Welcome to Deskman! In this guide you will find detailed information about this security application; how it works and how to set it up, among others.
Deskman facilitates the protection and security administration of multiple workstations from your web browser, privately. Install Deskman on as many systems as you need and all of them will share the same restrictions in no time. Deskman is also designed to protect single, isolated workstations.
Deskman is really easy to install and use. There are no special requirements, no dependencies and no restrictive hardware limitations, except for a basic list of minimum requirements as seen below.
This documentation is valid for Deskman 10, available at anfibia.net.
What is Deskman?
Deskman is an advanced security tool that allows administrators to combine restrictions to achieve the desired security level. It runs silently in the background, keeping systems secured at all times.
Download Deskman, if you haven't already, and check if it suits your needs.
The latest Deskman version is always available on our website. The installation program includes everything you need. Check the system and software requirements below.
The requirements below list the minimal configuration. Microsoft Windows 64-bit versions are required. Any better hardware or newer software may be used; latest versions of Windows and supported web browsers are recommended. If you experience problems nonetheless, please do not hesitate to contact us.
- Windows 10
- Windwos 11
- 1 gigahertz (GHz) or faster processor
- At least 2 GB of memory
- 100MB available disk space
- Microsoft Edge
Windows 7 and Internet Explorer
This version requires Windows 10 and a modern web browser. However, Deskman 9 is still available for Windows 7 or Internet Explorer support.
Download Deskman 9 if you need to install Deskman on old Windows versions.
To install Deskman, execute
deskmansetup.exe and follow the directions that appear on screen. If an old version is found, it will be automatically upgraded. Old settings will be preserved when possible.
After the installation is over, Deskman will be automatically opened in the default web browser, otherwise point your browser to http://localhost:2288
The setup program accepts optional command line parameters for fast deployment and unattended installation. Parameters can be used alone, or in conjunction.
|/silent, /verysilent||Instructs the setup program to be silent or very silent. When the setup program is silent the wizard and the background window are not displayed but the installation progress window is. When a setup is very silent the installation progress window is not displayed. Silent setups do not open Deskman when finished.|
|/dir="x:\dirname"||Overrides the default installation directory, in Program Files. A fully qualified pathname must be specified.|
|/noicons||Instructs the setup program to omit creating Deskman icons on the desktop or the Start Menu.|
|/import||Instructs the setup program to import a local backup file. The backup file must be named deskman.dat and must be located in the same directory. Note that presets can be exported/imported from the Restrictions page and data can be synced between multiple installations from the Sync page.|
To upgrade Deskman, install the new version without uninstalling your old copy. If an old version is found, it will be automatically upgraded, when possible. Note that only version 10 and later can be automatically upgraded.
Make sure you are ready, before upgrading:
- Export your data for backup
- Sync may stop working properly with installations using different versions
- Restrictions and settings should be preserved, but it depends on how old your old version is
- Re-applying or re-syncing restrictions may be required
- A new license may be required
To uninstall Deskman, open Windows Settings, locate Apps & features, select Deskman and click on Uninstall.
Before uninstallation, make sure all restrictions are completely disabled by clicking Undo, from the restrictions page.
Before uninstalling Deskman, export your data from Settings, in case you change your mind or in case you want to preserve your data. Once Deskman is uninstalled, all logs and data will be gone.
After the installation is over, Deskman will be running on your system, ready to work. Deskman is web-based, which means you need to open it on your web browser. To open Deskman on the same computer where it's installed, point your browser to http://localhost:2288 or http://127.0.0.1:2288.
- Deskman requires a web browser for configuration, but it is not in the cloud and internet access is optional
- Deskman must be manually installed on every system
A web browser is required to configure Deskman, but there are no special network requirements. Deskman can be used locally like any other application.
Deskman includes multiple restrictions and policies: some of them override others in the same category, some may be useful for you, and some may not. Combine them to achieve your goals.
