>Just to be 100% clear, I'm talking about network administrators or sysadmins (i.e. tech support). They want to have a minimum footprint, minimize resource use and potential vectors for security compromises.
For those environments, only administrators are allowed to access and I will enhance some procedures to help in that direction.