Skip to content

PlexTrac recognized in 2025 Gartner® Magic Quadrant for Exposure Assessment Platforms

Learn more >>

Authored by: PlexTrac Author

Posted on: October 22, 2019

Prevent Unauthorized Software from Contaminating Company Networks

End-users are one of the most common targets for the contamination of a Company network. These users can be easily manipulated if not well informed. Hackers use this to their advantage for personal gain of your information, or an overall sabotage of your company. This blog post clearly communicates the role of the user in preventing the introduction of unauthorized software. It also makes clear prohibitions against malicious “hacker-like” activities on Company networks for any purpose.

Users should adhere to the following directives in order to ensure a preventative strategy against malware and other unauthorized software:

1. Only Let Authorized Individuals Install Software

Only authorized staff or contractors, with express approval, are authorized to install or download any software. Any requests for changes to established baseline configurations of any information systems must be submitted to management or the designated representative. Staff will research potential business, security and financial impacts of the requested changes and disseminate this research to members of the Change Control Board.

2. Do Not Disable Endpoint Protection

Users must never disable or suspend endpoint protection software enabled on their machines. (e.g. Windows Defender or another anti-virus/endpoint protection).

3. End Users Must Not Introduce New Code

End Users must not intentionally write, generate, compile, copy, propagate, execute, or attempt to introduce any computer code designed to self-replicate, damage, or otherwise hinder the performance of any computer’s memory, file system, or software.

4. No Form of Network Monitoring is Allowed

Port scanning, security scanning or executing any form of network monitoring which will intercept data not intended for the employee’s host is expressly prohibited.

5. No Interfering with or Denying Service to Other Users

Interfering with or denying service to other user, or using any program/script/command, or sending messages of any kind, with the intent to interfere with, or disable, a user’s terminal session, via any means, locally or via the Internet/Intranet/Extranet is expressly prohibited. 

PlexTrac Author
PlexTrac Author At PlexTrac, we bring together insights from a diverse range of voices. Our blog features contributions from industry experts, ethical hackers, CTOs, influencers, and PlexTrac team members—all sharing valuable perspectives on cybersecurity, pentesting, and risk management.

Liked what you saw?

We’ve got more content for you

The Operational Gap Between Pentest Reports and Real Remediation

Most security teams invest in pentesting with the expectation that it will lead to real risk reduction. Skilled testers identify meaningful attack paths, validate impact, and provide remediation guidance that is technically sound. In most organizations, the quality of the pentest itself is not the problem. The friction starts after the report is delivered. Security...

Cheers to 2025: PlexTrac Year In Review

Let’s raise a glass to 2025! A year of major product innovation, industry recognition, and global community growth at PlexTrac. Here’s a look back at some of the highlights that made 2025 such a memorable year for PlexTrac.

How Automated Pentest Delivery Enables Unified Vulnerability Management

One of the most common challenges CISOs and security leaders report today is managing disconnected and siloed pentest and vulnerability data. Penetration tests are delivered as static reports while vulnerability scanners run continuously in separate tools. Remediation workflows vary based on where the findings originate.  These silos slow response, obscure risk, and extend exposure time....

Request a Demo

PlexTrac supercharges the efforts of cybersecurity teams of any size in the battle against attackers.

See the platform in action for your environment and use case.