- Open Deskman by visiting http://localhost:2288
- Set up permissions! Protect Deskman with username and password, by visiting the settings page
- Explore available restrictions and decide which ones you need; select them and click Apply to activate them
- Completely remove restrictions from the restrictions page, by clicking Undo
- Visit the dashboard to suspend restrictions, in case you want to pause restrictions temporarily
- In case of need, remember you can open Deskman from any system connected to the same network by using your local IP address or hostname, for example
You are permitted to try this software on your system (for 30 days) without any cost or obligation. Payment is required if you find this software to be useful or if you wish to continue using this software beyond the evaluation (trial) period. This product is provided at no charge to the user for evaluation. The purpose of an evaluation version is to provide computer users with quality software on a try before you buy basis, however payment is still required for continued use of the product.
This method allows you to try out all the features in Deskman to confirm that they work to your satisfaction before purchasing a license of use.
The evaluation version is the same as the full version of the product: no nags, no disabled features. However, after the 30-day trial period expires, restrictions will be automatically suspended until the copy is registered.
A web browser is required to configure Deskman — updated versions of Firefox, Chrome, Microsoft Edge and Safari are supported.
On your system, Deskman is available at http://localhost:2288. To open Deskman from other systems on your network, make sure firewalls are properly configured and point your browser to
Make sure you know your computer's local IP address and/or host name. You may need it to re-configure Deskman from another system on your network.
Deskman's user interface is compatible with many modern desktop and mobile web browsers, which means you can configure Deskman also from your phone or tablet as long as they are in the same network as your Deskman installation.
The dashboard provides you with a general view of the security in place, active users and system information. Visit the sync page for networking/syncing details.
From time to time, you may need to remove restrictions temporarily in order to perform specific tasks on your system. Restrictions will remain suspended for a limited period of time, until manually resumed, or until the system is restarted.
- Pause restrictions temporarily by clicking Suspend
- Unpause restrictions by clicking Resume
- Change the suspension time limit in Settings
- Applying restrictions, syncing restrictions or restarting Windows will automatically resume restrictions
Deskman startup time and access type will appear in this section. Access type indicates if Deskman is being accessed locally or remotely.
Deskman evaluation and version warnings will appear in this section, particularly if there's a newer version available to download.
This section includes information about your Windows version, hostname, IP address, CPU and memory load, Windows users and running processes.
Note that system and critical processes are not visible. Processes can be killed if the appropriate option is enabled in Settings.
The Actions button includes the following options:
- Log off: closes all active Windows user sessions
- Sleep: puts the system to sleep
- Restart: restarts the system
- Shut down: shuts down Windows and turns off the system
Restrictions are separated into different sections. Check the desired restrictions and click Apply to activate them. Click Undo to remove restrictions completely. If sync is enabled, restrictions will be synchronized with other installations. Check the sync page for details.
Up to 10 presets can be stored, helping you keep multiple configurations for easy access.
- Select your restrictions, click the Presets button and then click Save to save a new preset
- Click a preset name to load it and then click Apply to activate it
- Click X next to a preset to remove it
- Update a preset by saving it with the same name
- Presets are automatically synced with other installations
Presets can be imported/exported by clicking the appropriate button in the Presets menu.
