Deployment

WinLock should be installed on each computer that you want to restrict and control. WinLock supports unattended (silent) setups. This provides an installation method that can be used from within a batch file:

 

Then, you should start WinLock and use command-line parameters to apply security profiles:

Converted from CHM to HTML with chm2web Standard 2.85 (unicode)