Documentation

Welcome to Deskman! In this guide you will find detailed information about how Deskman works, how to set it up and how to solve doubts or problems you may encounter.

Let's begin with the basics. Deskman is a Windows application that facilitates the protection and security administration of workstations on your local network, privately. Install Deskman on as many systems as needed and all of them will share the same restrictions in no time. Deskman is designed to work with and without a network connection; single, isolated workstations can also be protected.

Deskman is easy to install and use. There are no special requirements, no dependencies and no restrictive hardware limitations, except for a basic list of minimum requirements as seen below.

Check the troubleshooting and how to... sections, in case you need help, or contact us for assistance.

This documentation is valid for Deskman 12, available at anfibia.net.

The latest Deskman version is always available on our website. The installation program includes everything you need. Check the system and software requirements below.

Requirements

The requirements below list the minimal configuration. Any better hardware or newer software may be used; latest versions of Windows and supported web browsers are recommended. If you experience problems nonetheless, please do not hesitate to contact us.

Platform
  • Windows 10 64-bit
  • Windows 11 64-bit
Hardware
  • 1 gigahertz (GHz) or faster processor
  • At least 2 GB of memory
  • 100MB available disk space
Web Browser
  • Firefox
  • Chrome
  • Edge

Installation

To install Deskman, execute deskmansetup.exe and follow the directions that appear on screen. If an old version is found, it will be automatically upgraded. Old settings will be preserved when possible.

The setup program accepts optional command line parameters for fast deployment and unattended installation. Parameters can be used alone, or in conjunction.

/silent, /verysilent Instructs the setup program to be silent or very silent. When the setup program is silent the wizard and the background window are not displayed but the installation progress window is. When a setup is very silent the installation progress window is not displayed. Silent setups do not open Deskman on your browser when finished.
/dir="x:\dirname" Overrides the default installation directory, in Program Files. A fully qualified pathname must be specified.
/noicons Instructs the setup program to omit creating Deskman icons on the desktop and the Start menu.
/import Instructs the setup program to import a local backup file. The backup file must be named deskman.dat and must be located in the same directory. Note that presets can be exported/imported from the Restrictions page and data can be synced between multiple installations from the Sync page.

Upgrading

To upgrade Deskman, install the new version without uninstalling the old one. If an old version is found, it will be automatically upgraded, when possible. Note that only version 10, and later, can be automatically upgraded.

Make sure you are ready, before upgrading:

  • Export your data for backup.
  • Sync will stop working properly between installations using different versions.
  • Restrictions and settings should be preserved, but it depends on how old the previous version is.
  • Re-applying or re-syncing restrictions may be required.
  • A new license may be required. Contact us before upgrading in case of doubt.

Uninstallation

To uninstall Deskman, open Windows Settings, locate Installed apps, select Deskman and find the Uninstall option.

Before uninstallation, make sure all restrictions are completely disabled by clicking Undo, from the restrictions page.

Setup

After the installation is over, Deskman will be running on your system, ready to work. Deskman is web-based, which means you need to open it on a web browser. To open Deskman on the same computer where it's installed, point your browser to http://localhost:2288 or http://127.0.0.1:2288.

  • Deskman requires a web browser for configuration, but it is not in the cloud and internet access is optional.
  • Deskman must be manually installed on every system.

Get Started

A web browser is required to configure Deskman, but there are no special network requirements. Deskman can be used locally like any other application.

Deskman includes many restrictions: some of them override others in the same category, some may be useful for you, and some may not. Combine them to achieve your goals.

  • Open Deskman by visiting http://localhost:2288
  • Set up permissions! Protect Deskman with username and password, by visiting the settings page.
  • Explore available restrictions and decide which ones you need; select them and click Apply to activate them.
  • Remove restrictions from the restrictions page by clicking Undo.
  • Visit the dashboard to suspend restrictions, in case you want to pause restrictions temporarily.
  • In case of need, remember you can open Deskman from any system connected to the same network by using your local IP address or hostname, for example http://192.168.1.22:2288 or http://DESKTOP-STRFLD:2288

Evaluation

You are permitted to try this software on your system (for 30 days) without any cost or obligation. Payment is required if you find this software to be useful or if you wish to continue using this software beyond the evaluation (trial) period. This product is provided at no charge to the user for evaluation. The purpose of an evaluation version is to provide computer users with quality software on a try before you buy basis, however payment is still required for continued use of the product.

