That’s the danger when privileged session recording is user config dependent. It looks safe on paper, but in reality, the wrong setting—or no setting at all—means the trail goes dark. Critical actions vanish from history. Compliance gaps open. Incident investigations stall.
Privileged accounts can change systems, move sensitive data, and access restricted environments. Recording these sessions is often the only way to verify what was done, by whom, and when. If the recording can be turned off—or fails when the user forgets to enable it—your security model rests on trust, not proof.
Making session recording user config dependent also creates blind spots attackers can exploit. If a malicious insider knows how to disable or bypass the setting, they can operate without leaving an audit trail. That’s the worst-case scenario in any environment with high privilege accounts.