I worked at a place like this and we had a software registry, where if you had installed something and it wasn't on the registry somebody would start sending you nasty emails. This kind of thing would happen all the time: maybe the Linux machines weren't in the scans, or anything that came with the OS was whitelisted.
But if you wanted to install it separately on a computer that didn't have it already, then you'd need to get it “approved.”
Honest question, how would you actually detect this? I mean I understand using the package manager install (and that's easy for them to control) but building from source and doing a local install (i.e. no `sudo make install`)? Everything is a file. How would you differentiate without massive amounts of false positives?
mmh0000|15 days ago
On Linux, this is commonly accomplished using Red Hat Satellite [1], although many other tools are also available to use instead.
Getting approval to install something like Vim can literally take months of effort and arguing.
[1] https://docs.redhat.com/en/documentation/red_hat_satellite/6...
sobjornstad|15 days ago
But if you wanted to install it separately on a computer that didn't have it already, then you'd need to get it “approved.”
godelski|14 days ago
johnisgood|15 days ago