Welcome to Deskman! In this guide you will find detailed information about Deskman; how it works and how to set it up, among others.

Deskman facilitates the protection and security administration of multiple workstations from your web browser, privately. Install Deskman on as many systems as you need and all of them will share the same restrictions in no time. Deskman is also designed to protect single, isolated workstations.

Deskman is really easy to install and use. There are no special requirements, no dependencies and no restrictive hardware limitations, except for a basic list of minimum requirements as seen below.

Check the troubleshooting and how to... sections, in case you need help, or contact us for assistance.

This documentation is valid for Deskman 9, available at

The latest Deskman version is always available on our website. The installation program includes everything you need. Check the system and software requirements below.


The requirements below list the minimal configuration. Any better hardware or newer software may be used. If you experience problems nonetheless, please do not hesitate to contact us.

  • Windows 7
  • Windows 10
  • 32-bit
  • 64-bit
  • 1 gigahertz (GHz) or faster processor
  • At least 1 gigabyte (GB) for 32-bit or 2 GB for 64-bit
  • 100MB available disk space
Web Browser
  • Firefox
  • Chrome
  • Microsoft Edge
  • Internet Explorer 11


To install Deskman, execute deskmansetup.exe and follow the directions that appear on screen. If an old version is found, it will be automatically upgraded. Old settings will be preserved when possible.

The setup program accepts optional command line parameters for fast deployment and unattended installation. Parameters can be used alone, or in conjunction.

/silent, /verysilent Instructs the setup program to be silent or very silent. When the setup program is silent the wizard and the background window are not displayed but the installation progress window is. When a setup is very silent the installation progress window is not displayed. Silent setups do not open Deskman when finished.
/dir="x:\dirname" Overrides the default installation directory, in Program Files. A fully qualified pathname must be specified.
/noicons Instructs the setup program to omit creating Deskman icons on the desktop or the Start Menu.
/syncon Instructs the setup program to activate sync automatically.
/import Instructs the setup program to import a local backup file. The backup file must be named deskmanbackup.cfg and must be located in the same directory.


To upgrade Deskman, install the new version without uninstalling your old copy. If an old version is found, it will be automatically upgraded, when possible.

Make sure you are ready, before upgrading:

  • Export your restrictions to have backup
  • Sync may stop working properly with installations using different versions
  • Restrictions and settings should be preserved, but it depends on how old your old version is
  • Re-applying or re-syncing restrictions may be required
  • A new license may be required


To uninstall Deskman, open the Control Panel and click Uninstall a program. Select Deskman and double-click on it to uninstall.

Before uninstallation, make sure all restrictions are completely disabled by clicking Undo, from the restrictions page.


After the installation is over, Deskman will be running on your system, ready to work. Deskman is web-based, which means you need to open it on your web browser. To open Deskman in the same computer where it's installed, point your browser to http://localhost:2288 or

  • Deskman requires a web browser for configuration, but it is not in the cloud and internet access is optional
  • Deskman must be manually installed on every system
  • Each Deskman copy integrates client and server, via a control center

Get Started

A web browser is required to configure Deskman, but there are no special network requirements. Deskman can be used locally like any other application.

Deskman includes multiple restrictions and policies: some of them override others in the same category, some may be useful for you, and some may not. Combine them to achieve your goals.

  • Open Deskman by visiting http://localhost:2288
  • Protect Deskman with username and password, by visiting the settings page
  • Explore available restrictions and decide which ones you need; select them and click Apply to activate them
  • Completely remove restrictions from the restrictions page, by clicking Undo
  • Visit the dashboard to suspend restrictions, in case you want to pause restrictions temporarily
  • In case of need, remember you can open Deskman from any system connected to the same network by using your local IP address or hostname, for example or http://DESKTOP-PGDMNT:2288


You are permitted to try this software on your system (for 30 days) without any cost or obligation. Payment is required if you find this software to be useful or if you wish to continue using this software beyond the evaluation (trial) period. This product is provided at no charge to the user for evaluation. The purpose of an evaluation version is to provide computer users with quality software on a try before you buy basis, however payment is still required for continued use of the product.

This method allows you to try out all the features in Deskman to confirm that they work to your satisfaction before purchasing a license of use.

