First of all, thank you for using Deskman, an advanced security administration tool. Please, read this documentation to learn about how Deskman works.

This is the modern version of Deskman, also known as Deskman Network. Deskman works on your computer, and it's accessible via web in your local network. Deskman facilitates the administration of multiple workstations by integrating client and server.

Download

The latest Deskman version is always available on our website. The installation program includes everything you need. Check the system and software requirements below.

Download Deskman

Requirements

The requirements below list the minimal configuration. Any better hardware or newer software may be used. If you experience problems nonetheless, please do not hesitate to contact us.

Software
Windows 7, Windows 8, Windows 10
32bit/64bit
Hardware
60 MB available hard disk space
TCP/IP capable network connection
Web Browser
Firefox
Chrome
Microsoft Edge
Internet Explorer 10, or better

Installation

To install Deskman, execute DESKMANNETSETUP.EXE and follow the directions that appear on screen. If an old version is found, it will be automatically upgraded. Restrictions and settings will be preserved when possible.

Open Deskman

After the installation is over, Deskman will be automatically opened in the default web browser, otherwise click this link: http://127.0.0.1:2288/deskman

The setup program accepts optional command line parameters for fast deployment and unattended installation. Parameters can be used alone, or in conjunction.

Parameters
/silent, /verysilent Instructs Setup to be silent or very silent. When Setup is silent the wizard and the background window are not displayed but the installation progress window is. When a setup is very silent the installation progress window is not displayed. Silent setups do not open Deskman when finished.
/dir="x:\dirname" Overrides the default installation directory (C:\Program Files\Anfibia Deskman Network). A fully qualified pathname must be specified.
/noicons The setup program does not create Deskman icons on desktop or Start Menu.
/syncon The setup program activates sync automatically.

Upgrading

To upgrade Deskman, simply install the new version without uninstalling your old copy. If an old version is found, it will be automatically upgraded, when possible.

Upgrading vs Updating

Updating your Deskman copy is always recommended. You simply need to install the latest update available for you purchased version. Upgrading, on the other hand, means installing a new major release which will also require a new license.

Before Upgrading

Make sure you are ready, before upgrading.

  • Export your restrictions to have backup
  • Sync will stop working until all your installations use the same version
  • Restrictions and settings should be preserved, depending on how old is your old version
  • A new license will be required
Compatibility

Version 5 is compatible with v4 and v3 — restrictions and settings will be preserved, except for the following:

  • The web filter is brand new and it will have to be re-configured
  • Some old activity logs may not show meaningful information
  • A new license will be required

Uninstallation

In order to uninstall Deskman Network, follow the steps listed below.

First, let's make sure restrictions are completely removed:

  1. Open Deskman and go to the Restrictions page, click Undo and confirm.
  2. If there are multiple users on your system, log in on all of them to make sure restrictions are gone.

Then, uninstall Deskman::

  • On Windows 7, open the Control Panel and click "Uninstall a program"
  • On Windows 8, type Control Panel in the Start screen and click "Uninstall a program"
  • On Windows 10, open Settings, go to System and select "Apps & features"
  • Select Deskman Network in the list and click Uninstall, or double-click on it. The uninstall program will be launched—follow the screen directions.

Getting Started

Deskman is web-based, which means you need to open it on your web browser. To open Deskman in the same computer where it's installed, point your browser to http://localhost:2288/deskman or http://127.0.0.1:2288/deskman.

Note that Deskman requires a web browser to configure it, but it's not in the cloud — it must be installed, like any other Windows program, on every computer to be protected.

A web browser is required to configure Deskman, but there are no special network requirements. Deskman can be used locally like any other application.

First Steps

  • Open Deskman, by visiting http://localhost:2288/deskman
  • Protect Deskman with username and password, from the settings page — click on your computer name at the top-right side of the main menu to find it
  • Browse restrictions and decide which ones you need, select them and press Apply to activate them
  • Remember Deskman can be accessed also from other devices on your network: http://ip-address:2288/deskman where "ip-address" is the local IP address of the computer where Deskman is running

Evaluation

The evaluation version is the same as the full version of the product: no nags, no disabled features. However, after the 30-day trial period expires, maintenance mode will be enabled automatically, until the copy is registered.

This allows you to try out all the features in Deskman to confirm that they work to your satisfaction before purchasing a license of use.

