Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Keep Yer Paws Off Your PC: Preventing End-Users from Installing Applications
ITBusinessnet ^ | 28 August 2006 | Esther Schindler

Posted on 08/29/2006 10:44:08 AM PDT by ShadowAce

Recently, I overheard an IT professional complaining about her users. Veronica's company has 300 employees, many of whom would have been called "paper pushers" in an earlier era. Some of those employees download software and install it on their computers, and it often causes havoc for the support staff. Veronica's specific rant was about screensavers (some of which carry a payload of spyware, making it a security issue as well as a support problem), but it could have been any sort of application.

Veronica had looked at a $10,000 hardware solution, but even that required 10 hours a week for system maintenance, to keep up with permissions and such. That didn't sound like a great option. But she didn't know what else to do.

Veronica isn't alone. Other IT administrators have to make choices like this every day. How much should you control? And how do you control it?

On the one hand, you may believe, a company's computers are its assets, and employees have no business changing the way the equipment works. On the other hand, the last thing an IT department wants to do is to prevent people from being productive on the job. Computers are tools that are supposed to enable those employees to get work done, which may occasionally include the use of a not-yet-blessed application.

And then there's the human element of corporate life, and the resentment of apparently arbitrary rules. They wonder: why is it more important to prevent people from customizing their computers than it is to personalize their cubicles?

After corresponding with a few hundred professional IT workers and managers, I found that the philosophical and management questions are harder to answer than the technological solutions. We'll get to suggested tech answers in a bit—for Windows, Linux, and Macintosh—but any IT administrator who wants to create a computing environment that's both fair and secure needs to first address the... well, let's call them the emotional and ethical issues.

Whom Do You Trust?

Long before an IT manager decides on a technology or administrative approach, she has to decide how much autonomy users ought to have. Or, specifically, how much autonomy each kind of user ought to have; university students are presumably less trustworthy and tech-savvy than are engineers, and salespeople appear to be at the bottom of the heap. (Dire experiments have been hatched by a bored sales person in a hotel room when he has nothing else to do.) Another issue is the business environment; you'd expect a bank to be more security- paranoid than a chain of dry cleaning stores.

As you might expect, opinions vary widely on this subject, depending on the respondent's own personal stance and the requirements of the business.

"[B]usiness needs to get done and people need software to accomplish that business. Once the 'us versus them' wall of 'can't have badge and gun' mentality is thrown up then you have lost the support of the business," says Michael Schiebel, the Lead Investigator at a Midwest Fortune 100 financial services company. "Our job is to help the business succeed efficiently and safely. So all software must be viewed in the light of business use; if it increases productivity then our job is to make it a standard."

Whose PC Is It Anyway?

One important consideration is that the computer is not the employee's PC. It isn't. Says Schiebel, "The PC is company equipment the same as pencils, paper, chairs, desks, buildings etc. The employee has no right to privacy while using that equipment and should treat it with the same respect they would give if they borrowed their friend's car. The level of respect the employee shows the PC and other company equipment speaks entire paragraphs about their morals and ethics. The business should use this information to decide what kinds of people it wants representing the company to its customers."

For many IT shops, the hand controlling permissible user installations has a light touch. They're happy to trust the users to do the right thing—and then the IT department copes with the consequences.

Most users really don't need more applications than the company provides, say some administrators. According to one, "Most people either don't install outside software or are satisfied with the normal low-profile stuff that doesn't attract a manager's attention, and the ones who install a lot of stuff (e.g., developers and QA staff) mostly know enough not to cause any problems."

However, users who do install applications may not be aware of software licensing issues. That's not merely a matter of conscious piracy. Some applications are free for personal use but require paid registration when used in a corporate environment. Will every user know the difference?

That's not a minor concern. Ian is a security specialist who works in the transportation industry; he was involved in his company's development of the global client and server loads for a decade. As Ian points out, "Companies forget that freeware is normally free for personal use—not for use inside a company—and they are required to have some sort of license (users are too aware of freeware products for home use and bring them in with out telling people). With the litigious nature of the world, companies should be covering their exposure by making it clear that only company-issued and -approved software should be used on company machines, and that the user is responsible if litigation starts."

