This is a dedicated watch page for a single video.
You are an information system auditor of HDA Inc. You are auditing the detection of unauthorized software packages installed by employees. In this audit, what would be the most effective method to detect the installation of unauthorized software packages by employees?