You are permitted to try this software on your systems (for 30 days) without any cost or obligation. Payment is required if you find this software to be useful or if you wish to continue using this software beyond the evaluation (trial) period. This product is provided at no charge to the user for evaluation. The purpose of an evaluation version is to provide computer users with quality software on a try before you buy basis, however payment is still required for continued use of the product.

License

Visit the License page to register your copy. Enter your registration details and click Save. Click Edit to modify your license.

Licenses include a 30-day support contract, at least. Upon expiration, licenses keep working, but support entitlement expires.
For more information, please visit our website.

Contact us Buy Deskman

A web browser is required to use Deskman—Firefox, Chrome, Microsoft Edge and Internet Explorer (10 or better) are officially supported.

How to open Deskman
If you are on the same computer where Deskman is installed, point your browser to http://localhost:2288/deskman
To open a Deskman copy installed on a remote computer, make sure firewalls are properly configured and point your browser to http://IP-address:2288/deskman

Dashboard

The dashboard provides you with a general view of the security in place, logged on users and system information. Visit the control center for network/sync details.

Maintenance
From time to time, you may need to remove restrictions temporarily in order to perform maintenance tasks on the PC. Once enabled, maintenance mode will remain active for a limited period of time, until manually disabled, or until the system is restarted.

How it works:

  • Turn maintenance on by clicking the green Maintenance button at the top
  • Turn maintenance off by clicking the red Maintenance button at the top
  • Go to Settings to change maintenance time
  • Applying or syncing restrictions also disables maintenance
Shut Down
Click the Shut Down button to perform one of the following tasks:
  • Log off: close all active user sessions
  • Sleep: put the PC to sleep
  • Hibernate: put the PC in hibernation mode
  • Restart: reboot the PC
  • Shut Down: shut down Windows and turn off the PC
Security Indicators
There are 5 security indicators, each one corresponding to a restriction section: Desktop, Start Menu, System, Apps and Web. A blue light indicates that at least one restriction is enabled on a particular section.
Users
Logged on users will appear on the dashboard, below the web panel. Refresh the page if they don't.
If a user is logged on, click on Screenshot to take a picture of the user's desktop. Click Download to save the screenshot. Click Recent to view the last 4 taken snapshots.
About
Click the Deskman logo at the upper right corner to open the About screen. Refresh the page to view current data, such as CPU and memory load, uptime and integrity, which warns you if Deskman detects that any of its critical components have been tampered with.
Preset
Indicates which preset is in use, if any. Presets are available when selecting restrictions.
Warnings
Important warning messages will appear below the Preset section.

Restrictions

For detailed information, go to Restrictions.

Control Center

Every installation includes its own control center from where to manage the list of remote installations in the network. Deskman is able to contact other installations in the network (local or VPN) to synchronize restrictions and settings. Note that synchronization is not enabled, by default.

How it Works

Synchronization enables Deskman to contact other installations in the network and update them automatically, so that all of them use the same restrictions and settings.

To synchronize restrictions and settings
  1. First of all, make sure the Sync button is turned on.
  2. Whenever you apply/undo restrictions, your Deskman installation will start synchronizing restrictions with other installations.
  3. Whenever you save settings, your Deskman installation will start synchronizing settings with other installations.

Sync Group

If a sync group is entered (Settings), your installation will ignore installations in a different group. Use groups to apply different security configurations, or to shield installations from unwanted sync operations.

Installations
The control center will show you found installations, and you will be able to keep track of their sync status, detect out of sync installations and initiate sync events. In order to find other installations, sync must be enabled on them, and they must be able to communicate between each other. Usually, that means being in the same network and not being blocked by antiviruses or firewalls. Check the troubleshooting guide for details.
Sync Options
Resync Resync allows you to manually sync restrictions and settings from your installation to the rest.
Reset Reset removes all found installations and starts searching again from scratch. Use this option to solve sync issues.
Maintenance Select installations from the list and click Maintenance to activate maintenance on them.
Sync Status
Synced Synchronization finished successfully
Syncing Synchronization in progress. Some installations are out of sync. The system may be shut down, or inaccessible. In any case, Deskman will keep trying. It may take a few minutes to synchronize all installations.
Total Number of located installations vs. number of maximum installations allowed by your license.
Installation List
Host Name of the remote installation
IP Address IP Address of the remote installation
Maintenance Indicates if maintenance is enabled on the remote installation
Status Sync status of the remote installation
Contacted Time and date of the last contact with the remote installation
License

To register all your installations, you just need to register one of them, because licenses are also synced. The maximum number of synchronizable installations will be based on your license. A multi-copy license is required to sync. Note that you may need to resync installations after the license syncing process is finished.