The evaluation version is the same as the full version of the product: no nags, no disabled features. However, after the 30-day trial period expires, restrictions will be automatically suspended until the copy is registered.


Visit the settings page to register your copy. Follow the instructions included in your license email. Licenses include a 30-day support period, or more if a maintenance contract is purchased. Once registered, check your license details on the settings page.

  • Track total registered copies from the control center: synced installations share the same license.
  • Online validation is optional. Pending validation notifications can be ignored if the installation is not connected to the internet.
  • Upon expiration, licenses keep working but support entitlement ends: contact us to purchase maintenance.

For more information, please check the FAQ or contact us.

Using Deskman

A web browser is required to configure Deskman — updated versions of Firefox, Chrome, Microsoft Edge, Safari and Internet Explorer 11 are supported.


The dashboard provides you with a general view of the security in place, active users and system information. Visit the control center for networking/syncing details.

CPU and Memory Bars

There are two bars, below the Deskman logo, representing CPU and memory load, from top to bottom. Data is automatically refreshed every minute.


Deskman is always available on your local network. It can be accessed locally, or remotely from a different system connected to the same network. The dashboard will indicate if your connection is local or remote.


Click shutdown icon to perform one of the following tasks:

  • Log off: closes all active user sessions
  • Sleep: puts the system to sleep
  • Hibernate: puts the system in hibernation mode
  • Restart: reboots the system
  • Shut Down: shuts down Windows and turns off the system
Suspend Restrictions

From time to time, you may need to remove restrictions temporarily in order to perform specific tasks on your system. Restrictions will remain suspended for a limited period of time, until manually resumed, or until the system is restarted.

  • Pause restrictions temporarily by clicking Suspend restrictions
  • Unpause restrictions by clicking Resume restrictions
  • Change the time limit in Settings
  • Applying restrictions, syncing restrictions or restarting Windows will automatically resume restrictions

Logged on Windows users will appear in the dashboard. Refresh the page if they don't. To take a picture of the user's desktop, click camera icon and wait until the picture appears on screen. Then click Download to save the screenshot. Click Recent to view the last four snapshots.


Restrictions are separated into different sections. Check the desired restrictions and click Apply to activate them. Click Undo to remove restrictions completely. If sync is enabled, restrictions will be synchronized with other installations. Check the control center for details.


Up to six profiles can be stored, helping you keep multiple configurations for easy access.

  • Select your restrictions and click plus icon to save a new profile
  • Click the profile name to load it and then click Apply to activate your profile
  • Click trash icon to remove a profile
  • Update a profile by clicking plus icon and entering the same profile name
  • Profiles are automatically synced with other installations

Profiles can be imported/exported by clicking the appropriate button in this section. Note that settings are not exported, only profiles.

Desktop Section
Hide the desktop Hides all desktop icons and disables desktop context menus.
Disable ability to edit or delete desktop files Protects desktop icons and desktop files from tampering: they can be executed, but cannot be edited or deleted. Directories are not protected, only icons/files.
Disable edge swiping using touch Disables the ability to swipe using touch from the edges of the screen, on Windows 10.
Disable Start Menu Disables the Start Menu button and the Windows key, while keeping the Start Menu intact but hidden. The Ctrl-Esc combination is also disabled.
Disallow making changes to the Start Menu Protects the Start Menu from being changed by the user.
Disable search and run on the Start Menu Disables the ability to search and run local files from the Start Menu and taskbar.
Hide list of installed apps in Start Menu Hides the programs list in the Start Menu.
Hide the taskbar Hides the taskbar and disables the Start Menu.
Hide notification area Hides the right-side area of the taskbar, where status icons are shown, including the system clock.
Hide taskbar clock Hides the system clock in the taskbar.
Lock the taskbar Disables the ability to resize and move the taskbar around.
Disable taskbar settings menu Disables the right-click settings menu in the taskbar.
Hide taskbar application buttons Hides buttons of running or pinned applications in the taskbar.
Disable action center Disables access to the action center, on Windows 10.
Disable task view Disables the task view functionality, on Windows 10.
Disable notification area Disables access to the right-side area of the taskbar: elements are visible but cannot be interacted with.
Disable System Keys Selected keys or combinations are disabled. Important remarks about some special keys or combinations:
  • Ctrl-Alt-Del: This restriction also disables the Alt key. Important: If you are required to press Ctrl-Alt-Del before logging on to Windows, do not disable Ctrl-Alt-Del.
  • Winkey: This restriction disables the Windows key and all its combinations. Exception: The Winkey is required to activate the Custom Start Menu. If the Custom Start Menu is enabled, all Winkey combinations are disabled, except Winkey+L.
  • Ctrl: This restriction disables commonly used hotkeys that require the Ctrl key, like Ctrl-S, Ctrl-F4, etc. The Ctrl key itself is not disabled for security reasons.
Disable Function Keys Selected function keys are disabled. The Media button disables associated actions, such as play, stop, open browser, set volume or launch mail program.
Disable Mouse Buttons Selected mouse buttons are disabled.
Start Menu Section

