WinLock should be installed on each computer that you want to restrict and control. WinLock supports unattended (silent) setups. This provides an installation method that can be used from within a batch file:


Then, you should start WinLock and use command-line parameters to apply security profiles:

Converted from CHM to HTML with chm2web Standard 2.85 (unicode)