|Hide the desktop||Hides all desktop icons and disables desktop context menus.|
|Disable ability to edit or delete desktop files||Protects desktop icons and files from tampering: they can be executed, but cannot be edited or deleted. Directories are not protected, only icons or files. If new files are added to the desktop, restrictions will need to be re-applied in order to protect them.|
|Disable edge swiping using touch||Disables the ability to swipe using touch from the edges of the screen.|
|Hide the taskbar||Hides the taskbar and disables the Start Menu.|
|Hide the notification area||Hides the right-side area of the taskbar, where status icons are shown, including the system clock.|
|Hide the taskbar clock||Hides the system clock in the taskbar. On Windows 11, the whole notification area is hidden.|
|Lock the taskbar||Disables the ability to resize and move the taskbar around. Not compatible with Windows 11.|
|Disable taskbar settings menu||Disables the right-click settings menu in the taskbar.|
|Hide taskbar application buttons||Hides buttons of running or pinned applications in the taskbar.|
|Disable action center||Disables access to the action center.|
|Disable task view||Disables the task view functionality.|
|Disable the notification area||Disables access to the right-side area of the taskbar: elements are visible but cannot be interacted with.|
|Lock PC when user is idle for X minutes||Automatically locks the PC if there's no keyboard or mouse activity for X minutes.|
|Log off user when idle for X minutes||Automatically logs off the current Windows user if there's no keyboard or mouse activity for X minutes.|
|Ctrl-Alt-Del||Disables the Ctrl-Alt-Del combination. Restart required. The Alt key is also disabled. Important: If you are required to press Ctrl-Alt-Del before logging on to Windows, do not disable Ctrl-Alt-Del.|
|Ctrl-Shift-Esc||Disables the Ctrl-Shift-Esc combination.|
|Winkey||Disables the Windows Key and all its combinations. Restart required. Exception: The Winkey is required to activate the Custom Start Menu. If the Custom Start Menu is enabled, all Winkey combinations are disabled, except Winkey+L.|
|Menu||Disables the Menu, or Application, key.|
|Alt-F4||Disables the Alt-F4 combination.|
|Alt-Tab||Disables the Alt-Tab combination.|
|Esc||Disables the Esc key.|
|Delete||Disables the Delete key, also known as the "forward delete" key.|
|Backspace||Disables the Backspace key.|
|Tab||Disables the Tab key.|
|Ctrl||Disables commonly used hotkeys that require the Ctrl key, like Ctrl-S, Ctrl-F4, Ctr-W, etc. The Ctrl key itself is not disabled for security reasons.|
|Alt||Disables the Alt key.|
|Alt Gr||Disables the Alt Gr key.|
|Copy & Paste||Disables the Ctrl-C, Ctrl-V and Ctrl-X combinations.|
|Function Keys||Disables the respective function key.|
|Media||Disables many associated function key actions, such as play, stop, open browser, set volume or launch mail program.|
|Middle Button||Disables the middle mouse button.|
|Right Button||Disables the right mouse button.|
|Disable Control Panel and Settings||Disables access to Windows Settings, the Control Panel and the Windows Defender Security Center.|
|Block access to Mail account settings||Blocks access to the account settings screen on Mail.|
|Block administrative and command line tools||Blocks access to common administrative tools, including: Windows Task Manager, Regedit, Command Prompt, PowerShell, Process Explorer and Microsoft Management Console.|
|Enable safe task manager||The Windows Task Manager is temporarily replaced with a very limited task manager, where users can only view running applications and activate some handy power actions, like log off, restart and shut down.|
|Restrict access to settings on web browsers||Disables access to multiple configuration sections on Firefox, Chrome and Microsoft Edge; including settings, extensions, DevTools, incognito mode and file:/// directory access. In some cases, web browsers may need to be restarted to appreciate changes.|
|Block option menus on web browsers||Restricts access to option menus on Firefox, Chrome and Microsoft Edge.|
|Disable USB drives||Disables the detection of USB drives.|
|Disable writing to USB drives||Disables the ability to write to USB drives.|
|Disable Autoplay||Disables the Autoplay menu that appears when a new external drive is detected.|
|Disable shutdown options||Disables power actions to shut down the computer on Start Menu and lock screen.|
|Disable fast user switching||Disables the ability to switch to a different user without having to log off.|
|Block File Explorer||Blocks access to the File Explorer and similars, such as the Control Panel and other system configuration windows.|
|Disable context menu on File Explorer and desktop||Disables context menus on File Explorer, the desktop and open/save dialog boxes.|
