Image

Desktop Authority Express Screenshots

Desktop Authority Express

Desktop Authority Express DownloadDownload Desktop Authority Express | Price - orderPrice - order Desktop Authority Express
ScriptLogic

ScriptLogic Download
  • Scripts without need for programing
  • Used by more than 3.000.000 Users
  • Industry awarded
Desktop Authority Express Pricing

ScriptLogic Exclusive and Award Winning Validation Logic

Using ScriptLogic's intuitive point-and-click Management Console, and exclusive Validation Logic technology, you can centrally configure and control virtually every user/computer setting (without visiting each one of them). Below is a sample screen image.

More Productive Users.Personalized desktops - unique configurations of security policies, preferences, drive mappings, printers, Internet, and applications settings?can be applied to PCs based on ScriptLogic's unique Validation Logic, so everyone on the network has the familiar interface and set of resources they need, when and where they need them.

Simplified Administration.By centralizing the process of desktop management and enabling remote troubleshooting and repair in many cases, ScriptLogic keeps users working with less intervention required by administrators.

Reduced Costs.ScriptLogic leverages our unique "Template Technology" and "Validation Logic" during the network logon process to reduce the number of menial management tasks and to eliminate redundant administration so your staff can concentrate on more strategic activities and reduce your total cost of ownership.

ScriptLogic Exclusive and Award Winning Validation Logic

ScriptLogic Time Syncronization

The General tab provides several miscellaneous settings including time synchronization, settings to purge the client TEMP files, password expiration warnings and others. Time Synchronization utilizes ScriptLogic?s standard validation logic. All other settings on this tab do not.

Time Synchronization
Keeping client workstation times synchronized is simple to configure using the Time Synchronization dialog box. This dialog box configures each client to synchronize the workstation?s clock with a specified server. When the client logs on the network, the time is automatically adjusted to match the specified server?s time.

ScriptLogic Time Syncronization

Drive Settings with ScriptLogic

Press the CTRL key to access accelerated functionality on this dialog. When pressed, the OK button becomes an Add button. Pressing the Add button will add the current dialog?s settings as a new entry in the list. The Settings dialog will remain open for additional entries.

Drive Settings with ScriptLogic

ScriptLogic Printer Management

Shared Printer
Specify the path of the network printer. The path should be specified in the form of \\server\share\. Optionally, you can press the Select Share button to navigate to the network printer. You can also press the F2 key to use a dynamic variable.
>B>Specify /DELETE in the Shared Printerfield to remove all persistent printer mappings that a user has created on their workstation that corresponds to the same port number specified for the shared printer configuration.

ScriptLogic Printer Management

ServicePack Management With ScriptLogic

Service Packs

The Service Packs tab allows you to deploy service packs for all NTx clients. This tab uses validation logic, however it only allows a selection from the Type and Class logic. Operating systems and Connection validations are not modifiable for service pack deployment.

There are a few things to note regarding service pack deployment:

- ScriptLogic will only install service packs to NTx clients if attached via a LAN connection. The Connection validation logic is disabled.

- ScriptLogic will never attempt to install service packs to any NTx servers (or Terminal Servers).

- ScriptLogic will never downgrade the currently installed service pack on a computer. ScriptLogic will only install the requested service pack if the client has an older service pack or no service pack installed.

- ScriptLogic will not attempt to install the requested service pack if the client does not have enough available disk space on the drive that hosts the %TEMP% folder.

- ScriptLogic will run all service packs in unattended mode, will force the computer to close other programs when it shuts down, and will not back up files for uninstall purposes.

ScriptLogic can bypass the automatic installation of service packs on specific computers. If you have specific computers that you would never like ScriptLogic to install a service pack on (such as a development station), create a file called SLNOCSD in the root directory of the System Drive. This allows you to generally apply service packs based on Validation Logic, while providing for special-case exemptions based on individual systems.

ServicePack Management With ScriptLogic

Folder Redirection of Shell Folders with ScriptLogic

Folder Redirection

The Folder Redirection tab provides the ability to change the Windows default location for specialized folders known as Shell Folders. Shell folders are folders that are specific to each user. They include the Cookies, Desktop, Favorites (IE Bookmarks), History, My Pictures, Personal (My Documents), Recent, Temporary Internet Files, Send To, Start Menu and Startup Group folders.