This section allows you to build your own Start Menu. Once your custom Start Menu is in place, the original Start Menu will remain hidden, preserved.

  • To enable the custom Start Menu, add applications or commands
  • Remove all entries to disable the custom Start Menu
  • Winkey combinations will be disabled: the Winkey is used to open the custom Start Menu
  • Commands, including full path if necessary, are accepted: full path may be required to show the proper application icon
  • Commands are named automatically; to specify a name add $$ to your command, followed by the caption, like: c:\folder\program.exe $$My Caption

Click tools icon to open the section menu, with the following options:

Firefox Adds Mozilla Firefox to your Start Menu in kiosk mode, as an example.
Chrome Adds Google Chrome to your Start Menu in kiosk mode, as an example.
Microsoft Edge Adds Microsoft Edge to your Start Menu in kiosk mode, as an example.
Internet Explorer Adds Internet Explorer to your Start Menu in kiosk mode, as an example.
Lock PC, Log off, Restart, Shut down Adds shutdown events to your custom Start Menu. Shutdown events are available by using the following special keywords:
{lock}, {logoff}, {restart}, {shutdown}, {hibernate}, {sleep}
Clear Removes all entries from the list.
System Section
Disable Control Panel and Settings Disables access to Windows Settings and Windows Defender Security Center. Also disables the Control Panel and all similar panels, such as the Windows Update panel.
Block access to Mail account settings Blocks access to the account settings screen on Mail, on Windows 10.
Block administrative tools: task manager, regedit, cmd, powershell, mmc Blocks access to common administrative tools, including: Windows Task Manager, Regedit, Command Prompt, PowerShell, Cygwin, Process Explorer and Microsoft Management Console.
Use safe task manager The Windows Task Manager is replaced with a very limited task manager, where users can only view running applications and activate some handy power actions, like log off, restart and shut down.
Restrict access to settings on web browsers Disables access to multiple configuration sections on Firefox, Chrome, Microsoft Edge and Internet Explorer; including settings, extensions, DevTools, incognito mode and file:/// directory access. In some cases, web browsers may need to be restarted to appreciate changes.
Block access to option menus on web browsers Restricts access to option menus on Firefox, Chrome and Microsoft Edge.
Use Internet Explorer in kiosk mode Forces Internet Explorer to work in a special kiosk mode, with a single tab, no navigation bars, no options and no exit buttons.
Disable USB drives Disables the detection of USB drives.
Disable writing to USB drives Disables the ability to write to USB drives.
Disable autoplay Disables the Autoplay menu that appears when a new external drive is detected.
Disable shutdown options Disables power actions to shut down the computer on Start Menu and lock screen.
Disable fast user switching Disables the ability to switch to a different user without having to log off.
Block File Explorer Blocks access to File Explorer and similars, such as the Control Panel and other system configuration windows.
Disable context menu on File Explorer and desktop Disables context menus on File Explorer, the desktop and open/save dialog boxes.
Disable folder options on File Explorer Disables access to folder options on File Explorer.
Disable top menus and ribbon on File Explorer Disables top menus, ribbon and bars on File Explorer and open/save dialog boxes.
Disable navigation pane on File Explorer Disables the navigation pane on File Explorer and open/save dialog boxes.
Disable Quick access on File Explorer Disables the Quick access folder and hides recent files on File Explorer and open/save dialog boxes, on Windows 10.
Remove special folders from This PC Removes special folders (3D Objects, Desktop, Documents, Downloads, Music, Pictures and Videos) from This PC on File Explorer and open/save dialog boxes, on Windows 10.
Hide This PC on File Explorer Hides the This PC/Computer folder on File Explorer and open/save dialog boxes.
Hide Network on File Explorer Hides the Network folder on File Explorer and open/save dialog boxes.
Disable Access to Drives on File Explorer Hides and disables access to selected drives on File Explorer and open/save dialog boxes.
Lock PC When Idle The PC is automatically locked — the Windows lock screen is activated — when there's no keyboard or mouse activity for X minutes. Empty means disabled. Minimum idle time is 5 minutes.
Apps Section

