Installation of unauthorized computer programs and software, including files downloaded ... or through automatic means such as via Puppet, Group Policy, SCCM, or some other automated mechanism.