By default, the Windows NT operating system locates shell folders in the user?s profile folder (x:\WinNT\Profiles\profilename\). Windows 2000 also locates shell folders under the user?s profile, however the location of user profiles has been changed to x:\Documents and Settings\profilename\. Windows 9x stores shell folders under the x:\Windows\ folder, unless individual user profiles have been enabled using the Control Panel. If individual user profiles have been enabled, Windows 9x creates separate folder structures, similar to the default user profile structure found in Windows NT.

By defaulting the location of these folders to a network share (or mapped drive), rather than the computer?s own local hard drive, you allow users to access their own desktop, bookmarks, recent document list, application settings, etc., regardless of the computer they log on to. This also enables the profile to be secured and backed up nightly.

In addition to user-specific shell folders, Windows NTx also includes a common set of shell folders that is available to all users of the computer. This common set of shell folders is often referred to as the ?All Users? profile. NT Common Shell Folders can be redirected by ScriptLogic using the NT Common Folder Redirection tab.

When ScriptLogic executes on the client during the logon process, shell folder redirections are processed in the order that they appear in the list. If the user logging on validates for more than one entry in the list, be aware that entries toward the bottom of the list will override entries that are located closer to the top of the list. If you wish to prioritize your list entries, use the Move Up and Move Down buttons to re-sequence the list.

Folder Redirection of Shell Folders with ScriptLogic

Common Folder Redirection with ScriptLogic

Common Folder Redirection
The Common Folder Redirection tab allows you to change the location of where Windows NTx computers look for common specialized folders known as the All Users Shell Folders. The Common Folder Redirection tab incorporates ScriptLogic?s Validation Logic.

Common Shell Folders are folders that are shared by all users of the computer and include Common Application Data, Common Desktop, Common Programs Group, Common Start Menu and Common Startup Group By default, Windows NT operating system locates common shell folders under the All Users profile folder (x:\WinNT\Profiles\All Users\). Windows 2000 also locates shell folders under the All Users profile, however the base location of the All Users profile has been changed to x:\Documents and Settings\All Users\. Windows 98/Me makes use of a subset of the NTx folders. Windows 95 does not offer common shell folders.

By instructing the operating system to locate the Common Shell Folders on a network share (or mapped drive), rather than the computer?s own local hard drive, you allow users to access the common portion of the Desktop, Start Menu and/or Program Group regardless of the computer from which they log on to.

In addition to Common Shell Folders, Windows NTx also includes an individual set of shell folders that are available to each user on each computer. Individual user shell folders can be configured by ScriptLogic using the Folder Redirection tab.

When ScriptLogic executes on the client during the logon process, common shell folder redirections are processed in order, beginning with the top of the list. If the user logging on validates for more than one entry in the list, the entries toward the bottom of the list will override entries that are located closer to the top of the list. If you wish to prioritize your list entries, use the Move Up and Move Down buttons to re-sequence the list.

Common Folder Redirection with ScriptLogic

Central Messagebox Management with ScriptLogic

Message Boxes
The Message Boxes tab allows you to centrally manage and configure popup messages. This popup window is displayed on the client during the logon process after the user is authenticated.

Message boxes can be used to notify users of scheduled downtime or upcoming company events. Since displaying Message Boxes could interfere with the automatic logon process, Message Boxes will NOT be displayed on any computer if AutoAdminLogon is enabled.

Central Messagebox Management with ScriptLogic

Security Policies ( Group Policies) with ScriptLogic

Security Policies
The Security Policies tab allows you to centrally configure user security settings. Security policies can be set for individual users or computers.

User policies are registry entries stored to the [HKey_Current_User] registry hive. This registry hive is stored in the user?s profile. On Windows NTx computers, each user has an individual user profile. On Windows 9x computers, all users share a common user profile, unless individual user profiles have been enabled through Control Panel.

Computer-specific policies are registry entries stored to the [HKey_Local_Machine] registry hive. This type of policy will affect every person that uses the computer. An example of this type of policy would be Computer: Force 9x Domain Logon. Computerspecific policies are indicated by the ?Computer:? preface in the policy drop-down list.

When a Security Policy is enabled, it remains in effect until you specifically disable it or check the Clear all existing policies first option. Once you configure the security policy to be disabled using either of these two methods, the user must log on one more time so that ScriptLogic may apply the ?disabled? setting to the computer.