This method allows you to try out all the features in Deskman to confirm that they work to your satisfaction before purchasing a license of use.

The evaluation version is the same as the full version of the product: no nags, no disabled features. However, after the 30-day trial period expires, restrictions are automatically suspended until the copy is registered.

Using Deskman

A web browser is required to configure Deskman — recent versions of Firefox, Chrome, Edge and Safari are supported.

Dashboard

The dashboard provides you with a general view of the security in place, active users and system information. Visit the sync page for networking/syncing details.

Security

From time to time, you may need to remove restrictions temporarily in order to perform specific tasks on your system. Once suspended, restrictions are paused for a limited period of time, until manually resumed, or until the system is restarted.

  • Pause restrictions temporarily by clicking Suspend.
  • Unpause restrictions by clicking Resume.
  • Change the suspension time limit in Settings.
  • Applying restrictions, syncing restrictions or restarting Windows resume restrictions automatically.
Status

Deskman startup time and access type appear in this section. Access type indicates whether Deskman is being accessed locally or remotely.

Version

Deskman evaluation and version warnings appear in this section, particularly when a newer version is available to download.

System

This section includes information about your Windows version, hostname, IP addresses, CPU and memory load, physical drives, users, running processes and installed apps.

Desktop screenshots can be taken by clicking the Screenshot button next to a user, but the option must be first enabled in Settings.

Note that system and critical processes are not visible. By default, a reduced process list is shown. If you wish to show an expanded process list, check the appropriate option in Settings. When the expanded view is shown, main processes are marked with ยน to differentiate them from secondary processes. Finally, note that processes can be killed if the appropriate option is enabled in Settings.

The list of installed apps shows globally available apps only. User-specific apps are not listed.

The Actions button includes the following options:

  • Sign out: closes all active Windows user sessions.
  • Sleep: puts the system to sleep.
  • Restart: restarts the system.
  • Shut down: shuts down Windows and turns off the system.

Restrictions

Restrictions are separated into different sections: Desktop, System, Start Menu, Applications, Web and Folders. More details about each section below. Check the desired restrictions and click Apply to activate them. Click Undo to remove restrictions completely. If sync is enabled, restrictions are automatically synced with other installations.

Presets

Up to 10 presets can be stored, helping you keep multiple configurations for easy access.

  • Select your restrictions, click the Presets button and then click Save to save a new preset.
  • Click a preset name to load it and then click Apply to activate it.
  • Click next to a preset to remove it.
  • Update a preset by saving it with the same name.
  • Presets are automatically synced with other installations.

Presets can be imported/exported by clicking the appropriate button in the Presets menu.

