This may be the case for certain monitoring or security tools. (Users who want this functionality will install such programs after receiving the explicit warnings and will have given informed consent.) Some risks, however, such as installing by security exploit may warrant automatic detection, no matter what consent is given.