Also, it's now common for employees to take the company laptop home in order to telecommute or to respond to work needs while on the road, far beyond the old-fashioned 40-hour work week. If your firm enables Internet access for only certain approved sites, then the employee—who's working on your behalf for the rest of the weekend—won't be able to do things like home banking, paying credit card bills or placing an Amazon order, which, in the past, they had to take time off work to do. Whatever solution you come up with, it will have to acknowledge and deal with these complications.

Will They Revolt?

A technically easy answer is for IT to control all computers in the organization, and allow for no exceptions. That sounds good on paper, but it rarely works in reality. First, it doesn't work, because some users are indeed exceptional (particularly technical staff such as programmers). Plus, employees can be resentful that the company doesn't trust them. And it's time consuming.

For one administrator, company restrictions definitely get in the way of getting the work done. In her company, every time you need to change the font or install something for work purposes, you have to phone the helpdesk to log a call which is passed to desktop support. They phone you back within 48 hours, spend time looking at the software required, and eventually install it on the machine if it passes their security checks. Says the admin, "This may sound like a secure way to do things, however the time it takes to get an application approved—or worse, rejected—you've probably missed the deadline for the work you needed to do. You've cost who-knows-how-many man hours running around getting all the I's dotted and T's crossed on the forms to make an exception, not to mention the testing and signatures required by desktops. Ultimately it can take weeks to have a new application installed."

This administrator got around the issue by stating she needed to use ping and traceroute among other things as part of her daily work supporting Linux servers, and at the very least needed to run cmd.exe. "I now have full administrator access to my PC, and have therefore negated the security in place. I have also managed to obtain domain administrator access in very much the same way." So, let's take a look at some of the ways that IT staff address the problem.


TOPICS: Business/Economy; Technical
KEYWORDS: apple; applications; downloading; it; macintosh; mcafee; microsoft; norton; security; support; symantec; technology
Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100101 next last
To: EricT.

You employ children at your office? ;~)


61 posted on 08/29/2006 12:42:24 PM PDT by HairOfTheDog (Head On. Apply directly to the forehead!)
[ Post Reply | Private Reply | To 59 | View Replies]

To: prion
For every stupid user story, there is a stupid administrator story.

Only a user would say something this stupid.

62 posted on 08/29/2006 12:43:08 PM PDT by RightFighter
[ Post Reply | Private Reply | To 3 | View Replies]

To: Bloody Sam Roberts
I'm kinda glad MY hole area doesn't send external emails either. Ouch.

Made me think of this :~)

63 posted on 08/29/2006 12:43:28 PM PDT by HairOfTheDog (Head On. Apply directly to the forehead!)
[ Post Reply | Private Reply | To 60 | View Replies]

To: Bloody Sam Roberts
err... this :~)


64 posted on 08/29/2006 12:43:49 PM PDT by HairOfTheDog (Head On. Apply directly to the forehead!)
[ Post Reply | Private Reply | To 60 | View Replies]

To: HairOfTheDog

It's the boss's daughter.


65 posted on 08/29/2006 12:48:06 PM PDT by EricT. (SpecOps needs to paint the NYT building with a targeting laser.)
[ Post Reply | Private Reply | To 61 | View Replies]

To: CodeToad

Although the Group Policy Editor may stop casual users from installing software, it will not stop an expert.

Windows Vista is harder, but it is still possible.


66 posted on 08/29/2006 12:50:07 PM PDT by Gideon7
[ Post Reply | Private Reply | To 38 | View Replies]

To: EricT.

Is she a child, though? A 'girl'? The comment was regarding whether we'd call a male coworker the "boy" in the next cubicle.

I think you can get away with that only if she's under about 18.