Desktop Section
Hide the desktop Hides all desktop icons and disables the context menu.
Hide the Recycle Bin Hides the Recycle Bin desktop icon.
Protect desktop icons Protects desktop icons and files from tampering: they can be executed, but cannot be edited or deleted. Directories are not protected, only icons or files. If new files are added to the desktop, restrictions will need to be re-applied in order to protect them.
Disable drag & drop Disables the ability to drag and drop files, icons and windows.
Disable edge swiping using touch Disables the ability to swipe using touch from the edges of the screen.
Hide the taskbar Hides the taskbar and disables the Start menu.
Disable the taskbar The taskbar becomes read-only. All the taskbar icons and buttons are disabled.
Hide system tray Hides the right-side area of the taskbar, where status icons are shown, including date and time. Windows 10 only.
Hide date & time Hides the date & time section in the taskbar.
Lock the taskbar Disables the ability to resize and move the taskbar around. Windows 10 only.
Disable taskbar settings menu Disables the right-click settings menu in the taskbar.
Hide taskbar application buttons Hides buttons of running or pinned applications in the taskbar. Windows 10 only.
Disable notification center Disables access to the notification/action center and the quick settings panel.
Disable Copilot Disables the ability to use Windows Copilot. Windows 11 only.
Disable task view Disables the task view functionality.
Disable widgets Disables the widgets functionality. Windows 11 only.
Disable chat Disables the chat button. Windows 11 only.
Disable system tray Disables access to the right-side area of the taskbar: elements are visible but cannot be interacted with.
Lock PC when user is idle for X minutes Automatically locks the PC if there's no keyboard or mouse activity for X minutes.
Sign user out when idle for X minutes Automatically signs the current Windows user out if there's no keyboard or mouse activity for X minutes.
Ctrl + Alt + Del Disables the Ctrl + Alt + Del combination. The Alt key is also disabled. Important: If you are required to press Ctrl + Alt + Del before logging on to Windows, do not disable Ctrl + Alt + Del.
Ctrl + Shift + Esc Disables the Ctrl + Shift + Esc combination, used to open the Task Manager.
Windows logo key Disables the Windows logo key and all its combinations. Exception: The Windows logo key is required to activate the custom Start menu. If the custom Start menu is enabled, all Windows logo key combinations are disabled, except for Windows logo key + L.
Menu key Disables the Menu/Application key.
Alt + F4 Disables the Alt + F4 combination.
Alt + Tab Disables the Alt + Tab combination.
Esc Disables the Esc key.
Delete Disables the Delete key, also known as the forward delete key.
Backspace Disables the Backspace key.
Tab Disables the Tab key.
Ctrl Disables commonly used hotkeys that require the Ctrl key, like Ctrl + S, Ctrl + F4, Ctr + W, etc. The Ctrl key itself is not disabled for security reasons.
Alt Disables the Alt key.
Alt Gr Disables the Alt Gr key.
Copy & Paste Disables the Ctrl + C, Ctrl + V and Ctrl + X combinations.
Function keys Disables the respective function key.
Media Disables many associated function key actions, such as play, stop, open browser, set volume or launch mail program.
Middle Button Disables the middle mouse button.
Right Button Disables the right mouse button.
System Section
Disable Control Panel and Settings Disables access to Windows Settings and the Control Panel.
Pause Windows Update Windows Update is paused for years, effectively rendering it disabled until updates are manually resumed or until this restriction is disabled. Note that keeping Windows Update paused for months is not recommended, in general.
Block administrative and command line tools Blocks access to common administrative tools, including: Windows Task Manager, Regedit, Windows Terminal, Command Prompt, PowerShell, Process Explorer and Microsoft Management Console.
Enable safe task manager The Windows Task Manager is temporarily replaced with a very limited task manager, where users can only view running applications and activate some handy power actions, like sign out, restart and shut down.
Restrict access to settings on web browsers Disables access to multiple configuration sections on Firefox, Chrome and Edge; including settings, extensions, DevTools, incognito mode and file:/// directory access. In some cases, web browsers may need to be restarted to appreciate changes.
Block option menus on web browsers Restricts access to option menus on Firefox, Chrome and Edge.
Disable USB drives Disables the detection of USB drives. Windows ignores inserted USB drives.
Disable writing to USB drives Disables the ability to write to USB drives.
Disable Autoplay Disables the Autoplay menu that appears when a new external drive is detected.
Disable shutdown options Disables power actions to shut down the computer on the Start menu and lock screen.
Disable fast user switching Disables the ability to switch to a different user without having to sign out first.
Block File Explorer Blocks access to the File Explorer and similars, such as the Control Panel and other Explorer-based system configuration windows.
Disable context menu on File Explorer and desktop Disables context menus on File Explorer, the desktop and open/save dialog boxes.
Disable folder options on File Explorer Disables access to folder options on File Explorer.
Disable top menus and ribbon on File Explorer Disables top menus, ribbon, bars and tabs on File Explorer and open/save dialog boxes.
Disable navigation pane on File Explorer Disables the navigation pane on File Explorer and open/save dialog boxes.
Disable Quick access on File Explorer Disables the Quick access folder and hides recent files on File Explorer and open/save dialog boxes. Windows 10 only.
Remove special folders from This PC Removes special folders (3D Objects, Desktop, Documents, Downloads, Music, Pictures and Videos) from This PC on File Explorer and open/save dialog boxes. Windows 10 only.
Hide This PC on File Explorer Hides the This PC folder on File Explorer and open/save dialog boxes.
Hide Network on File Explorer Hides the Network folder on File Explorer and open/save dialog boxes.
File Explorer Drives Enter drive letters, comma-separated, to disable their respective drives on File Explorer and open/save dialog boxes. Click on All Drives to disable access to all drives.
Start Menu Section
Disable the Start menu Disables the Start menu button and the Windows logo key, while keeping the Start menu intact but hidden. The Ctrl + Esc combination is also disabled.
Block ability to change apps, shut down or sign out Protects the Start menu from being changed by the user and disables the Power and user menus.
Disable search and run Disables the ability to search and run local files from the Start menu and the taskbar.
Disable access to All apps Disables access to the application list in the Start menu.
Custom Start Menu Usage
  • Click on Add Command or New to add a command to the custom Start menu.
  • Click on Enabled to activate the custom Start menu.
  • Select an entry and click Remove to remove it from the list.
  • Click on Apply when ready to activate changes.
  • If the custom Start menu is active, the Windows logo key can only be used to open the custom Start menu.
  • Custom Start menu commands require the full path to show the proper application icon.
Applications Section

This section is a software filter, useful to stop unwanted applications. Start by adding permitted applications, or folders, to the list. Applications that do not appear in the list, or that are not permitted, will be blocked.