|Disable folder options on File Explorer||Disables access to folder options on File Explorer.|
|Disable top menus and ribbon on File Explorer||Disables top menus, ribbon and bars on File Explorer and open/save dialog boxes.|
|Disable navigation pane on File Explorer||Disables the navigation pane on File Explorer and open/save dialog boxes.|
|Disable Quick access on File Explorer||Disables the Quick access folder and hides recent files on File Explorer and open/save dialog boxes.|
|Remove special folders from This PC||Removes special folders (3D Objects, Desktop, Documents, Downloads, Music, Pictures and Videos) from This PC on File Explorer and open/save dialog boxes.|
|Hide This PC on File Explorer||Hides the This PC folder on File Explorer and open/save dialog boxes.|
|Hide Network on File Explorer||Hides the Network folder on File Explorer and open/save dialog boxes.|
|File Explorer Drives||Enter drive letters, comma-separated, to disable their respective drives on File Explorer and open/save dialog boxes.|
Start Menu Section
|Disable Start Menu||Disables the Start Menu button and the Windows key, while keeping the Start Menu intact but hidden. The Ctrl-Esc combination is also disabled.|
|Block ability to change apps, shut down or sign out on Start Menu||Protects the Start Menu from being changed by the user and disables the Power and user menus. Not compatible with Windows 11, currently.|
|Disable search and run on the Start Menu||Disables the ability to search and run local files from the Start Menu and taskbar.|
|Hide list of installed apps in Start Menu||Hides the programs list in the Start Menu. Not compatible with Windows 11, currently.|
Custom Start Menu
This section allows you to build your own Start Menu. Once your custom Start Menu is in place, the original Start Menu will remain hidden, preserved.
- Click Add Command or New to add a command to the Custom Start Menu.
- Click Enabled to activate the Custom Start Menu.
- Select an entry and click Remove to delete it from the Custom Start Menu.
- Click Apply when ready to activate changes.
- If the Custom Start Menu is enabled, the Windows key will only be used to open the menu.
- When entering commands, the full path may be required to show the proper application icon.
This section is a software filter, where you can stop unwanted applications. Block applications by adding permitted executables, or folders.
Permitted programs will be allowed, all other applications will be blocked. System/critical processes will also be allowed, even if they do not appear in the list.
- Click Add Application or New to add an application to the filter.
- Click Enabled to activate the filter.
- Select an entry and click Remove to delete it from the filter.
- Click Apply when ready to activate changes.
- The following entries are accepted:
This section is a web filter. Access to all domains and IP addresses is forbidden, except for the ones that are specifically allowed.
The web filter works as a proxy, blocking/allowing access to HTTP/HTTPS requests. Deskman uses the following proxy server and port:
The web filter works as a whitelist: entered domains/IP addresses will be allowed, everything else will be blocked, with exceptions to let Windows Update operate normally.
- Click Add Domains or New to add an entry to the filter.
- Click Enabled to activate the filter.
- Select an entry and click Remove to delete it from the filter.
- Click Apply when ready to activate changes.
- The following entries are accepted:
- Wildcards are valid, for example:
Every installation is capable of syncing data with other installations on the network. This allows you to configure many workstations easily, from a single point.
The sync page shows available installations on the network belonging to the same group. In order to find other installations, sync must be enabled on them, and they must be able to communicate between each other. Usually, that means being in the same network and not being blocked by antivirus or firewall. Check the troubleshooting guide for help.
Deskman contacts other installations on the network and updates them automatically, so that all of them use the same restrictions and settings.
How Sync Works
Once sync is enabled on your installation, Deskman will start syncing data with other systems whenever settings are changed or restrictions are applied.
Syncing is limited to installations in the same group, with the same license. Installations in other groups will be ignored.
Groups are useful to separate installations, in case you need to maintain different configurations, or to shield installations from unwanted sync operations. By default, installations belong to the
DEFAULT group. Installations from other groups are ignored.
- To change your group click on the Change group link at the top and enter a group name.
- To return to the
DEFAULTgroup, leave the group name empty.
