000 built-in application templates for package creation, for Windows alone.
- Collaborative Windows computer management by troubleshooting and controlling remote desktops with file transfer, video recording, and more.
- Over 25 predefined configurations to configure windows applications, system settings, desktop settings and security policies.
- Apply power schemes, shut down inactive computers and other power management techniques.
- Restrict, control and audit the usage of USB devices in your network.
- Out-of-the-box reports on server and desktop management.