Use the Apps section to stop unwanted applications. Block applications by entering permitted executables, or folders, in the Allowed Applications section. Your executables will be allowed, plus other critical system processes. All other applications will be blocked.

Click tools icon to open the section menu, with the following options:

Installed Programs Allows already installed applications, by adding this folder: c:\program files. Currently installed programs and Windows applications will be allowed but nothing else — software installation will be blocked and unknown executables, as well.
Running Applications Allows currently running programs, by adding them to the list.
Clear Removes all entries from the list.
Web Section

Deskman is able to filter web browsing: access to all domains is forbidden, except for the domains that are specifically allowed. To start blocking websites, enter domains in the Allowed Domains section, one at least. To stop blocking websites, remove all entries.

The web filter works as a proxy, blocking/allowing access to HTTP/HTTPS requests. Deskman uses the following proxy server and port: localhost:2280

The web filter works as a whitelist: entered domains will be allowed, everything else will be blocked, with exceptions to let Windows Update operate normally.

  • The following elements are accepted: domain, IP address
  • Wildcards are accepted, for example: *, domain.*, *word*
  • To remove all entries, click tools icon to open the section menu and select Clear
Startup Section

This sections allows you to add commands — with full path and parameters, if necessary — to be executed by Windows at startup. Startup commands are run each time a new user logs in. To remove all entries, click tools icon to open the section menu and select Clear.

Control Center

Every installation includes its own control center from where to manage the list of available installations on the network and keep them in sync.


The control center shows available installations on the network pertaining to the same group. In order to find other installations, sync must be enabled on them, and they must be able to communicate between each other. Usually, that means being in the same network and not being blocked by antivirus or firewall. Check the troubleshooting guide for help.

Sync on/off

By default, sync is disabled. Click ON to start syncing. Click OFF to stop syncing. If you have problems finding other installations, turn sync off and on to reset sync operations.


Groups are useful to separate installations, in case you need to maintain different configurations, or to shield installations from unwanted sync operations. By default, installations belong to the DEFAULT group. Installations from other groups are ignored.

  • To change your group click on the Actions button and select Set Group
  • To return to the DEFAULT group, click on Actions, select Set Group, leave it empty and click Save
Syncing Status
Ready Synchronization finished successfully
Syncing Synchronization in progress. Some installations are out of sync. The system may be shut down, or inaccessible. In any case, Deskman will keep trying. It may take several minutes to synchronize all installations.
Total The total number of available installations. Total also indicates number copies using the same license, because licenses are automatically synced. A disparity between found installations and total installations could be due to: version mismatch, group mismatch, license mismatch or unreachable installation.
Host Name of the remote installation
IP Address IP Address of the remote installation
Version Deskman version of the remote installation
Status Status of the remote installation: ready, syncing or suspended
Contacted Time and date of last contact
Suspend Restrictions Suspends restrictions on selected installations
Log off Logs off all user sessions on selected installations
Restart Restarts Windows on selected installations
Shut Down Shuts down Windows on selected installation
Resync Initiates a sync operation, re-syncing restrictions and settings from your installation to the rest
Set Group Allows admins to change the syncing group: enter a group name and click Save, or leave it empty to return to the DEFAULT group
Sync Hub

If you have multiple networks, not connected between them, you can use one Deskman installation as a nexus. Go to Settings and enter address:port in the Sync Hub box.

Single Sign-on

In order to seamlessly and securely access installations without having to enter username and password each time go to Settings and enable the Single sign-on option. Admin only.

License Syncing

To register all your installations, you just need to register one of them, because licenses are also synced. The maximum number of synchronizable installations is based on your license. Thus, a multi-copy license is required to sync.


