Certain types of software can open significant security holes in the enterprise network. Controlling what software is installed on end-user devices is a critical step in closing these holes. Include in your organization’s Software Installation Policy:
• What software is supported, what is not.
• How to make software requests.
• Procedures around software installation.
• Details about periodic audits.
A critical weapon in your security management arsenal is to control what software can be installed on end-user devices. Apply this Software Installation Policy to identify standard software titles and clearly communicate what is prohibited.
Software Installation Policy
1 Download
Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.