When we inventory user devices and discover file evidence of cracked applications we then contact the user and request that they remove the file (which they do). However, when devices are inventoried again the same files are flagged over and over aga...