Visit the settings page to change general options and manage users. Click Save when finished. If sync is enabled, settings will be automatically synced with other installations.

Admin Settings

Creating an admin account is required in order to create other user accounts.

Username, password It is highly recommended to require authentication. Enter username and password to prevent unauthorized people from using Deskman.
Exclude Windows Administrators Check this option to exclude Windows administrators from restrictions, except for some desktop and system policies. Suspending restrictions may still be required for full, unrestricted, access. Note that this feature only supports local accounts. Remote, domain based or AD groups are not supported.
Accept weak login passwords Check this option to remove the strong password requirement. Not recommended.
Hide user notifications Check this option to hide user notifications that appear on screen when suspending/resuming restrictions, blocking webs/apps or taking desktop snapshots. On Windows 10, notifications only pop up if they are activated in Windows Settings, regardless of this option.
Store logs Logs are deleted after 30 days. Check this option to store copies of daily logs in csv format. Stored logs can be retrieved by clicking the Backup button in this section.
Single sign-on Check this option to allow single sign-on connections from the control center. Thus, admins will not be required to log in when moving from one installation to another in the control center. Sessions will still be authenticated, but you will not have to enter username and password each time.
Suspend time Enter the maximum suspension time, in minutes. When the time expires restrictions will be resumed automatically.
Suspend hotkey Click change to activate, or remove, a suspension hotkey and follow the directions. Pressing the hotkey will suspend restrictions. Pressing the hotkey during suspension will resume restrictions, after being suspended 1 minute, at least.
Hotkey password Enter a password to be required in order to suspend restrictions, when pressing the hotkey.
Sync hub Enter a sync hub address, optionally, to make Deskman sync with a remote installation. A sync hub will be useful if you have multiple installations, on different networks, allowing you to sync everything through a single address (hub). Enter address:port and make sure it is accessible externally. Note: hub installations will no be able to suspend restrictions or perform shutdown actions from the control center.
Proxy server Optionally, enter address and port of a proxy server and traffic will be forwarded to this proxy after applying restrictions. Note that Deskman will only connect to this proxy server if the web filter is enabled.
Brand Enter the name of your organization, optionally. Your brand will be shown on user notifications, when blocking applications or websites, and at the login screen.
Session Timeout Enter the session timeout, in minutes. By default, Deskman sessions expire after 30 minutes of inactivity. Inactive users are automatically logged out after the limit is reached and need to enter their credentials again.
Language Select a user interface language, or leave it on Auto to obtain the language from your browser.
Data Click Backup to download a zip file containing all stored logs and your Deskman data file, which includes restrictions, settings and license. Important: do not share your data file and use with caution to avoid license issues.
User Accounts

Optionally, up to five user accounts can be enabled, besides the admin account, which is required.

  • Click on plus icon to add accounts
  • Click on trash icon at the bottom to remove accounts
  • Remember to click Save when finished to confirm changes
  • Users must be allowed to access one section, at least
Username, password Enter username and password for the user account
Dashboard Allows access to the dashboard
Restrictions Allows access to the restrictions page
Control Center Allows access to the control center
Activity Allows access to the activity page
Account Allows access to the account page, where users can change their password
Settings Allows access to the settings page, granting admin access

The license section is available after your copy is registered. Check your license number, support expiration date and other details in this section.


Visit the Activity page to view the activity log: applied restrictions, blocked applications, filtered websites, warnings and plenty of other useful information. Use the search box to find specific entries.

  • Events are automatically deleted after 30 days, but can be stored indefinitely as CSV files by checking Store logs in Settings
  • Applied restrictions can be inspected by locating the appropriate entry and then clicking search icon
  • By default, the activity log has a limit of 50 explorable entries, which can be expanded to 200 or 1000 entries, at the bottom, while the total number of log entries can be seen at the lower right side
  • Log entries can be exported by clicking ⇣CSV, located at the upper right corner

How to...

Activate restrictions

Open the restrictions page, select the restrictions you need and click Apply. Most restrictions are activated instantly, but some of them work better after logging off Windows. In case something doesn't work as expected, try logging off. Some extreme cases may require a reboot.

Remove restrictions

Open the restrictions page, and click Undo. Most restrictions are removed instantly. In case something doesn't work as expected, try logging off Windows. Some extreme cases may require a reboot.