Security Policies ( Group Policies) with ScriptLogic

ScriptLogic Patented Technology: Validation Logic

There are several different validation logic Types that can be selected from the validation logic dialog box.

They include:
Domain
Site
OU (Computer)
OU (User)
Group Membership
Primary Group
User Name
TCP/IP Address
Host Address
Computer Name
MAC Address
TS Application Name
TS Initial Program,
TS Client Name
TS Session Name
TS Client TCP/IP Address
Custom Variable
Custom Function and Computer Group.

Each Validation Type supports multiple Values. The Value is compared against at logon time. When using multiple values, they must be separated by a semicolon (;). Validation Types also support the asterisk (*) and question mark (?) wildcards. This provides the ability to configure a setting for multiple instances of the selected Type. Use an asterisk to indicate a string of characters of any length may appear in that place. Use a question mark (?) to indicate single character may appear in place of the question mark. One or more instances of each wildcard may be used in the comparison value

Domain
Specify Domain to execute a configuration element for all computers that belong to the specified Domain. Select Domain from the drop-down list. Specify the Domain name by entering it into the Value field or by pressing the domain selection button . The domain value is compared against the domain the client machine is a part of and must match for the configuration element to be processed.

Site
Specify the Active Directory Site that the computer belongs to in order to execute a configuration element for the specific site. Select Site from the drop-down list. Specify the Site by entering it into the Value field. This Site is compared against the Site the client belongs to and must match for the configuration element to be processed.

OU Computer
Specify Organizational Unit (Computer) to execute a configuration element for a computer belonging to a specific OU. Select OU (computer) from the drop-down list. Specify the OU by entering it into the Value field or by pressing the Container Browser, , button. The OU is compared against the OUs that the computer is a part of and must match for the configuration element to be processed.

OU (User)
OU (User) Specify Organizational Unit (User) to execute a configuration element for a user belonging to a specific OU. Select OU (User) from the drop-down list. Specify the OU by entering it into the Value field or by pressing the Container Browser, button. The OU is compared against the OUs that the user is a part of and must match for the configuration element to be processed.

Group Membership
Specify Group Membership to execute a configuration element for a specific network group. Select Group Membership from the drop-down list. Specify the group by entering it into the Value field. The specified Group is compared against the user?s Group membership and must match for the configuration element to be processed. All valid Groups are available for selection from the Value drop-down list or by pressing the group selection button

Primary Group
Specify Primary Group to execute a configuration element for a specific group assigned as a user?s primary group. Select Primary Group from the drop-down list. Specify the primary group by entering it into the Value field. The specified Primary Group is compared against the user?s Primary Group and must match for the configuration element to be processed. All valid Groups are available for selection from the Value drop-down list or by pressing the group selection button

User Name
Specify User Name to execute a configuration element for a specific user. Select User Name from the drop-down list and specify the user in the Value field. This is compared against the user?s User Name and must match for the configuration element to be processed. All valid User Names are available for selection from the Value drop-down list or by pressing the user selection button.
Use the UserName validation logic to execute a configuration element for a particular user, regardless of the computer that they log on to. For example, if the configuration element should execute any time Mary Jones (user name mjones) logs into the network, specify mjones as the user name value.

TCP/IP Address
Specify the TCP/IP Address for the computer in order to execute a configuration element for the specific machine based on the TCP/IP address. Select TCP/IP Address from the drop-down list and specify the specific TCP/IP Address in the Value entry. This TCP/IP address is compared against the TCP/IP Address on the client machine and must match for the configuration element to be processed. The asterisk (*) and question mark (?) wildcards may be used to match TCP/IP addresses. This wildcard technique and simplified string manipulation, should be effective on most networks. You are not required to specify complete octets. Specifying 192.168.1* would attempt to match the first two octets completely and the first character of the third octet to the client?s TCP/IP address.

True subnetting is also supported. Use true subnetting values to selectively specify certain groups of IP addresses. Specify the IP address and subnet mask in the TCP/IP in the Value entry. The subnet mask can be specified in either dotted decimal format or by specifying the number of mask bits.

Host Address
Specify the Host Address for the computer in order to execute a configuration element for the specific machine. Select Host Address from the dropdown list and specify the specific Host Address in the Value field. This Host Address is compared against the Host Address of the client machine and must match for the configuration element to be processed. If a portion of the Host Address was used to distinguish between different office buildings ? you could use a wildcard when validating the Host Address to deploy printers based on which building the computer is located in.

