I know how Fiddler can decrypt HTTPS traffic by using Man-In-The-Middle approach. I understand the trusting Fiddler's root certificate comes with the risk and one should trust it responsibly by understanding its implications. However, it leaves you with a risk of an employee installing Fiddler and trusting its root certificate. When this is the case, how can IT Security department of an organization ensure security?
(I can enforce some policies in which Fiddler or any proxy interceptor will not be allowed to install. But what if such a thing is not possible, say in an IT company itself?)