Block software installation

Use the application filter. Go to the restrictions page and click the Apps tab. Then click tools icon to open the section menu. Select Installed programs. Click Apply. Deskman will allow only already installed programs. New software installations will be blocked.

Export restrictions

Go to the restrictions page, save your restrictions to a profile and then click Export. Settings are not exported or imported, only profiles.

Import restrictions

Go to the restrictions page and click Import. Select the file to be imported. Your profiles will be imported. Load a profile by clicking on it and then click Apply to activate restrictions.


First, activate sync from the control center. Once sync is enabled on all your installations, they will appear in the control center, after a few minutes. From this point, when you apply restrictions, or save settings, on any installation, the others will receive the same restrictions and settings.

Pause restrictions

If you need to pause restrictions temporarily, suspend them:

  • To suspend restrictions on one installation, go to its dashboard and click Suspend Restrictions
  • To suspend restrictions on multiple installations, go to a control center, select installations, click Actions and then click Suspend Restrictions
Blacklist applications

By default, the application filter allows access to your executables and folders — it's a whitelist. In case you need to block specific programs, add > before the executable, like >notepad.exe

Disable UNC paths

If disabling access to drives is not enough, and you also need to disable UNC path access to folders and drives, check this desktop restriction: Disable search and run on the Start Menu.

Show your organization

If you enter your company name in the Brand box, in Settings, it will be used when notifications show up and at the login screen.

Export activity logs

To export the activity log as CSV, go to the Activity page and click ⇣CSV, located at the upper right side of the Recent Activity table. To export all stored logs, click Backup, in Settings.

Allow guest access

If you need to allow someone to use Deskman, but with limited permissions: go to Settings, add a new user account and select permissions.

Sync on different networks

If you have multiple networks, not connected between them, use one Deskman installation as a hub. Go to Settings and enter the external address and port of your installation in the Sync Hub section. Firewalls will need to be properly configured.

Restrict access to folders

Deskman is unable to restrict access to folders. The proper way to do so would be using folder permissions. However, Deskman can help you allow access to a specific folder while blocking access to the rest of the drive.

Method #1: Blocking drive and mapping folder as virtual drive
  • Go to Restrictions, click on System and disable a drive, for example C:
  • Click on the Startup tab and enter subst x: c:\\folder where x: is the new drive and c:\\folder is the folder to be permitted
  • Note that two slashes are required instead of the usual single slash, in this case
  • Click on Apply
  • Log off to appreciate changes
Method #2: Restricting access on File Explorer
  • Go to Restrictions, click on Desktop and disable the Backspace key: select Back, in the Disable System Keys section
  • Click on the System tab and select: Disable top menus and ribbon on File Explorer and Disable navigation pane on File Explorer
  • Click on the Startup tab and enter explorer c:\folder where c:\folder is the folder to be permitted
  • Click on Apply
Create a backup file

Go to Settings and click the backup button. Note that your license is also included in the data file. Do not share and use with caution to avoid license issues.

Restore a backup file

Check the installation section for details on how to import your backup file.

Remove or swap your license

If you want to move your license to another system: uninstall Deskman to recover your license. Once Deskman has been uninstalled you can register a new copy on a different computer. But make sure your total number of registered copies is not higher than the total allowed by your license.

Check program health externally

Deskman includes an endpoint for health monitoring, returning current status, localhost only: http://localhost:2288/deskman/api/status.json


Forgot your password?

Submit a support ticket providing your license number.

Unable to open Deskman

Deskman should be accessible anywhere on your network at http://ip_address:2288, where ip_address is the local IP address of the computer in question.

Firewall and antivirus

Make sure your firewall and antivirus software do not block Deskman, or put deskman.exe, deskmanbar.exe or deskmansvc.exe in sandbox/quarantine mode. In addition, the firewall must allow deskmansvc.exe and deskmanbar.exe to establish IN/OUT connections.