At the top, you can see the syncing status section.
|Ready||Synchronization finished successfully, all installations are synced.|
|In progress||Synchronization in progress. Some installations could be out of sync: systems may be shut down, or inaccessible. In any case, Deskman will keep trying. It may take several minutes to synchronize all available installations.|
At the top right side, you can see the syncing limit section, showing the number of found installation versus the maximum number of installations. The latter being based on the number of copies allowed by your license.
|Host||Name of the remote installation. Syncing bridges are marked with (*).|
|Address||IP Address, or domain, of the remote installation.|
|Version||Deskman version of the remote installation.|
|Status||Syncing status of the remote installation: ready, syncing or out of sync.|
|Contacted||Time and date of last contact.|
The Actions menu includes options to manipulate the installation list. Select one, or more installations from the list and then select one of the options below.
|Suspend||Suspends restrictions on selected installations.|
|Sleep||Puts Windows to sleep on selected installations.|
|Restart||Restarts Windows on selected installations.|
|Shut down||Shuts down Windows on selected installation.|
|Remove||Removes selected installations from the list.|
If you have multiple networks, not connected between them, you can use a Deskman installation as a bridge. Thus, you'll be able to sync data with installations on different networks.
To set up a bridge, go to Settings and enter the
address of your remote installation in the Syncing Bridge section.
In order to seamlessly and securely access installations from the syncing list without having to enter username and password each time go to Settings and enable the Single sign-on option.
In order to register all your installations, you just need to register one of them, because licenses are also synced. The maximum number of synchronizable installations is based on your license. Thus, a multi-copy license is required to sync.
Syncing can be disabled by clicking the Disable Sync link, in the middle of the screen.
Visit the settings page to configure Deskman and manage user permissions. Click Save when finished. If sync is enabled, settings will be automatically synced with other installations.
|Exclude Windows Administrators||Check this option to exclude Windows administrators from restrictions, except for some desktop and system policies. Suspending restrictions may still be required for full, unrestricted, access. Note that this feature only supports local administrator accounts. Remote, domain based or AD groups are not supported.||Hide user notifications||Check this option to hide user notifications that appear on screen. Note that notifications only pop up if they are activated on Windows Settings, or permitted by the user, regardless of this option.|
|Single sign-on||Check this option to allow single sign-on connections from the sync page. Thus, users will not be required to log in when moving from one installation to another on the sync page. Sessions will still be authenticated, but users will not have to enter username and password every time.|
|Processes can be killed on dashboard||Check this option to be able to terminate specific processes from the dashboard.|
|Light theme||Check this option to apply a light theme to the interface.|
|Suspension limit||Enter the maximum suspension time, in minutes. When the time expires restrictions will be resumed automatically.|
|Hotkey||Select one of the available hotkeys. Pressing the hotkey will suspend restrictions. Pressing the hotkey during suspension will resume restrictions, after being suspended 1 minute, at least.|
|Hotkey password||Enter a password to be required in order to suspend restrictions, when pressing the hotkey.|
|Save weekly backup||Enter a directory where you'd like Deskman to save a weekly backup of your data: logs and configuration files. Use this option to keep old logs: they are automatically deleted after 30 days.|
|Export logs and settings||Click Export to download a zip file containing stored logs and configuration files, including restrictions, settings and license. Important: do not share your data file and use with caution to avoid license issues.|
|Session timeout||Enter the session timeout, in minutes. By default, Deskman sessions expire after 30 minutes of inactivity. Inactive users are automatically logged out after the limit is reached and need to enter their credentials again.|
|Syncing bridge||Enter a syncing bridge address, optionally, to make Deskman sync with a remote installation. The syncing bridge will be useful if you have multiple installations, on different networks, allowing you to sync everything through a single address (bridge). Enter the
From this section, you can create and modify user accounts to protect access to Deskman or grant access to specific areas to different users. Up to twenty user accounts can be enabled, besides the admin account, which is required.
It is highly recommended to require authentication in order to access Deskman. To do so, go to Permissions, in Settings, and create the administrator account.
Having an administrator account is required in order to create user permissions.
Once the admin account has been created, adding user permissions is simple: click on New to start, then enter username and password — users will be able to change their passwords later, from their profile. Then select the areas of Deskman that will be permitted to the user. Click Save to finish.
- Users can be modified by clicking on their name, in the list. Or deleted by selecting them and clicking Remove.