Usage
  • Click on Add Application or New to add an application to the filter.
  • Click on Enabled to activate the filter.
  • Select an entry and click on Remove to remove it from the filter.
  • Click on Apply when ready to activate changes.
  • The following entry types are accepted: executable, folder, keyword
Web Section

This section is a web filter. Once enabled, access to all domains and IP addresses is forbidden, except for the ones specifically allowed.

Usage
  • Click on Add Domains or New to add an entry to the filter.
  • Click on Enabled to activate the filter.
  • Select an entry and click on Remove to remove it from the filter.
  • Click on Apply when ready to activate changes.
  • The following entry types are accepted: domain, IP address
  • Wildcards are valid, for example: *.domain.com, domain.*, *word*, 192.168.*.*
Folders Section

This section is a folder filter. Once enabled, all folders are blocked on File Explorer, except for the ones specifically allowed, with exceptions to allow home access (see below).

Usage
  • Click on Add Folders or New to add an entry to the filter.
  • Click on Enabled to activate the filter.
  • Select an entry and click Remove to remove it from the filter.
  • Click on Apply when ready to activate changes.
  • The following entry types are accepted: folder name, path
Home Access

Access to the Home folder is allowed, in order to allow basic access to File Explorer. If there is no interest in allowing access to the Home folder, the following entry may be added to the folder list: >home

Sync

Every installation is capable of syncing data with other installations on the network. This allows you to configure many workstations easily, from a single point.

In order to find other installations, sync must be enabled on them, and they must be able to communicate between each other. Usually, that means being in the same network and not being blocked by antivirus or firewall. Check the troubleshooting guide for help.

Syncing Group

Groups are useful to separate installations, in case you need to maintain different configurations, or to shield installations from unwanted sync operations. By default, installations belong to the DEFAULT group. Installations from other groups are ignored.

  • To change your group click on the Change group link at the top and enter a group name.
  • To return to the DEFAULT group, leave the group name empty.
Syncing Status

At the top, you can view the syncing status section.

Ready Synchronization finished successfully, all installations are synced.
In progress Synchronization in progress. Some installations could be out of sync: systems may be shut down, or inaccessible. In any case, Deskman will keep trying. It may take several minutes to synchronize all available installations.
Syncing Limit

At the top right side, you can see the syncing limit section, showing the number of found installations versus the maximum number of installations. The latter being based on the number of copies allowed by your license.

Installations
Host Name of the remote installation. Syncing bridges are marked with (*).
Address IP Address, or domain, of the remote installation.
Version Deskman version of the remote installation.
Status Syncing status of the remote installation: ready, syncing or out of sync.
Contacted Date and time of last contact.
Actions

The Actions menu includes options to manipulate the installation list. Select one, or more installations from the list and then select one of the options below.

Suspend Suspends restrictions on selected installations.
Sleep Puts Windows to sleep on selected installations.
Restart Restarts Windows on selected installations.
Shut down Shuts down Windows on selected installation.
Remove Removes selected installations from the list.
Syncing Bridge

If you have multiple networks, not connected between them, you can use a Deskman installation as a bridge. Thus, you'll be able to sync data with installations on different networks.

To set up a bridge, go to Settings and enter the address of your remote installation on the Syncing Bridge section.

Single Sign-on

In order to seamlessly and securely access installations from the syncing list without having to enter username and password each time go to Settings and enable the Single sign-on option.

License Syncing

Licenses are synced with other installations on the network, as long as they are not registered and belong to the same group. The maximum number of synchronizable installations is based on your license. Thus, a multi-copy license is required to sync.

Disabling Syncing

Syncing can be disabled by clicking the Disable Sync link, in the middle of the screen.