Restrictions are not applied

Check the following:

  • Make sure you have applied restrictions
  • Some restrictions may require a log off or reboot
  • If you are excluded, as administrator, restrictions will not apply to you
  • Check if restrictions are suspended
  • Check if your antivirus or firewall are blocking Deskman
  • Some restrictions only work on Windows 10, check the documentation
Windows administrators are not excluded

If the Exclude Windows Administrators option is enabled, in Settings, Deskman will not apply restrictions when administrators log on. However, startup programs and the following desktop and system restrictions will remain applied unless restrictions are suspended:

  • Hide the desktop
  • Disable edge swiping using touch
  • Disallow making changes to the Start Menu
  • Hide list of installed apps in Start Menu
  • Lock the taskbar
  • Disable taskbar settings menu
  • Ctrl-Alt-Del
  • Winkey
  • Alt Gr
  • Disable Control Panel and Settings
  • Use Internet Explorer in kiosk mode
  • Disable USB drives
  • Disable writing to USB drives
  • Disable autoplay
  • Disable shutdown options
  • Disable fast user switching
  • Disable context menu on File Explorer and desktop
  • Disable folder options on File Explorer
  • Disable Quick access on File Explorer
  • Remove special folders from This PC
  • Hide This PC on File Explorer
  • Hide Network on File Explorer
  • Disable Access to Drives on File Explorer

Note that this feature only supports local accounts. Remote, domain based or AD groups are not supported — Deskman may not be able to identify whether a user has administrator rights.

Syncing issues

Syncing takes time at the beginning because Deskman needs to find remote installations in the first place. Once they are found, synchronization events are not immediate: a few minutes should suffice, but it depends on availability, speed and network configuration.

Try resetting your control center to fix issues: turn sync OFF and ON again.

Check the following, in case issues persist:

  • Sync needs to be enabled on every installation
  • License must be synced
  • Installing more copies than permitted by your license will create syncing issues
  • Deskman versions need to be the same
  • Firewall exceptions need to be in place
  • System date and time must be correct — synchronized by an Internet time server, ideally
  • Network proxies will probably stop sync operations
  • Installations from a different syncing group are ignored
Web filter issues

The web filter is proxy-based, meaning web browsers will request Deskman for permission to access websites.

Check the following:

  • Changes are instant but some applications may need you to log off to notice changes
  • If there's already a proxy in place, it will be disabled when Deskman's web filter is enabled
  • To make Deskman use your own proxy, go to Settings and enter a proxy server
  • Analyze won't work properly if multiple Deskman tabs are open at the same time
  • Analyze only works on localhost
  • Make sure there are no proxy extensions enabled on your browser
  • The proxy server should be set to localhost:2280 to work
About suspension
  • Restrictions remain suspended until the time limit expires, until manually resumed or until the system is restarted
  • Change the suspension time limit in Settings
  • Restrictions are only suspended on a specific installation, or on multiple installations if activated from the control center
A browser error message is displayed when blocking websites

Deskman does not tamper with HTTP/HTTPS, thus making impossible to insert messages into the browser. Thus, the browser reports a "unable to connect" error.

A website is not fully displayed even though it's been allowed

Websites tend to contact multiple domains while loading. Check the activity log for blocked domains. Remember you can use keywords and wildcards when adding domains, like *google* or *.google.*. Use Analyze to help you add domains.


Deskman automatically monitors its own components to detect tampering. If your installation fails the integrity check, some of Deskman's critical files may have been modified or corrupted. Deskman should be downloaded again from our website, reinstalled and the security level increased. If there are no integrity warnings on your dashboard or activity log, everything should be fine.

Uninstalling Deskman

Before uninstallation, open the restrictions page and click Undo to remove restrictions.


This privacy statement refers to the product Deskman. Please, check our online privacy statement for complementary information.

What information does Anfibia Software collect regarding Deskman?

Deskman is not an online service. Deskman is self-hosted software. The software is installed on your computer, and only you have access to it. As such, we do not remotely collect data of any kind: emails, passwords, credit card numbers, phone numbers, usernames, configurations, logs, IP addresses, etc.

When you purchase a Deskman license, we store name, organization, address, and email, as provided by you, the buyer -directly- or through our e-commerce partners Stripe and FastSpring. Check their Privacy Policy here and here, respectively.

When you register your copy, we store (and validate) your registration key in our server.

What is done with the information?

We may contact you using your email address to inform you of new versions or for customer support; if you wish for us to not do that, please reply and let us know.

How is my information protected?