Computer Name
Specify the Computer Name to execute a configuration element for a specific computer regardless of the user that logs onto that computer. Select Computer Name from the drop-down list and specify the NETBIOS computer name in the Value field. The Computer Name is compared against the client?s computer name and must match for the configuration element to be processed. This type of validation is especially useful if computer naming conventions are designed to describe a computer type or location.

MAC Address
Specify the MAC Address of the computer in order to execute a configuration element for the specific machine regardless of the user that logs onto the computer. Select MAC Address from the drop-down list and specify the MAC Address in the Value field. This is compared against the MAC Address on the client machine and must match for the configuration element to be processed. This type of validation gives the ability to specify a computer on the network based on the MAC Address built in to the network adapter. This gives a simple way to address a specific machine regardless of the user that logs onto the machine or the computer name (which is vulnerable to change). Validating on a MAC Address may also be useful if your network uses IPX/SPX as a protocol.

TS Application Name
Specify the TS Application Name to execute a configuration element based on the name of the Terminal Server published application that is currently in use. Select TS Application Name from the drop-down list and specify the Application Name in the Value field. If this application is running, the configuration element will be processed.

TS Initial Program
Specify the TS Initial Program to execute a configuration element based on the name of the Terminal Server Initial Program currently in use. Select TS Initial Program from the drop-down list and specify the Initial Program name in the Value field. If this initial program is running, the configuration element will be processed.

TS Client Name
Specify the TS Client Name to execute a configuration element based on the name of the TS Client. Select TS Client Name from the drop-down list and specify the client name in the Value field. If this name matches the name of the client logging onto the Terminal Server, the configuration element will be processed.

TS Session Name
Specify the TS Session Name to execute a configuration element based on the connection name that is in use between the client and the Terminal Server. The TS Session Name is made up of a combination of the Terminal Server Connection Name#Session Id. Select TS Session Name from the drop-down list and specify the specific Session Name in the Value entry. If the connection occurs on the specified Session Name, the configuration element will be processed.

TS Cleint TCP/IP Address
Specify the TS Client TCP/IP Addr. to execute a configuration element based on the IP Address of the client connecting to the Terminal Server. Select TS Client TCP/IP Address from the drop-down list and specify the client IP Address in the Value field. If both IP Addresses match, the configuration element will be processed.

True subnetting is also supported. Use true subnetting values to selectively specify certain groups of IP addresses. Specify the IP address and subnet mask in the TCP/IP in the Value entry. The subnet mask can be specified in either dotted decimal format or by specifying the number of mask bits.

Custom Variable
Specify Custom Variable to execute a configuration element based on the value of the defined variable. Custom variables are defined in the Definitions tab of Custom Scripting. All custom variables must evaluate to a True or False value. The value of the variable is evaluated at logon time. If the custom variable equals to True (or any value other than 0), the configuration element will be processed. A False value will cause the configuration element to be unprocessed.

Custom Function
Specify Custom Function to execute a configuration element based on the return value of the function. Custom functions are defined in the Definitions tab of Custom Scripting. All custom functions must return a True or False value. If the custom function returns True (or any value other than 0), the configuration element will be processed. A False return value will cause the configuration element to be unprocessed. The function below is used to determine if the specified version ($version) of DirectX is greater, equal or less than ($operand) the currently installed version of DirectX. The function returns a value ($DXVersion) based on the parameters passed to the function. This function is defined in the Definitions tab of Custom Scripts.

Registry Value
Select Registry Value in order to execute a configuration element for the specific computer regardless of the user that logs onto that computer. Find Registry Value in the Validation Logic under the Computer Information category.

The Registry Value validation type requires four validation values to complete its configuration. The required values are Key, Value, Operator and Data. Enter the registry hive and key to be checked into the Key box. Enter the name of the entry within the specified key to be checked into the Value box. Enter the operator to be used in the compare operation. Enter the data to be compared against into the Data box.

The supplied validation values (Value, Operator and Data) are used to form a condition that is applied to the specified Key.

If the the comparison (performed during the logon process) returns a TRUE result the configuration element will be processed. Example:

Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DirectX
Value: Version
Operator: <
data:9.0 If the installed verswill be processed.