Settings

Visit the settings page to configure Deskman and manage user permissions. Click Save when finished. If sync is enabled, settings are automatically synced with other installations.

Main Settings
Options
Exclude Windows administrators Check this option to exclude Windows administrators from restrictions, with caveats. Suspending restrictions may still be required for full, unrestricted, access. Note that this feature only supports local administrator accounts. Remote, domain based or AD groups are not supported.
Single sign-on Check this option to allow single sign-on connections from the sync page. Thus, users are not required to log in when moving from one installation to another on the sync page. Sessions are still authenticated, but users do not have to enter username and password every time.
Light theme Check this option to apply a light theme to the interface.
Hide user notifications Check this option to hide user notifications that appear on screen. Note that notifications only pop up if they are activated on Windows Settings, or permitted by the user, regardless of this option.
Processes can be killed on dashboard Check this option to be able to terminate specific processes from the dashboard.
Screenshots can be taken on dashboard Check this option to be able to take desktop screenshots from the dashboard.
Show expanded process list on dashboard Check this option to show a detailed process list, including redundant/secondary processes, on the dashboard.
Suspension
Suspension limit Enter the maximum suspension time, in minutes. When the time expires restrictions are resumed automatically.
Hotkey Select one of the available hotkeys. Pressing the hotkey will suspend restrictions. Pressing the hotkey during suspension will resume restrictions, after being suspended 1 minute, at least.
Hotkey password Enter a password to be required in order to suspend restrictions, when pressing the hotkey.
Data
Save weekly backup Enter a folder where Deskman can save a weekly data backup: logs and configuration files. Use this option to preserve old logs, which are automatically deleted after 30 days.
Export logs and settings Click on Export to download a zip file containing stored logs and configuration files, including restrictions, settings and license. Important: do not share your data file and use with caution to avoid licensing issues.
Miscellaneous
Session timeout Enter the session timeout, in minutes. By default, Deskman's sessions expire after 30 minutes of inactivity. Inactive users are automatically logged out after the limit is reached and need to enter their credentials again.
Syncing bridge Enter a syncing bridge address, optionally, to make Deskman sync with a remote installation. The syncing bridge is useful if you have multiple installations, on different networks, allowing you to sync everything through a single address (bridge). Enter the address of your remote installation and make sure it's accessible externally. If necessary, enter a port (address:port), otherwise port 2288 will be used. Multiple bridges can be added, comma-separated.
Permissions

From this section, accessible by clicking on the Permissions tab at the top of the settings page, you can create and modify user accounts to protect access to Deskman or grant access to specific areas to different users. Up to twenty user accounts can be enabled, besides the admin account, which is required.

Once the admin account has been created, you can create other user accounts.

Users Accounts
  • Click on New to create a new user account.
  • Select which areas of Deskman are permitted to the user.
  • Click on Save to finish.
  • User accounts can be modified by clicking on the list.
  • Users can be deleted by selecting them and clicking on Remove.
  • The maximum number of users is 20.
User Profile

Users can change their own password, or add two-factor authentication, from their profile, accessible by clicking the blue user icon at the top right corner of each page.

User Exclusions

Users can be excluded from restrictions by checking the appropriate option on the User Account window, but suspending restrictions may still be required for full, unrestricted, access. Note that the username must coincide with the Windows account name for this feature to work.

License

Visit the license page to register your copy. Follow the instructions included in your license email. Licenses include a 30-day support period, or more, if a maintenance plan is purchased. Once registered, check your license details in the license page.

  • Track total registered copies from the sync page: synced installations share the same license.
  • Online validation is recommended, but optional. Pending validation notifications can be ignored if the installation is not connected to the internet.
  • Upon maintenance expiration, licenses keep working but support entitlement ends: contact us to purchase maintenance.

For more information, or assistance, please check the FAQ or contact us.

Logs

Visit the Logs page to view the activity log, with information about product usage, user actions, applied restrictions, blocked applications, filtered websites, warnings and plenty of other useful details.

Use the Search box to find specific entries. Next to it, the Export button includes options to export logs as CSV.

  • Logs are automatically deleted after 30 days, but can be stored externally by checking Save weekly backup in Settings.
  • Logs can be manually exported from Settings.
  • By default, the log table has a limit of 20 lines per page, which can be expanded from the Options section at the top.
  • Constantly repeated log events are ignored for 1 minute to avoid cluttering the log. For example, if Deskman blocks an application repeatedly, you will only find it mentioned once per minute on the log.