The Deskman websites and servers use industry standard protocols to protect all information obtained including SSL encryption (secure socket layers), and hardware firewalls.

Why and how does Deskman use cookies?

A cookie is a small piece of data sent to your web browser by a server and stored on your hard drive. Many websites leave a cookie on your machine in order to identify you should you return. Cookies can not read any data from your hard drive other than what is already included in the cookie. Deskman stores a cookie on your computer to keep track of your browser session.

How is Deskman protected from remote intrusions?

Deskman does not require an internet connection to work properly. The user is able to activate a login screen which asks for user and password in order to access Deskman. Passwords are not stored—hashes are, which means that the original passwords cannot be retrieved. Synchronization is disabled by default.

How is user's privacy affected?

Being a desktop security tool, Deskman provides the administrator with the ability to take desktop screenshots, log blocked applications and websites, and running processes. No other specific user information is collected.

What if I have a question or problem related to my privacy?

Please contact us at or


You must consent to this privacy policy to use Deskman.


End-user Software License Agreement

Notice to users: Carefully read the following legal agreement. Use of the software provided with this agreement (the "software") constitutes your acceptance of these terms. If you do not agree to the terms of this agreement, do not install and/or use this software. User's use of this software is conditioned upon compliance by user with the terms of this agreement.

1. License grant. Anfibia Software grants you a license to use one copy of this software on any one system for as many licenses as you purchase. "You" means the company, entity or individual whose funds are used to pay the license fee. "Use" means storing, loading, installing, executing or displaying the software. You may not modify the software or disable any licensing or control features of the software except as an intended part of the software's programming features. When you first obtain a copy of the software, you are granted an evaluation period of not more than 30 days, after which time you must pay for the software according to the terms discussed in the software's documentation, or you must remove the software from your system. This license is not transferable to any other system, or to another organization or individual. You are expected to use the software on your system and to thoroughly evaluate its usefulness and functionality before making a purchase. This "try before you buy" approach is the ultimate guarantee that the software will perform to your satisfaction; therefore, you understand and agree that there is no refund policy for any purchase of the software.

1.1 Software misuse. This software should never be installed, or used, without the PC administrator's consent. This software is designed for use when any required consents have been obtained. Anfibia Software declines all responsibility concerning any illicit usage.

2. Ownership. The software is owned and copyrighted by Anfibia Software. Your license confers no title or ownership in the software and should not be construed as a sale of any right in the software.

3. Copyright. The software is protected by European copyright laws and international treaty provisions. You acknowledge that no title to the intellectual property in the software is transferred to you. You further acknowledge that title and full ownership rights to the software will remain the exclusive property of Anfibia Software and you will not acquire any rights to the software except as expressly set forth in this license. You agree that any copies of the software will contain the same proprietary notices which appear on and in the software.

4. Reverse engineering. You agree that you will not attempt to reverse compile, modify, translate, or disassemble the software in whole or in part.

5. No other warranties. Anfibia Software does not warrant that the software is error free. Anfibia Software disclaims all other warranties with respect to the software, either express or implied, including but not limited to implied warranties of merchantability, fitness for a particular purpose and noninfringement of third party rights. Some jurisdictions do not allow the exclusion of implied warranties or limitations on how long an implied warranty may last, or the exclusion or limitation of incidental or consequential damages, so the above limitations or exclusions may not apply to you. This warranty gives you specific legal rights and you may also have other rights which vary from jurisdiction to jurisdiction.

6. Severability. In the event of invalidity of any provision of this license, the parties agree that such invalidity shall not affect the validity of the remaining portions of this license.

7. No liability for consequential damages. In no event shall Anfibia Software be liable to you for any consequential, special, incidental or indirect damages of any kind arising out of the delivery, performance or use of the software, even if Anfibia Software has been advised of the possibility of such damages. In no event will Anfibia Software's liability for any claim, whether in contract, tort or any other theory of liability, exceed the license fee paid by you, if any.

8. Governing law. This license will be governed by the European law. The united nations convention on contracts for the international sale of goods is specifically disclaimed.

9. Entire agreement. This is the entire agreement between you and Anfibia Software which supersedes any prior agreement or understanding, whether written or oral, relating to the subject matter of this license.

Deskman Copyright © 2000-2021 by Anfibia Software.