To use this function within the Validation Logic of a Client Configuration setting, select Custom Function from the Validation Logic Type drop-down list. Specify the function name and parameters (if necessary) in the Value entry. In this example, an operand of "<" (less than) and a version of 7.0 is passed to the function. This is compared to the version of DirectX on the client. The return value is set accordingly. If the version of DirectX on the client is less than 7.0 than the configuration entry will be processed.

ScriptLogic Patented Technology: Validation Logic

Change Registry Settings from One Central Point with ScriptLogic

Registry
The Registry tab provides a single point of control over changing values in the registry of the user?s computer. The Registry tab incorporates standard Validation Logic and takes advantage of the ScriptLogic RPC Service, which allows ScriptLogic to modify any Windows NTx registry key/value, even if the user logging on does not have the necessary permissions to modify that particular key/ value under their own security context.

The Registry tab is extremely versatile and, if used improperly, can cause computers not to function properly. The Registry tab is designed for use by experienced administrators only. Always use caution when manipulating the registry on any computer, and extreme caution when using a product such as ScriptLogic to make a network-wide change to a group of computers at once. It is highly recommended to first test any registry modification on a specific user or computer (using Validation Logic) prior to rolling the change out to an entire group, subnet or domain.

Change Registry Settings from One Central Point with ScriptLogic

Application Launch with ScriptLogic

Application Launcher
The Application Launcher tab allows you to launch an application on the client?s desktop after the logon script completes. This is equivalent to placing a shortcut in the client?s Startup folder, however, ScriptLogic performs this in a centralized fashion. There is no need to visit each computer to set this up.

In addition to launching standard applications, such as Internet Explorer or Outlook, the Application Launcher tab is the perfect way to update your client?s anti-virus signatures, using the update executable or batch file supplied by the vendor of your anti-virus software.

The ScriptLogic Application Launcher uses the RunOnce registry key to queue applications for launching after the logon process is complete. However, if ScriptLogic detects the client is connecting over dial-up networking, the application is immediately launched while the script continues to execute.

Application Launch with ScriptLogic

Outlook configuration with ScriptLogic

Outlook

The Outlook tab provides the ability to configure several Microsoft Outlook settings. There is no validation logic on this tab. All Outlook settings are set globally for all clients using ScriptLogic.

Outlook client settings are configured during the logon process. These settings are dynamic in nature and thus are reconfigured each time a user logs on to the network.

Outlook configuration with ScriptLogic

Exchange Mail Profile Generation with ScriptLogic

Mail Profile
The Mail Profile tab provides the ability to configure client mail profiles. Mail profiles are part of the Windows Messaging system and are used to define the services and options needed to connect the Outlook client to your Microsoft Exchange server. You can establish an administrative template that will automatically configure the most common services used by Outlook when your clients log on to the network.

ScriptLogic will automatically create mail profiles for a user on any computer that they log on to. With ScriptLogic performing this necessary administrative task for you, you?ll save yourself a visit to each desktop every time it is used by a different person.

Your users will benefit from increased productivity if they roam to different computers - no matter which computer they log on to. They will have access to their electronic mail instantly!

The Mail Profile settings are divided into three logical sections:

  • Mail profile section
  • PAB and Personal Folder Settings
  • Offline Access Settings.

Exchange Mail Profile Generation with ScriptLogic

ScriptLogic Internet Settings

Internet
The Internet tab provides the ability to configure Internet Explorer Settings. Settings such as the Start Page, Search Page, Download Directory, and Proxy Server information.

The Internet tab incorporates ScriptLogic?s Validation logic.

ScriptLogic Internet Settings

Inactivity Timer for Workstations

Scriptlogic Inactivity Timer

One major use of the Inactivity object is for logging users off their workstation at the end of the day. This is imperative as important updates need to take place while computer is not in use.

When a client does not log off they will not receive the latest updates that are pushed out via ScriptLogic. Most of these updates are scheduled to occur during the logoff or logon process. If one does not logoff, neither process will get triggered.

To make sure that all of the Companys computers are up to date with service packs, inactivity will be checked each business day from 8:00pm to 5:00am. Within this period of time each inactive user will be logged off (if they have not done so already). This will trigger the logoff process that was configured in the service packs object.

Inactivity Timer for Workstations

ScriptLogic Ini Files Management

INI Files provide a means of configuration to many applications. The INI Files tab provides a single point of control over changing values in an INI configuration file. The INI Files tab incorporates standard Validation Logic.