Activity

Visit the Activity page to keep track of what Deskman does: applied restrictions, blocked applications and websites and plenty of other useful information. Logged events are automatically deleted after 30 days. Click Clear to remove them manually. Use the search box to find specific entries.

Settings

The Settings page can be accessed by clicking on your computer's name, at the right side of the top bar. Click Save when finished. If sync is enabled, settings will be automatically synced with other installations.

Settings
Login We highly recommend you to require Deskman users to authenticate themselves. Enter username and password to prevent unauthorized people from messing up with restrictions.
Administrators have special access Check this option to grant administrators special access to the system. Activating maintenance may still be required for full, unrestricted, access. More details.
No user notifications Check this option to hide user notifications.
Accept weak login passwords Check this option to remove the strong password requirement. Not recommended.
Public dashboard Check this option to restrict access to Deskman, while permitting open access to the dashboard.
Maintenance time Enter the maximum maintenance time, in minutes.
Maintenance password Enter a password to be required to activate maintenance when pressing the maintenance hotkey or from the public dashboard.
Maintenance hotkey Click Change to activate a maintenance hotkey. The Hotkey window will appear: press a key combination and wait a couple of seconds. If your hotkey is not accepted, try using Ctrl+Alt with letters, numbers or function keys. Click None to remove the hotkey.
Organization Enter the name of your organization, to be shown when blocking applications or websites.
Sync group Enter a group name, optionally, to sync only with installations of the same group. Recommended to protect your configuration from external, unknown or unwanted sync operations.
Proxy server If you want Deskman to use your proxy server, enter the details here: address:port. Note that Deskman will only connect to your proxy server if the web filter is enabled.
Languages Select a language, or leave it on Auto-detect to obtain the language from your browser.

Restrictions are separated into different sections. Check the desired restrictions and click Apply to activate them. Click Undo to remove restrictions completely. If sync is enabled, restrictions will be synchronized with other installations. Check the control center for details.

System-Wide Restrictions

Restrictions affect all users. There are two ways to pause restrictions: by entering maintenance mode or by granting Windows administrators special access.

Presets

A number of presets are included to help you select restrictions, based on different security requirements:

  • Basic: recommended restrictions to keep users from tampering with desktop and system settings
  • Tight: restrictions to block access to almost every system feature
  • Kiosk: restrictions to lock down the desktop completely, allowing only autorun applications
  • Web: recommended restrictions to protect browsers settings
Import/Export
Restrictions can be exported to a file and imported back, in case of need. Note that settings are not exported, only restrictions.

Desktop

Desktop Restrictions
Hide the desktop Hides desktop icons and disables desktop context menus.
Protect desktop files from tampering Protects desktop icons and files from tampering: they can be executed, but cannot be edited or deleted. Directories are not protected, only files.
Hide the taskbar Hides the taskbar.
Hide notification area Hides the right-side area of the taskbar, where the small icons are shown, including the system clock.
Hide taskbar clock Hides the system clock in the taskbar.
Lock the taskbar Disables the ability move the taskbar around.
Disable taskbar context menu Disables the right-click menu in the taskbar.
Hide taskbar application buttons Hides buttons of running or pinned applications in the taskbar.
Hide action center and Windows 10 notifications On Windows 10, disables access to the action center and hides notifications
Disable System Keys Click buttons to disable different system keys or combinations. Note that disabling Ctrl-Alt-Del also disables the Alt key. Winkeys disables the Windows key and all its combinations. Disabling Ctrl-Alt-Del may require logging off.
Disable Function Keys Click the buttons to disable function keys.
Disable Mouse Buttons Click the buttons to disable mouse buttons.

Start Menu

Deskman includes some helpful Start Menu restrictions (see below) and also the possibility to build your own Start Menu. To create your custom Start Menu, add applications or commands in the Custom Start Menu section.

