Software Installation Policy

Author(s): Jennifer Perrier

1 Download

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.

Certain types of software can open significant security holes in the enterprise network. Controlling what software is installed on end-user devices is a critical step in closing these holes. Include in your organization’s Software Installation Policy:

•    What software is supported, what is not.
•    How to make software requests.
•    Procedures around software installation.
•    Details about periodic audits.

A critical weapon in your security management arsenal is to control what software can be installed on end-user devices. Apply this Software Installation Policy to identify standard software titles and clearly communicate what is prohibited.

Related Content