That is helpful and I think we are going to be okay, but I would like to be able make sure that the application credential is not used for software deployment. I don't think the credential has been used to "install as" but the intention is to make sure that it has not been used in the case that a command line has been used to access another server resource beyond our current knowledge. Otherwise I think we would be fine.
Is there any way to pull this information?
Thanks for your help!