Important remarks:

  • You may need to log off to activate the custom Start Menu properly, after making changes
  • Entries may include full path and parameters
  • There must be, at least, one entry to enable the custom Start Menu
  • Remove all entries to disable the custom Start Menu
  • Enter additional applications, or commands, by clicking
  • Remove specific entries by clicking
  • Click to remove all entries.

Advanced options:

  • Add one "shut down" option to your custom Start menu using the following codes:
    {logoff}, {restart}, {shutdown}, {hibernate}, {sleep},{lock}
  • To specify a command name: add $$ to your command, followed by the caption, for example:
    c:\program files\myprogram\myapp.exe $$My Command Caption

Start Menu Restrictions
Disable Start Menu | Charm Bar Disables the Start Menu button and the Windows key. The Start Menu remains intact, hidden. On Windows 8.1 the Start charm (button) and charm bar are disabled, instead.
Disallow making changes to the Start Menu Protects the Start Menu from being changed by the user.
Disable search and run | Cortana Disables the ability to search and run local files from the Start Menu. On Windows 10 Cortana is disabled.
Disable access to All Programs Hides the All Programs | All Apps section in the Start Menu.

System

System Restrictions
Disable access to Control Panel | Settings The Control Panel becomes inaccessible, as well as any other system settings and panels dependent from it, such as the Windows Update panel, Settings on Windows 10 and many others.
Boot to desktop on Windows 8.1 Forces Windows 8.1 to boot directly to the current user's desktop.
Disable USB drives Disables the detection of USB drives. Restarting Windows may be required.
Disable autoplay Disables the Autoplay menu that appears when a new external drive is detected.
Disable shutdown options Disables the options to shut down the computer, on Start Menu, charms bar and lock screen.
Disable fast user switching Disables the ability to switch to a different user without having to log off.
Block Windows Explorer | File Explorer Disables access to Windows Explorer and derivatives, such as the Control Panel and many other system configuration windows. Windows Explorer remains intact, but whenever users try to open it, Deskman closes it.
Disable context menu on Explorer and desktop Disables the context menu on Windows Explorer and the desktop.
Disable Explorer options Disables access to folder options on Windows Explorer
Disable main menu, search box, address bar and ribbon Disables top menus and bars on Windows Explorer, and also ribbon on Windows 8 and Windows 10
Hide Computer | This PC Hides the Computer/This PC folder on Windows Explorer
Hide Network Hides the Network folder on Windows Explorer
Block browser settings on Firefox, Chrome and Internet Explorer Blocks access to Firefox, Chrome and Internet Explorer settings
Internet Explorer Kiosk Mode Enables a special Internet Explorer Kiosk Mode, where only a single tab is available, without navigation bars or options, and limited hotkeys.
Safe Task Manager Enables the Safe Task Manager. Highly recommended. More details below.
Disable Explorer Drives Click buttons to disable access to drives on Windows Explorer. Click All to disable access to all drives.
Keep Always Running Use this section if you need to make sure certain programs are always running; if someone closes the application, it will be run again. Enter an executable (*.exe) including path and/or parameters, if necessary.

Safe Task Manager

The Safe Task Manager substitutes the original Task Manager — it only shows running user applications, everything else is hidden. The Safe Task Manager automatically appears when the user presses Ctrl-Shift-Esc, or whenever the Windows Task Manager is executed.

Enabling the Safe Task Manager is highly recommended to protect Deskman and other critical system processes. Click Setup to configure some advanced options.

Safe Task Manager Options
New Task Shows the option to run applications.
End Task Shows the option to terminate running tasks.
Log off ... Hibernate Shows different options to close the system.
Allow system tools By default, the Safe Task Manager blocks the following tools: Regedit, Command Prompt, PowerShell, Cygwin and Microsoft Management Console. Check this option to allow them.
Show desktop icons Shows the Icons tab, which allows access to public or user desktop icons.

Apps

Use the Application Filter section to stop unwanted applications. Block applications by entering permitted executables, or folders, in the Allowed Applications section. Your executables will be allowed, plus other critical system processes. All other applications will be blocked.

The following presets are available:

  1. Allow Installed Programs: This preset adds c:\program files, thus allowing all installed applications. This way, users will be able to run currently installed programs, and Windows applications, and nothing else. New software installation will be blocked, and unknown executables as well.
  2. Allow Currently Running Programs: This preset adds running executables to the list of allowed applications. Thus, users will only be able to run these executables, and nothing else.