- Users can be excluded from restrictions, but suspending restrictions may still be required for full, unrestricted, access. Note that the username must coincide with the Windows account name for this feature to work.
- The maximum number of users is 20.
- Users can change their own password, or add two-factor authentication, from their profile, accessible by clicking the blue user icon at the top right corner of each page.
Visit the license page to register your copy. Follow the instructions included in your license email. Licenses include a 30-day support period, or more, if a maintenance contract is purchased. Once registered, check your license details on the license page.
- Track total registered copies from the sync page: synced installations share the same license.
- Online validation is optional. Pending validation notifications can be ignored if the installation is not connected to the internet.
- Upon expiration, licenses keep working but support entitlement ends: contact us to purchase maintenance.
Visit this page to view the log, with information about user activity, applied restrictions, blocked applications, filtered websites, warnings and plenty of useful details.
Use the Search box to find specific entries. Next to it, the Export button includes options to export logs as CSV.
- Logs are automatically deleted after 30 days, but can be stored externally by checking Save weekly backup in Settings.
- Logs can be manually exported from Settings.
- By default, the log table has a limit of 20 lines per page, which can be expanded from the Options section at the top.
- Constantly repeated log events are ignored for 1 minute to avoid cluttering the log. For example, if Deskman blocks an application repeatedly, you will only find it mentioned once per minute in the log.
Open the restrictions page, select the restrictions you need and click Apply. Most restrictions are activated instantly, but some of them require a Windows restart.
Open the restrictions page, and click Undo. Most restrictions are disabled instantly, but some of them require a Windows restart.
Go to Settings and click on the Permissions tab, next to the Main tab, at the top.
Change the password
Users can change their own password, or add two-factor authentication, from their profile, accessible by clicking on the blue user icon at the top right corner of each page.
Go to the restrictions page, click on the Presets button, save your restrictions to a preset and then click on Export.
Go to the restrictions page, click on the Presets button and click on Import. Select the file to be imported. Load a preset by clicking on it and then click Apply to activate restrictions.
Sync must be manually enabled from the sync page. Once sync is enabled on all your installations, they will appear in the sync page, after a few minutes. From this point, when you apply restrictions, or change settings, on any installation, the others will receive the same restrictions and settings.
If you need to pause restrictions temporarily, you can suspend them:
- To suspend restrictions on one installation, go to its dashboard and click Suspend.
- To suspend restrictions on multiple installations, go to a sync page, select some installations, click Actions and then click Suspend.
Block software installation
Use the software filter. Go to the restrictions page and click the Applications tab. Then click Add application or New. Check the Configuration Assistance section. Add the items program files and users to the list to allow already installed programs and nothing else. New software installations will be blocked.
By default, the software filter permits access to your executables and folders — it's a whitelist. In case you need to block specific programs, select an entry from the list and toggle the Permitted option off.
Disable UNC paths
If disabling access to drives is not enough, and you also need to disable UNC path access to folders and drives, use this restriction: Disable search and run on the Start Menu.
Allow guest access
If you need to allow someone to use Deskman, but with limited access: go to Settings, then go to Permissions and add a new user account with selected permissions.
Sync on different networks
If you have multiple networks, not connected between them, use one Deskman installation as a bridge. Go to Settings and enter the external address and port of your installation in the Syncing Bridge section. Firewalls will need to be properly configured.
Create a backup file
Go to Settings and click on Export, in the Data section. Note that your license is also included in the backup file. Do not share it and use it with caution to avoid license issues.
Restore a backup file
Check the installation section for details on how to import your backup file.
Remove or swap your license
If you want to move your license to another system: uninstall Deskman to recover your license. Once Deskman has been uninstalled you can register a new copy on a different computer. Just make sure your total number of registered copies is not higher than the total allowed by your license to avoid issues.
Check program health externally
Deskman includes an endpoint for health monitoring, returning current status, localhost only:
Restrictions not working?
Try restarting Windows after clicking Apply. Some restrictions, particularly the following, require a restart in order to be fully applied or removed, in some cases.
- Alt Gr
Forgot your password?
