Installation of unauthorized computer programs and software, including files downloaded ... or through automatic means such as via Puppet, Group Policy, SCCM, or some other automated mechanism.
Some results have been hidden because they may be inaccessible to you