1 guy used a pirated piece of software and added it to a server which was then used to make an image for more servers so that pirated software was then proliferated out onto about half the servers in a Fortune 500 company.
Does the installation process not include activation of product? I never worked in infrastructure side of IT so not sure how enterprise softwares work. Surely someone must have noticed it early on right?