Submit a support ticket providing your license number.
Unable to open Deskman
Deskman should be accessible anywhere on your network at
http://ip_address:2288, where ip_address is the local IP address of the computer in question.
Firewall and antivirus
Make sure your firewall and antivirus software do not block Deskman, or put deskman.exe or deskmansvc.exe in sandbox/quarantine mode. In addition, the firewall must allow deskmansvc.exe to establish IN/OUT connections.
Restrictions are not applied
Check the following:
- Make sure you have applied restrictions.
- Some restrictions may require a log off or restart.
- If you are excluded, as administrator, restrictions will not apply to you.
- Check if restrictions are suspended.
- Check if your antivirus or firewall are blocking Deskman.
Users are not excluded
- Hide the desktop
- Disable edge swiping using touch
- Block ability to change apps, shut down or sign out on Start Menu
- Hide list of installed apps in Start Menu
- Lock the taskbar
- Disable taskbar settings menu
- Alt Gr
- Disable Control Panel and Settings
- Disable USB drives
- Disable writing to USB drives
- Disable Autoplay
- Disable shutdown options
- Disable fast user switching
- Disable context menu on File Explorer and desktop
- Disable folder options on File Explorer
- Disable Quick access on File Explorer
- Remove special folders from This PC
- Hide This PC on File Explorer
- Hide Network on File Explorer
- File Explorer Drives
Syncing takes time at the beginning because Deskman needs to find remote installations in the first place. Once they are found, synchronization events are not immediate: a few minutes should suffice, but it depends on availability, speed and network configuration.
Check the following, in case issues persist:
- Sync needs to be enabled on every installation.
- License must be synced.
- Installing more copies than permitted by your license will create syncing issues.
- Deskman versions need to be the same.
- Firewall exceptions need to be in place.
- System date and time must be correct — synchronized by an Internet time server, ideally.
- Network proxies will probably stop syncing operations.
- Installations from a different syncing group are ignored.
Web filter issues
The web filter is proxy-based, meaning web browsers will request Deskman for permission to access websites.
Check the following:
- Changes are instant but some applications may need you to log off to notice changes.
- If there's already a proxy in place, it will be disabled when Deskman's web filter is enabled.
- Make sure there are no proxy extensions enabled on your browser.
- The proxy server should be set to
- Restrictions remain suspended until the time limit expires, until manually resumed or until the system is restarted.
- Change the suspension time limit in Settings.
- Restrictions are suspended on a specific installation, or on multiple installations if activated from the sync page.
A browser error message is displayed when blocking websites
Deskman does not tamper with HTTP/HTTPS, thus making impossible to insert messages into the browser. Thus, the browser reports a "unable to connect" error.
A website is not fully displayed even though it's been allowed
Websites tend to contact multiple domains while loading. Check the log for blocked domains. Remember you can use IP addresses, keywords and wildcards when adding domains, like
Deskman automatically monitors its own components to detect tampering. If your installation fails the integrity check, some of Deskman's critical files may have been modified or corrupted. Deskman should be downloaded again from our website, reinstalled and the security level increased. If there are no integrity warnings on your dashboard or log, everything should be fine.
Before uninstallation, open the restrictions page and click Undo to remove restrictions.
This privacy statement refers to the product Deskman. Please, check our online privacy statement for complementary information.
What information does Anfibia Software collect regarding Deskman?
Deskman is not an online service. Deskman is self-hosted software. The software is installed on your computer, and only you have access to it. As such, we do not remotely collect data of any kind: emails, passwords, credit card numbers, phone numbers, usernames, configurations, logs, IP addresses, etc.
When you register your copy, we store (and validate) your registration key in our server.
What is done with the information?
We may contact you using your email address to inform you of new versions or for customer support; if you wish for us to not do that, please reply and let us know.
How is my information protected?
The Deskman websites and servers use industry standard protocols to protect all information obtained including SSL encryption (secure socket layers), and hardware firewalls.
