Mechanisms exist to configure systems to generate an alert when the unauthorized installation of software is detected.
Does the organization configure systems to generate an alert when the unauthorized installation of software is detected?