How to...

Activate restrictions

Open the restrictions page, select the restrictions you need and click on Apply. Most restrictions are activated instantly, but some may require you to sign out of Windows.

Remove restrictions

Open the restrictions page, and click on Undo. Most restrictions are removed instantly, but some may require you to sign out of Windows.

Create users

Go to Settings and click on the Permissions tab, next to the Main tab, at the top.

Change the password

Users can change their own password, or add two-factor authentication, from their profile, accessible by clicking on the blue user icon at the top right corner of each page.

Export restrictions

Go to the restrictions page, click on the Presets button, save your restrictions to a preset and then click on Export.

Import restrictions

Go to the restrictions page, click on the Presets button and click on Import. Select the file to be imported. Load a preset by clicking on it and then click on Apply to activate restrictions.

Sync

Sync must be manually enabled from the sync page. Once sync is enabled on all installations, they will appear on the sync page, after a few minutes. From this point, when restrictions are applied, or settings change, on any installation, the others will receive the same restrictions and settings.

Pause restrictions

If you need to pause restrictions temporarily, you can suspend them:

  • To suspend restrictions on one installation, go to its dashboard and click on Suspend.
  • To suspend restrictions on multiple installations, go to a sync page, select some installations, click on Actions and then click on Suspend.
Block access to folders

Use the folder filter. Go to the restrictions page and click on the Folders tab. Then click on Add folders or New. Check the Configuration Assistance section. Add permitted folders, or paths, to the list. Access to folders not on the list will be blocked on File Explorer and on applications using standard open/save dialogs.

Allow easy access to specific folders securely

If you need to provide access to specific folders while disallowing access to other folders, follow these steps:

  • Open the desired folder on File Explorer
  • Drag and drop the folder to the desktop while pressing the Alt key to create a link in desktop
  • Open Deskman, go to Restrictions and check Protect desktop icons
  • Then click on the System tab and check Disable top menus and ribbon on File Explorer and Disable navigation pane on File Explorer
  • Click on Apply
Block software installation

Use the software filter. Go to the restrictions page and click on the Applications tab. Then click on Add application or New. Check the Configuration Assistance section. Add the items program files and users to the list to allow already installed programs and nothing else. New software installations will be blocked.

Blacklist applications

By default, the software filter permits access to your executables and folders — it's a whitelist. In case you need to block specific programs, select an entry from the list and toggle the Permitted option off.

Disable UNC paths

If disabling access to drives is not enough, and you also need to disable UNC path access to folders and drives, use this restriction: Disable search and run on the Start Menu section.

Export logs

To export the log, go to the Settings page and click on Export, in the Data section. Alternatively, logs can also be exported to CSV from the Export button in the Logs page.

Allow guest access

If you need to allow someone to use Deskman, but with limited access: go to Settings, then go to Permissions, add a new user account and select user permissions.

Exclude users

Administrators can be excluded by selecting the Exclude Windows administrators option in Settings. Specific users can also be excluded by adding the Windows user account to Permissions, located in Settings, and then by checking the option Excluded from restrictions. Note that suspending restrictions may still be required for full, unrestricted, access.

Sync on different networks

If you have multiple networks, not connected between them, use one Deskman installation as a bridge. Go to Settings and enter the external address and port of your installation in the Syncing Bridge section. Firewalls need to be properly configured.

Create a backup file

Go to Settings and click on Export, in the Data section. Note that your license is also included in the backup file. Do not share it and use it with caution to avoid license issues.

Restore a backup file

Check the installation section for details on how to import your backup file.

Remove or swap your license

If you want to move your license to another system: uninstall Deskman to recover your license. Once Deskman has been uninstalled you can register a new copy on a different computer. Just make sure your total number of registered copies is not higher than the total allowed by your license to avoid issues.

Check program health externally

Deskman includes an endpoint for health monitoring, returning current status, localhost only: http://localhost:2288/status

Troubleshooting

Forgot your password?

Submit a support ticket providing your license number.

Unable to open Deskman

Deskman should be accessible locally at http://localhost:2288 and anywhere on your network at http://ip_address:2288, where ip_address is the local IP address of the computer where Deskman is installed.