When ScriptLogic executes on the client during the logon process, INI file changes are processed in order, beginning with the top of the list displayed on the INI Files tab of the ScriptLogic Manager. If you wish to prioritize your list entries, use the Move Up and Move Down buttons to re-sequence the list.

ScriptLogic Ini Files Management

File operations with Scriptlogic

File operations with Scriptlogic

The File Operations object provides the ability to Copy, Delete, Move and Rename files and folders. File Operations support Local, Mapped and network drive paths as well as a generous portion of operation options.

File Operations are configurable for 95 - XP systems only. File Operations are not available for configuration, nor are they processed on computers with the Windows 2003 operating system.

As Desktop Authority processes the configuration elements defined by the File Operations configuration list, Validation Logic is applied to each element, beginning with the top of the list. Prioritize the list entries by clicking Move Up ( ) and Move Down ( ) to reorganize the list.

File operations with Scriptlogic

Office Settings Managed by ScriptLogic

The MS Office tab provides the ability to centrally configure default file locations for Microsoft Office.

By centrally configuring the paths used by Microsoft Office, you can ensure that user-created documents are stored to network servers rather than locally on the user?s computer. This enables documents to be secured, backed up nightly, and made available to the user regardless of which computer the user logs on from.

When ScriptLogic executes on the client during the logon process, MS Office configurations are processed in order, beginning with the top of the list. If you wish to prioritize your list entries, use the Move Up and Move Down buttons to re-sequence the list.

Office Settings Managed by ScriptLogic

ScriptLogic Shortcut Management

The Shortcuts tab provides the ability to centrally define shortcuts to be used on the client?s machine. A shortcut is a pointer to an application or folder. Once the shortcut is created, the user will never have to remember the details to access the referenced application or folder again. They simply run the shortcut. The Shortcuts tab incorporates ScriptLogic?s validation logic.

When ScriptLogic executes on the client during the logon process, shortcut configurations are processed in order, beginning with the top of the list. If you wish to prioritize your list entries, use the Move Up and Move Down buttons to re-sequence the list.

ScriptLogic Shortcut Management

Manage Paths With Scriptlogic

The Path tab configures client search paths to include local paths, network paths or UNCs. Entries made here will be appended to (placed at the end of) the client's existing path as set in the Autoexec.bat on Windows 9x or in the User's Environment on Windows NTx operating systems.

The Path tab incorporates ScriptLogic's standard Validation Logic.

The entries in the Path list will be processed in the order that they appear in the list. If you wish to prioritize an entry, it should be placed closer to the top of the list.

Manage Paths With Scriptlogic

Suggestion Box
Your comments can help make our site better for everyone.

If you've found something incorrect, broken, or frustrating on this page, let us know so that we can improve it.

USA
Image
Select Country
Switzerland
Denmark
Finland
France
UK
Norway
Sweden
USA
Products
Active Administrator
ChangeAuditor for Windows File Servers
Desktop Authority
Desktop Authority Express
Desktop Authority MSI Studio
Desktop Authority Password Self Service
Enterprise Security Reporter
Help Desk Authority
Hyena
Patch Authority Ultimate
Print Manager Plus
Privilege Authority
Quest Change Base
Ramdisk Plus
Secure Copy
Security Explorer
Product Category
All products
Active Directory
Administration
CITRIX
Compliance
Data Replication
Deployment
Event Monitoring
Exchange
Help Desk Management
High Availability
Management
Network Management
NTFS
Remote Control
Reporting
Scripting
Security
Server Management
Sharepoint
SOX in Europe
User Management
Utilities
 
Updated Pages
Updated:7/4/2012
Active Administrator Updates and Upgrades
Updated:7/4/2012
Hyena Enterprise Edition
Updated:7/4/2012
Hyena Download and Purchase at best price from AMT Software International
Updated:7/4/2012
Managing rights on SecurityExplorer
Updated:7/4/2012
Managing Printer Rights on Windows Servers
Updated:7/4/2012
Hyena - Price
Updated:7/4/2012
Sharepoint Access Right Reporting
Updated:7/4/2012
Managing Printer Rights on Windows Servers
Updated:7/4/2012
Managing Printer Rights on Windows Servers
Updated:7/4/2012
Managing Printer Rights on Windows Servers
Updated:7/4/2012
Managing Printer Rights on Windows Servers
Updated:7/4/2012
Managing Printer Rights on Windows Servers