Important remarks:

  • This filter works as a whitelist: entered applications will be allowed, everything else will be blocked, with exceptions to let Windows operate normally.
  • There must be, at least, one executable, or folder, to start blocking applications.
  • To stop blocking programs, remove all entries.
  • Enter additional executables, or folders, by clicking
  • Remove specific entries by clicking
  • Click to remove all entries.

Web

Deskman is able to filter web browsing—access to all domains will be forbidden, except for the domains that are specifically allowed. To start blocking websites, enter domains in the Allowed Domains section, one at least. To stop blocking websites, remove all entries.

Using the Web Filter

Click Analyze to let Deskman auto-detect domains for you. Let the Analyze window open and visit the websites that you want to allow on a different tab or browser. Go back to the Analyze window and click Done to add found domains.

The following preset is available:

  1. Allow Recommended Domains: This preset adds multiple domains to let Windows operate normally and to let browsers auto-update.

Enabling the following system restrictions is highly recommended to protect browsers from tampering:

  • Disable access to Control Panel | Settings
  • Block browser settings on Firefox, Chrome and Internet Explorer

Important remarks:

  • The web filter works as a whitelist: entered domains will be allowed, everything else will be blocked, with exceptions to let Windows operate normally.
  • The web filter works as a proxy, blocking/allowing access to HTTP/HTTPS requests.
  • To make Deskman use your own proxy, go to Settings and enter a proxy server.
  • Domains and IP addresses are accepted.
  • Wildcards are accepted.
  • There must be, at least, one domain to start blocking websites.
  • To stop blocking websites, remove all entries.
  • Enter additional domains by clicking
  • Remove specific entries by clicking
  • Click to remove all entries.

Check the troubleshooting guide, for more details.

Highly Recommended

Go to Restrictions and open the System tab to enable the following restrictions:

Activate Restrictions

Go to Restrictions, select the ones you need and click Apply.

Most restrictions are activated/removed instantly, but some of them work better after logging off. In case something doesn't work as expected, try logging off.

Remove Restrictions

Go to Restrictions and click Undo.

Import or Export

Go to the restrictions page and click Import or Export, on the right side of the screen, below the Presets section. Settings are not exported or imported, only restrictions.

Sync

First, activate sync from the control center. Once sync is enabled on all your installations, they will appear on the control center. From this point, when you apply restrictions, or save settings, on any installation, the others will receive the same restrictions or settings. Check the Troubleshooting section for help.

Pause Restrictions

If you need to pause restrictions, enter maintenance.

  • To activate maintenance locally, go to the dashboard and click the green Maintenance button.
  • To activate maintenance on remote installations, go to the control center, select installations and click the green Maintenance button.

Use Presets

There are many restrictions available: some of them override others in the same category, some may be useful for you, and some may not. Combine restrictions to achieve your goals. In case of doubt, click on one of the available presets: Basic, Tight, Kiosk or Web.

Deploy Deskman

  1. Install and configure one Deskman installation. Activate sync, apply restrictions, save your settings and register your copy.
  2. Install Deskman with sync enabled by executing the following command: deskmannetsetup.exe /verysilent /syncon
  3. Repeat step 2.

Autorun a Website

Go to Restrictions, then click on the System tab and browse to the bottom of the page. There you'll find the Keep Always Running section. Enter the following command: iexplore.exe http://yourwebsite

Autorun a Program

Go to Restrictions, then click on the System tab and browse to the bottom of the page. There you'll find the Keep Always Running section. Enter an executable, including path and parameters, if necessary.

Blacklist Programs

By default, the application filter allows access to your executables and folders— it's a whitelist. In case you need to block specific programs, simply add a > before the executable, like so: >regedit.exe

Disable UNC Paths

If disabling access to drives is not enough, and you also need to disable UNC path access to folders and drives, check this Start Menu restriction: Disable search and run | Cortana.

Show Organization

If you enter your company name in the Organization box, in Settings, it will be used when notifications show up.

Forgot your password?

Ask for support.

Local Security Remarks

Deskman applies restrictions on the computer where it's installed. If you are browsing Deskman locally and activate restrictions, you may lock yourself down. If that happens, remember that you can access Deskman from any other PC/tablet/smartphone in the same network by pointing your browser to: http://Computer-IP-Address:2288/deskman

Password Protection

  • Enter username and password in Settings to prevent unauthorized people from using Deskman.
  • Entering a strong password is highly recommended.
  • Passwords cannot be recovered. If you forget the password, uninstall and install Deskman again. If you're stuck, submit a support ticked and we will help you.