If Deskman is not responding on localhost, make sure:

  • Deskman is properly installed.
  • Deskman is running.
  • Antivirus/firewalls are not blocking Deskman.
Firewall and antivirus

Make sure your firewall and antivirus software do not block Deskman, or put deskman.exe or deskmansvc.exe in sandbox/quarantine mode. In addition, the firewall must allow deskmansvc.exe to establish IN/OUT connections.

Restrictions are not applied

Check the following:

  • Make sure you have applied restrictions.
  • Check if restrictions are suspended in the dashboard.
  • Some restrictions may require users to sign out.
  • If you are excluded, as administrator or user, restrictions do not apply to you. The dashboard will tell you if your user is excluded.
  • Check if your antivirus or firewall are blocking Deskman.
Users are not excluded

If a user is excluded (see Settings and Permissions), Deskman does not apply restrictions at log on. However, the following restrictions remain applied unless restrictions are suspended:

  • Hide the desktop
  • Hide the Recycle Bin
  • Disable edge swiping using touch
  • Disable access to All apps
  • Lock the taskbar
  • Disable taskbar settings menu
  • Ctrl + Alt + Del
  • Windows logo key
  • Alt Gr
  • Disable Control Panel and Settings
  • Pause Windows Update
  • Disable USB drives
  • Disable writing to USB drives
  • Disable Autoplay
  • Disable shutdown options
  • Disable fast user switching
  • Disable context menu on File Explorer and desktop
  • Disable folder options on File Explorer
  • Disable Quick access on File Explorer
  • Remove special folders from This PC
  • Hide This PC on File Explorer
  • Hide Network on File Explorer
  • File Explorer Drives
Syncing issues

Syncing takes time at the beginning because Deskman needs to find remote installations and receive a proper response. Once they are found, synchronization events are not immediate: a few minutes should suffice, but it depends on availability, speed and network configuration.

Check the following, in case issues persist:

  • Sync needs to be enabled on every installation.
  • License must be synced, if available.
  • Installing more copies than permitted by your license will create syncing and licensing issues.
  • Deskman major version must be identical; Deskman 10 cannot sync with Deskman 12.
  • Firewall exceptions need to be in place.
  • System date and time must be correct — synchronized by an Internet time server, ideally.
  • Network proxies may stop syncing operations.
  • Installations from a different syncing group are ignored.
Web filter issues

The web filter is proxy-based, meaning web browsers request Deskman for permission to access websites.

Check the following:

  • Changes are instant but some applications may need you to sign out to notice changes.
  • If a proxy is in place, it will be disabled if the web filter is enabled.
  • Make sure there are no proxy extensions enabled on your browser.
  • The proxy server should be set to localhost:2280 to work.
About suspension
  • Restrictions remain suspended until the time limit expires, until manually resumed or until the system is restarted.
  • Change the suspension time limit in Settings.
  • Restrictions are suspended on a specific installation, or on multiple installations if activated from the sync page.
A browser error message is displayed when blocking websites

Deskman does not tamper with HTTP/HTTPS, thus making impossible to insert messages into the browser. The browser reports a "unable to connect" error, which is the correct behavior.

A website is not fully displayed even though it's been allowed

Websites tend to contact multiple domains while loading. Check the log for blocked domains. Remember you can use IP addresses, keywords and wildcards when adding domains, like *google*, *.google.* or 192.89.*.*

Integrity

Deskman automatically monitors its own components to detect tampering. If your installation fails the integrity check, some of Deskman's critical files may have been modified or corrupted. Deskman should be downloaded again from our website, reinstalled and the security level increased. If there are no integrity warnings on your dashboard or log, everything should be fine.

Uninstalling Deskman

Before uninstallation, open the restrictions page and click Undo to remove restrictions.

Privacy

This privacy statement refers to the product Deskman. Please, check our online privacy statement for complementary information.

What information does Anfibia Software collect regarding Deskman?

Deskman is not an online service. Deskman is self-hosted software. The software is installed on your computer, and only you have access to it. As such, we do not remotely collect data of any kind: emails, passwords, credit card numbers, phone numbers, usernames, configurations, logs, IP addresses, etc.

When you purchase a Deskman license, we store name, organization, address, and email, as provided by you, the buyer -directly- or through our e-commerce partners Stripe and Lemon Squeezy. Check their Privacy Policy here and here, respectively.

When you register your copy, we store (and validate) your registration key in our server.

What is done with the information?

We may contact you using your email address to inform you of new versions or for customer support; if you wish for us to not do that, please reply and let us know.

How is my information protected?

