Mechanisms exist to configure systems to generate an alert when the unauthorized installation of software is detected.