Firewall & Antivirus

Make sure your firewall and antivirus software do not block Deskman, or put deskman.exe, deskmanbar.exe or deskmansvc.exe in sandbox/quarantine mode. In addition, the firewall must allow deskmansvc.exe and deskmanbar.exe to establish IN/OUT connections.

Check antivirus and firewall, particularly if:

Synchronization Issues

Please note that syncing takes time at the beginning because Deskman needs to find remote installations in the first place. Once they are found, synchronization events are not immediate: a few minutes should suffice.

Most sync issues can be solved by clearing the installation list. Click Reset in the control center to solve sync issues. Otherwise, check the following:

  • Sync needs to be enabled on every installation
  • License must be synced
  • Installing more copies than permitted by your license will create syncing issues
  • Deskman versions need to be the same
  • Firewall exceptions need to be in place — see above
  • System date and time must be correct — synchronized by an Internet time server, ideally
  • Network proxies will probably stop sync operations
  • Installations on a (different) sync group are ignored

Web Filter, Proxy, Analyze

The web filter is proxy-based, meaning web browsers request Deskman permission before accessing websites. Some important remarks:

  • Changes are instant but some applications (other than web browsers) may need you to log off to notice changes
  • Before uninstalling Deskman, press Undo to remove all restrictions and disable the web filter
  • If there's already a proxy in place, it will be disabled when Deskman's web filter is enabled
  • To make Deskman use your own proxy, go to Settings and enter a proxy server
  • Analyze won't work properly if multiple Deskman pages are open on the same system
  • Analyze only works on localhost
  • Make sure there are no proxy extensions enabled on your browser

Remote Access

Deskman is a web application installed on your computer — it's not installed on the cloud. You can access your Deskman installation remotely only if you can also access your computer remotely:

  • Locally, via your local network: http://Computer_IP_Address:2288/deskman
  • Remotely, via VPN
  • Remotely, via direct IP, after configuring NAT, firewalls, etc.

Maintenance

Some remarks about how maintenance works:

  • Maintenance stays in effect until maintenance time expires, after manually disabled or until the system is restarted
  • Change the maintenance time in Settings
  • Maintenance applies to the local PC or to other installations if activated from the control center

Administrators have special access

If you enable the Administrators have special access setting, Deskman will not apply most restrictions when administrators log on. However, some restrictions (policies) will still be in effect unless maintenance mode is enabled, in particular:

  • Disable taskbar context menu
  • Disallow making changes to the Start Menu
  • Disable search and run
  • Disable access to Control Panel | Settings
  • Boot to desktop on Windows 8.1
  • Disable autoplay
  • Disable shutdown options
  • Disable fast user switching
  • Disable context menu on Explorer and desktop
  • Disable Explorer options
  • Hide Computer | This PC
  • Hide Network
  • Internet Explorer Kiosk Mode
  • Disable Explorer Drives

In addition, there are some restrictions that are not disabled under maintenance because they may require a reboot to be enabled or disabled:

  • Disable Ctrl-Alt-Del
  • Disable camera
  • Disable USB drives

Integrity Check

Deskman automatically monitors its own components to detect tampering—it's called an integrity check. If your installation fails the integrity check, some of Deskman's critical files may have been modified or corrupted. Deskman should be reinstalled and the security level increased. If there are no integrity warnings on your dashboard, everything is fine.

What information does Anfibia Software collect regarding Deskman?

Deskman is not an online service. Deskman is self-hosted software. The software is installed on your computer, and only you have access to it. As such, we do not remotely collect data of any kind: emails, passwords, credit card numbers, phone numbers, usernames, configurations, logs, IP addresses, etc.

When you purchase a Deskman license, we store name, organization, address, and email, as provided by you, the buyer -directly- or through our e-commerce partners Stripe and FastSpring. Check their Privacy Policy here and here, respectively.

When you register your copy, we store (and validate) your registration key in our server.

What is done with the information?

We may contact you using your email address to inform you of new versions or for customer support; if you wish for us to not do that, please reply and let us know.

How is my information protected?

