Mechanisms exist to allow only approved Internet browsers and email clients to run on systems.
Does the organization allow only approved Internet browsers and email clients to run on systems?