What control is active, during the installation of legitimate software?
Audit log. All files written to the computer are audit logged. The system administrator or IT support can clearly see and understand what files (executable and non-executable) are downloaded to the computer to aid in troubleshooting and intrusion analysis if there are suspected security incidents.