The Deskman and Anfibia Software websites and servers use industry standard protocols to protect all information obtained including SSL encryption (secure socket layers), and hardware firewalls.

Why and how does Deskman use cookies?

A cookie is a small piece of data sent to your web browser by a server and stored on your hard drive. Many websites leave a cookie on your machine in order to identify you should you return. Cookies can not read any data from your hard drive other than what is already included in the cookie. Deskman stores a cookie on your computer so that you do not have to re-enter your username and password every time, but only if you decide to activate the Remember Me option.

How is Deskman protected from remote intrusions?

The user is able to activate a login screen which asks for user and password in order to access Deskman. Passwords are not stored—hashes are, which means that the original passwords cannot be retrieved. Synchronization is disabled by default.

How is user's privacy affected?

Being a desktop security tool, Deskman provides the administrator with the ability to take desktop screenshots, log blocked applications and websites, and running processes. No other specific user information is collected.

What if I have a question or problem related to my privacy?

Please contact us at https://www.anfibia.in/support.htm or info@anfibia.in.

Consent

You must consent to this privacy policy to use Deskman.

Notice to users: Carefully read the following legal agreement. Use of the software provided with this agreement (the "software") constitutes your acceptance of these terms. If you do not agree to the terms of this agreement, do not install and/or use this software. User's use of this software is conditioned upon compliance by user with the terms of this agreement.

1. License grant. Anfibia Software grants you a license to use one copy of this software on any one system for as many licenses as you purchase. "You" means the company, entity or individual whose funds are used to pay the license fee. "Use" means storing, loading, installing, executing or displaying the software. You may not modify the software or disable any licensing or control features of the software except as an intended part of the software's programming features. When you first obtain a copy of the software, you are granted an evaluation period of not more than 30 days, after which time you must pay for the software according to the terms discussed in the software's documentation, or you must remove the software from your system. This license is not transferable to any other system, or to another organization or individual. You are expected to use the software on your system and to thoroughly evaluate its usefulness and functionality before making a purchase. This "try before you buy" approach is the ultimate guarantee that the software will perform to your satisfaction; therefore, you understand and agree that there is no refund policy for any purchase of the software.

1.1 Software misuse. This software should never be installed, or used, without the PC administrator's consent. This software is designed for use when any required consents have been obtained. Anfibia Software declines all responsibility concerning any illicit usage.

2. Ownership. The software is owned and copyrighted by Anfibia Software. Your license confers no title or ownership in the software and should not be construed as a sale of any right in the software.

3. Copyright. The software is protected by European copyright laws and international treaty provisions. You acknowledge that no title to the intellectual property in the software is transferred to you. You further acknowledge that title and full ownership rights to the software will remain the exclusive property of Anfibia Software and you will not acquire any rights to the software except as expressly set forth in this license. You agree that any copies of the software will contain the same proprietary notices which appear on and in the software.

4. Reverse engineering. You agree that you will not attempt to reverse compile, modify, translate, or disassemble the software in whole or in part.

5. No other warranties. Anfibia Software does not warrant that the software is error free. Anfibia Software disclaims all other warranties with respect to the software, either express or implied, including but not limited to implied warranties of merchantability, fitness for a particular purpose and noninfringement of third party rights. Some jurisdictions do not allow the exclusion of implied warranties or limitations on how long an implied warranty may last, or the exclusion or limitation of incidental or consequential damages, so the above limitations or exclusions may not apply to you. This warranty gives you specific legal rights and you may also have other rights which vary from jurisdiction to jurisdiction.

6. Severability. In the event of invalidity of any provision of this license, the parties agree that such invalidity shall not affect the validity of the remaining portions of this license.

7. No liability for consequential damages. In no event shall Anfibia Software be liable to you for any consequential, special, incidental or indirect damages of any kind arising out of the delivery, performance or use of the software, even if Anfibia Software has been advised of the possibility of such damages. In no event will Anfibia Software's liability for any claim, whether in contract, tort or any other theory of liability, exceed the license fee paid by you, if any.

8. Governing law. This license will be governed by the European law. The united nations convention on contracts for the international sale of goods is specifically disclaimed.

9. Entire agreement. This is the entire agreement between you and Anfibia Software which supersedes any prior agreement or understanding, whether written or oral, relating to the subject matter of this license.

Deskman copyright © 2016 by Anfibia Software. All rights reserved.