The Deskman websites and servers use industry standard protocols to protect all information obtained including SSL encryption (secure socket layers), and hardware firewalls.

Why and how does Deskman use cookies?

A cookie is a small piece of data sent to your web browser by a server and stored on your hard drive. Many websites leave a cookie on your machine in order to identify you should you return. Cookies can not read any data from your hard drive other than what is already included in the cookie. Deskman stores a cookie on your computer to keep track of your browser session.

How is Deskman protected from remote intrusions?

Deskman does not require an internet connection to work properly. The user is able to activate a login screen which asks for user and password in order to access Deskman. Passwords are not stored—hashes are, which means that the original passwords cannot be retrieved. Furthermore, the user is able to activate two-factor authentication and network synchronization is disabled by default.

How is user's privacy affected?

Being a desktop security tool, Deskman provides the administrator with the ability to take desktop screenshots, log user account names, user session times, blocked applications and websites, and running processes. No other specific user information is collected.

What if I have a question or problem related to my privacy?

Please contact us at anfibia.net or privacy@anfibia.net.

Consent

You must consent to this privacy policy to use Deskman.

EULA

End-user Software License Agreement

Notice to users: Carefully read the following legal agreement. Use of the software provided with this agreement (the "software") constitutes your acceptance of these terms. If you do not agree to the terms of this agreement, do not install and/or use this software. User's use of this software is conditioned upon compliance by user with the terms of this agreement.

1. License grant. Anfibia Software grants you a license to use one copy of this software on any one system for as many licenses as you purchase. "You" means the company, entity or individual whose funds are used to pay the license fee. "Use" means storing, loading, installing, executing or displaying the software. You may not modify the software or disable any licensing or control features of the software except as an intended part of the software's programming features. When you first obtain a copy of the software, you are granted an evaluation period of not more than 30 days, after which time you must pay for the software according to the terms discussed in the software's documentation, or you must remove the software from your system. This license is not transferable to any other system, or to another organization or individual. You are expected to use the software on your system and to thoroughly evaluate its usefulness and functionality before making a purchase. This "try before you buy" approach is the ultimate guarantee that the software will perform to your satisfaction; therefore, you understand and agree that there is no refund policy for any purchase of the software.

1.1 Software misuse. This software should never be installed, or used, without the PC administrator's consent. This software is designed for use when any required consents have been obtained. Anfibia Software declines all responsibility concerning any illicit usage.

2. Ownership. The software is owned and copyrighted by Anfibia Software. Your license confers no title or ownership in the software and should not be construed as a sale of any right in the software.

3. Copyright. The software is protected by European copyright laws and international treaty provisions. You acknowledge that no title to the intellectual property in the software is transferred to you. You further acknowledge that title and full ownership rights to the software will remain the exclusive property of Anfibia Software and you will not acquire any rights to the software except as expressly set forth in this license. You agree that any copies of the software will contain the same proprietary notices which appear on and in the software.

4. Reverse engineering. You agree that you will not attempt to reverse compile, modify, translate, or disassemble the software in whole or in part.

5. No other warranties. Anfibia Software does not warrant that the software is error free. Anfibia Software disclaims all other warranties with respect to the software, either express or implied, including but not limited to implied warranties of merchantability, fitness for a particular purpose and noninfringement of third party rights. Some jurisdictions do not allow the exclusion of implied warranties or limitations on how long an implied warranty may last, or the exclusion or limitation of incidental or consequential damages, so the above limitations or exclusions may not apply to you. This warranty gives you specific legal rights and you may also have other rights which vary from jurisdiction to jurisdiction.

6. Severability. In the event of invalidity of any provision of this license, the parties agree that such invalidity shall not affect the validity of the remaining portions of this license.

7. No liability for consequential damages. In no event shall Anfibia Software be liable to you for any consequential, special, incidental or indirect damages of any kind arising out of the delivery, performance or use of the software, even if Anfibia Software has been advised of the possibility of such damages. In no event will Anfibia Software's liability for any claim, whether in contract, tort or any other theory of liability, exceed the license fee paid by you, if any.

8. Governing law. This license will be governed by the European law. The united nations convention on contracts for the international sale of goods is specifically disclaimed.

9. Entire agreement. This is the entire agreement between you and Anfibia Software which supersedes any prior agreement or understanding, whether written or oral, relating to the subject matter of this license.

Deskman Copyright © 2000-2024 by Anfibia Software.