A cookie is a small piece of data sent to your web browser by a server and stored on your hard drive. Many websites leave a cookie on your machine in order to identify you should you return. Cookies can not read any data from your hard drive other than what is already included in the cookie. Deskman stores a cookie on your computer to keep track of your browser session.
How is Deskman protected from remote intrusions?
Deskman does not require an internet connection to work properly. The user is able to activate a login screen which asks for user and password in order to access Deskman. Passwords are not stored—hashes are, which means that the original passwords cannot be retrieved. Furthermore, the user is able to activate two-factor authentication and network synchronization is disabled by default.
How is user's privacy affected?
Being a desktop security tool, Deskman provides the administrator with the ability to log user account names, user session times, blocked applications and websites, and running processes. No other specific user information is collected.
What if I have a question or problem related to my privacy?
End-user Software License Agreement
Notice to users: Carefully read the following legal agreement. Use of the software provided with this agreement (the "software") constitutes your acceptance of these terms. If you do not agree to the terms of this agreement, do not install and/or use this software. User's use of this software is conditioned upon compliance by user with the terms of this agreement.
1. License grant. Anfibia Software grants you a license to use one copy of this software on any one system for as many licenses as you purchase. "You" means the company, entity or individual whose funds are used to pay the license fee. "Use" means storing, loading, installing, executing or displaying the software. You may not modify the software or disable any licensing or control features of the software except as an intended part of the software's programming features. When you first obtain a copy of the software, you are granted an evaluation period of not more than 30 days, after which time you must pay for the software according to the terms discussed in the software's documentation, or you must remove the software from your system. This license is not transferable to any other system, or to another organization or individual. You are expected to use the software on your system and to thoroughly evaluate its usefulness and functionality before making a purchase. This "try before you buy" approach is the ultimate guarantee that the software will perform to your satisfaction; therefore, you understand and agree that there is no refund policy for any purchase of the software.
1.1 Software misuse. This software should never be installed, or used, without the PC administrator's consent. This software is designed for use when any required consents have been obtained. Anfibia Software declines all responsibility concerning any illicit usage.
2. Ownership. The software is owned and copyrighted by Anfibia Software. Your license confers no title or ownership in the software and should not be construed as a sale of any right in the software.
3. Copyright. The software is protected by European copyright laws and international treaty provisions. You acknowledge that no title to the intellectual property in the software is transferred to you. You further acknowledge that title and full ownership rights to the software will remain the exclusive property of Anfibia Software and you will not acquire any rights to the software except as expressly set forth in this license. You agree that any copies of the software will contain the same proprietary notices which appear on and in the software.
4. Reverse engineering. You agree that you will not attempt to reverse compile, modify, translate, or disassemble the software in whole or in part.
5. No other warranties. Anfibia Software does not warrant that the software is error free. Anfibia Software disclaims all other warranties with respect to the software, either express or implied, including but not limited to implied warranties of merchantability, fitness for a particular purpose and noninfringement of third party rights. Some jurisdictions do not allow the exclusion of implied warranties or limitations on how long an implied warranty may last, or the exclusion or limitation of incidental or consequential damages, so the above limitations or exclusions may not apply to you. This warranty gives you specific legal rights and you may also have other rights which vary from jurisdiction to jurisdiction.
6. Severability. In the event of invalidity of any provision of this license, the parties agree that such invalidity shall not affect the validity of the remaining portions of this license.
7. No liability for consequential damages. In no event shall Anfibia Software be liable to you for any consequential, special, incidental or indirect damages of any kind arising out of the delivery, performance or use of the software, even if Anfibia Software has been advised of the possibility of such damages. In no event will Anfibia Software's liability for any claim, whether in contract, tort or any other theory of liability, exceed the license fee paid by you, if any.
8. Governing law. This license will be governed by the European law. The united nations convention on contracts for the international sale of goods is specifically disclaimed.
9. Entire agreement. This is the entire agreement between you and Anfibia Software which supersedes any prior agreement or understanding, whether written or oral, relating to the subject matter of this license.
Deskman Copyright © 2000-2021 by Anfibia Software.