Administrators rely on things such as the user is not having the know-how to clone the OS image or to steal and then spoof the MAC. By implementing multiple such checks and keeping logs along with that, potentially adventurous troublemakers can be caught as the learn how to circumvent the system.