It is essential to determine how unintended software is installed on user systems with only marginal adherence to policies.