67 posted on 08/29/2006 12:51:09 PM PDT by HairOfTheDog (Head On. Apply directly to the forehead!)
[ Post Reply | Private Reply | To 65 | View Replies]

To: NerdDad

BTTT


68 posted on 08/29/2006 12:52:58 PM PDT by NerdDad (Aug 7, 1981, I married my soulmate, CDBEAR. 25 years and I'm still teenager-crazy in love with her.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

I thought this article sounded familiar.

The author asked for the collaborative help of Groklaw (most famous for covering the SCO/IBM case) in writing this article.


69 posted on 08/29/2006 12:53:27 PM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 1 | View Replies]

To: RightFighter
For every stupid user story, there is a stupid administrator story.

Only a user would say something this stupid.

Maybe, but only because users are perhaps more introspective... as for stupid decisions by IT administrators, I think many of us users could tell you stories :~) There's some on this thread.

70 posted on 08/29/2006 12:54:08 PM PDT by HairOfTheDog (Head On. Apply directly to the forehead!)
[ Post Reply | Private Reply | To 62 | View Replies]

To: Xenalyte

The post you replied to specifically stated the employee was on 'warez' sites, and you're responding like he was just checking on some baseball scores. If you've never heard of Microsoft or Adobe suing companies whose employees have downloaded unlicensed copies of their software onto company computers, you haven't been paying any attention to that sort of thing.


71 posted on 08/29/2006 12:55:27 PM PDT by Turbopilot (iumop ap!sdn w,I 'aw dlaH)
[ Post Reply | Private Reply | To 57 | View Replies]

To: ShadowAce

bump


72 posted on 08/29/2006 12:58:50 PM PDT by VOA
[ Post Reply | Private Reply | To 1 | View Replies]

To: HairOfTheDog
The main example linked on this page is of a help desk technician, NOT an IT administrator.
73 posted on 08/29/2006 1:04:51 PM PDT by RightFighter
[ Post Reply | Private Reply | To 70 | View Replies]

To: HairOfTheDog
Oooh rah. That smarts.    =;^)
74 posted on 08/29/2006 1:04:55 PM PDT by Bloody Sam Roberts (Winning shows strength. Winning without fighting shows brilliance.)
[ Post Reply | Private Reply | To 64 | View Replies]

To: RightFighter

There is a difference of about 50 IQ points and about $25k per year.


75 posted on 08/29/2006 1:06:59 PM PDT by RightFighter
[ Post Reply | Private Reply | To 73 | View Replies]

To: EricT.

Just out of curiosity, how do you install XP on a 266 mhz machine?


76 posted on 08/29/2006 1:09:54 PM PDT by js1138 (Well I say there are some things we don't want to know! Important things!")
[ Post Reply | Private Reply | To 59 | View Replies]

To: antiRepublicrat
The author asked for the collaborative help of Groklaw (most famous for covering the SCO/IBM case) in writing this article.

Yup :)

That's how I found it--PJ announced its availability.

77 posted on 08/29/2006 1:18:29 PM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 69 | View Replies]

To: js1138

Verrrrrrrrrrrrrry verrrrrrrrrrrrrry slowwwwwwwwwwwly.


78 posted on 08/29/2006 1:26:58 PM PDT by Still Thinking (Quis custodiet ipsos custodes?)
[ Post Reply | Private Reply | To 76 | View Replies]

To: Turbopilot

All true. However, the IT guy's response was "warez sites piss me off," not "warez sites can provide unlicensed copies of software and get us into trouble."

The latter I would have taken absolutely no issue with, as it's undeniably true.

The former is capricious and weird and not exactly helpful in terms of providing user guidance.


79 posted on 08/29/2006 1:27:17 PM PDT by Xenalyte (No movie shall triumph over "Snakes on a Plane.")
[ Post Reply | Private Reply | To 71 | View Replies]

To: Bloody Sam Roberts

Me too. I'm not even sure what doctor I'd see about that.


80 posted on 08/29/2006 1:27:59 PM PDT by Xenalyte (No movie shall triumph over "Snakes on a Plane.")
[ Post Reply | Private Reply | To 60 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100101 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson