Purchase of the eAuditor system

Check out the process of purchasing an eAuditor system.

The basic configuration of the system meets all the needs of IT departments

Monitoring of IT infrastructure

It identifies local networks and builds network maps (including wide area networks) and provides detailed information on all network devices. Supports SNMP v1, v2c, v3. Read more.
Allows monitoring of computers used by employees. Monitoring of running processes, applications, websites. In addition, it allows you to check the log-in time, time-based usage of individual packages and applications. Real-time analysis of errors occurring on computers with eAgent. Read more.
It presents data on user activity (processes started, USB sticks plugged in, web pages visited, printouts, log-in time/productivity, assigned hand-over reports) on computers within the organisation’s infrastructure using, among other things, artificial intelligence. Read more.
This is a process that is conducted via the network scanner in the eAuditor system. Its operation involves searching a computer network to find all connected devices that have an IP address that falls within the address range set during the scanner’s configuration. Read more.
Monitor the printers connected to the company network. Reading printer details (toner levels, margins, notifications, ports). Possibility to go to the printer management panel. Read more.
Includes process, service and performance monitoring of computers and servers (supports Hyper-V and VMware). Returns information on process load, hard drives and network traffic. Read more.
Analysis of the URLs used by employees. Automatic category assignment (safe/unsafe). Ability to define categories of productive pages. Blocking dangerous sites. It uses artificial intelligence (BTC AI) mechanisms to do this. Read more.
It monitors and analyses all processes and applications run by users in real time using artificial intelligence (BTC AI). Read more.

IT infrastructure management

Automatic inventory of operating systems, installed software, portable software. Support for models: Enterprise, Licensed concurrent, Licensed Name, Licensed per Processor, Licensed per Seat, Licensed per Server, OEM, OEM Downgrade, Open, Select, MOLP Open Value, CAL, SAAS, Trial, Shareware. Read more.
Remote connection to a computer on the local network to a user session. Multi VNC – simultaneous access to multiple computers. Full support for Intel VPRO/AMT technology for BIOS configuration, booting from shutdown and reinstalling the operating system. Read more.
It allows remote control of devices and command execution using built-in CMD and PowerShell commands. Read more.
Enables the IT administrator to communicate with users, including individual, group conversations. Read more.
Remote sending of alerts and one-off or recurring messages to users/computers. Messages follow the user. Scheduling, predefined messages, delivery statuses. Read more.
Automatic update notifications in the administration console sent to an e-mail address. Supported channels: e-mail, SMS, administrator desktop notifications, user notifications. Read more.
With eAuditor it is possible to remotely store computer configuration information, run special Windows functions and services that do not require interaction with the computer user and processes running in the background. Read more.
Reporting in eAuditor allows you to get comprehensive information on each tab in the console. More than 200 predefined reports. Reports can be generated at will for all views. Read more.
Personalised access for each user from the organisation to read computer information. In one place, it is possible to read messages from network administrators about planned service interruptions, check login times, productivity or assigned equipment. Read more.

IT infrastructure security

Website classifier / process and application classifier – the classifiers implemented return information on the category, security and productivity of websites and running processes / applications. Read more.
It allows you to block the connection of unauthorised USB drives, which can be used as a tool to deliberately or accidentally leak data from an organisation. Read more.
Definition of software schemes by permitted, prohibited, recommended. Allows automatic installation of software recommended for a specific user group and automatic uninstallation of prohibited applications. Read more.
An additional layer of authentication referred to as ePass. In addition to the standard login (entering an access element such as a login and password), it is possible to require authentication by means of physical hardware security (USB token). Read more.
A new generation of graphical data presentation in the form of more than 100 interactive widgets. Each widget supports the drill-down method and is fully configurable. Read more.
New generation of graphical presentation of data in the form of more than 30 interactive widgets. Support for the drill-down method. Identifies IT infrastructure elements in the area of IT security. Read more.
Personalized view for a specific system user (dashboards, active shortcuts). Read more.

IT infrastructure inventory

Common CMDB database for the entire system (infrastructure, processes, documents, services, relationships). Read more.
It allows you to automatically inventory computers on and off the local network (behind NAT) and servers in your organisation. Read more.
Enables the inventory process for all available operating systems used in an organization. Read more.
It allows you to create an inventory of all the applications used on the devices in your organisation, as well as the packages installed. Read more.
It allows you to take an inventory of all files on the disks of computers where eAgent is installed. Read more.
The eAuditor system allows an inventory of local and network printers to be carried out. Information about printers can come from external systems. Read more.
It allows you to take inventory of many types of equipment, such as computers, printers, monitors, USB devices, cameras, multimedia devices, etc. Read more.
Allows you to keep records of consumables. It has support for an unlimited number of warehouses in any location. Maintain quantity and value records using the FIFO method for IT accessories and infrastructure. Read more.

Get even more control over your IT infrastructure by adding functionality to the base configuration

Read permissions to local and shared resources (local and network), made possible by the implemented API. Monitoring 13 types of ACL (Access Control Lists) permissions. Read more.
Remote mass encryption / decryption of disk partitions of external and internal computers in the local network as well as outside the network, current status of the process. Identification of encrypted partitions, storage of recovery keys. Support for encryption methods: AES 128 or 256-bit. Read more.
Ensure a high level of security for the state of the server room. Ability to assign devices to specific locations and monitor temperature, humidity, water leakage, electric current, electric voltage, light intensity, electric power, gas leakage, contact (door opening), motion, smoke, air flow. Read more.
Monitor user behavior and user groups. Scope of monitoring: logging, working time, employee activity, running processes and applications, printouts, web pages, network transfer, used USB external devices. Productivity calculation. Read more.
Real-time monitoring of server availability and Web site visibility on the Internet. The ability to intelligently analyze pages by searching for specific phrases defined by the administrator. Read more.
Personalized access for each user from the organization to receive key information in real time. In one place, it is possible to easily and quickly report problems to technical support, read messages from network administrators about planned service interruptions, participate in assigned training courses from the Learning Management System or read one’s own productivity from WorkTime Manager. Read more.
Detect, inventory and monitor MS Hyper-V and Vmware virtualization servers via built-in APIs. Read more.
Automatic remote installation/uninstallation of software on one or a group of computers. Multi-repository support. Automatic repository selection based on determining the optimal package route. Read more.
It allows real-time communication over the Internet. The webRTC standard provides a high level of security, the ability to connect to a computer outside NAT and also to use a remote file manager or terminal. Read more.
Email monitoring in terms of: date, employee, computer, addressees, number, type and size of attachments. Read more.
Operation of high-performance reporting systems. It allows you to edit more than 200 predefined reports and create new ones. Automatic generation of reports in selected formats to channels: UNC path, e-mail, FTP. Report standard: SAP Business Objects and Stimulsoft (web version). Read more.
It allows you to define templates and import resources from any external data sources. Built-in import schedule.
LMS (Learning Management System) is an advanced system for training employees through videos. Training templates, ongoing assessment of progress, certificates. Read more.
Handling requests for technical problems. Status change notifications, notifications via the Employee Panel. Ability to create custom categories, priorities, request statuses, support groups. Read more.

Check out the comparison of eAuditor with other systems for IT departments

We work with clients across a range of industries

Private organisations

Medical institutions

Educational institutions

Public administration

What determines the price of the eAuditor system?

  • Purchase model: perpetual licence or subscription (12/24/36 months)

  • Organization industries: special price lists BIZ, GOV, MED, EDU

  • Database version (MS SQL Server Express Edition or commercial version)

  • Number of administrative accesses to the system

  • Number of physical machines (computers and servers)

  • Type and number of optional functions

  • Selected SLA (Service Level Agreement) level.

  • Selected installation, configuration and implementation services

Request a consultation to receive a personalized quote


The process of implementing the eAuditor system begins at the stage of contacting the organization’s representative. Several hundred installations (on-premise and cloud) carried out with succs allowed us to isolate the key stages. It is possible to install the system yourself, but we recommend that you take advantage of our full implementation support.

1. Study of the client’s needs – at this stage our expert, together with the representative of the organisation, determines the needs and challenges that we can solve by implementing the eAuditor system in the organisation’s infrastructure. The most common are:
– makes it difficult to remotely manage computers and install applications (even outside of NAT),
– no single software for mass and remote disk encryption,
– the need to purchase disparate systems to inventory, manage, and monitor the infrastructure,
– lack of control (due to number) over connected USB media,
– the difficulty of proving and reporting the current status of all types of devices in a distributed infrastructure.

2. Providing materials about the system – based on the identified needs, our consultant provides materials that provide a basis for learning how the system works. It also allows you to test the system in a DEMO version. This allows anyone to check the functionality of eAuditor in practice.

3. One-on-one presentation – anyone interested can attend a one-on-one presentation with an eAuditor system expert. We are currently implementing online and offline presentations. During the meeting, the expert answers nagging questions and presents an example of how the system works based on diagnosed needs. Before this meeting, it is a good idea to read the materials sent and write down questions.

4. Offer – Based on the information gathered during the personalized presentation, we will send you a personalized commercial offer.

5. Acceptance of the terms of the offer – in case of acceptance of the commercial offer, we start preparing the implementation works.

6. Determining the technical requirements for configuring the system – we want the system to be installed according to the customer’s expectations, so an online meeting is held with the technician to discuss the configuration requirements.

7. Installation and configuration of the system – at this stage, the technical support representative installs the eAuditor system in the customer’s infrastructure and implements a complete environment that allows the system to function.

8 Confirmation of system implementation – the final stage of implementation is to verify the correctness of communication between the various components of the eAuditor system (e.g. sending and receiving data, responding to administrative commands).

9. Administration and Usability Training – To better understand how eAuditor can be used to inventory, monitor, manage, and ensure the security of your infrastructure, we offer administration and usability training. They are an extension of the instructional videos and materials available in the console documentation and knowledge base.

The eAuditor system can be purchased in two models:

  • Perpetual license,
  • Subscriptions for 12/24/36 months.

Yes, the eAuditor system can be tested in your own infrastructure. The trial period is available to organizations with a minimum of 300 computers in the target infrastructure. Remotely installs and commissions the system for 10 devices. The system is tested for 2 weeks with the possibility to extend up to one month. Technical support provides comprehensive assistance during the trial period.

No. The administration console can be accessed through the application via a specific URL from any device (phone, tablet, computer). No installation is required on each management device. This makes the console completely independent of the device’s hardware and software platform.

Learn more about how web and desktop applications compare in IT infrastructure management.

No. The eAuditor system is a comprehensive solution. In a basic configuration, you can inventory, manage, monitor, and secure your IT infrastructure. Optional features can be purchased to expand the capabilities of the system.

As part of the warranty, every customer receives:

  • free technical support (under the license – 12 months, under subscriptions – for the entire subscription period),
  • free updates to knowledge bases, application patterns, and packages,
  • free software updates,
  • the possibility of purchasing paid post-warranty service.

Due to major technological changes in computer hardware, operating systems, and software, we recommend that you purchase post-warranty service to ensure continuity of service and updates.

  • post-warranty service is optional
  • service can be purchased for a period of 12/24/36 months
  • The cost of the service is about 20% – 25% of the current base price of the program (with continuity)
  • The service includes the same scope of services as the warranty service.

If the subscription is not renewed on time, it can be reactivated, but you will be charged for the unpaid period. In special cases (e.g. government, health care), we allow continued use of the system after the subscription expires (for a fixed period of time), provided that you agree to pay the fees for that period.


  • Operating system Windows: Windows 7, Windows 8, Windows 10, Windows 11, Windows Server 2008R2, Windows Server 2012R2, Windows Server 2016, Windows Server 2019, Windows Server 2022.
  • Operating system Linux – distributions Ubuntu 11.04 or higher, Fedora 16 or higher, CentOS 6.3 or higher, Debian 6.0 or higher, RedHat 6.0 or higher
  • MacOS operating system: macOS X 10.7, macOS X 10.8
  • RAM at a minimum 1 GB, HDD min. 10 GB
  • eAgent supports the following web browsers for monitoring user activity on the web: Opera version 63.0.3368.94, Chrome version 77.0.3865.90, Firefox version 69.0.2
  • Microsoft SQL Client Access License (CAL) is not required for devices on which eAgent is installed


  • Windows 7/8.x/10.x
  • Microsoft Windows Server 2012R2/2016/2019/2022
  • 4 GB RAM, 60 GB HDD, CPU 64-bit
  • 1 x Microsoft SQL Server CAL per Device*


  • HTML5-compatible web browser (e.g. Internet Explorer 11, Firefox, Chrome, Opera).
  • Microsoft SQL Server per User lub per Device*


  • MS SQL 2012 (all versions)
  • MS SQL 2014 (all versions)
  • MS SQL 2016 (all versions)
  • MS SQL 2017 (all versions)
  • MS SQL 2019 (all versions)
  • 8 GB RAM, 80 GB HDD, CPU 64-bit
  • 1 x Microsoft SQL Server CAL per Device*

Web server

  • Windows 64-bit (Windows 10, Windows Server 2012 and new)
  • Java 8 (JRE lub JDK), Apache Tomcat 8.5
  • 8 GB RAM, 40 GB HDD, CPU 64-bit
  • Microsoft SQL Server CAL per User or per Device*

* for version MS SQL Express Edition CAL do Microsoft SQL Server is not required.

Yes, the eAuditor system, thanks to eAgent, runs on Linux. The server installation consists of MS SQL Server installation, eWebConsole (Apache Tomcat) installation and eServer installation. When installed on Linux (Ubuntu/debian/RHEL/CentOS/Fedora), eAgent monitors basic aspects of a given device.

System eAuditor może być udostępniony w modelu leasingu lub podobnym modelu finansowania. A compliant model should be understood as the right to use the system for a certain period of time in exchange for the payment of monthly fees.

We have special offers for representatives of various industries. Below is an explanation of each price list name.

  • BIZ – Targeted to private organizations;
  • GOV – directed to authorized government offices of any size;
  • EDU– directed to the following entities: educational institutions; local, regional or state administrative seats of educational institutions; faculty and staff of educational institutions; students; public libraries; public museums; charitable organizations;
  • MED – directed to the following entities: public health care facilities; private health care workplaces; administrative offices or public institutions that provide health care services of appropriate scope and coverage, set or decide statewide or national health care policies, ensure the funancer of health care services of appropriate scope and coverage, act as a regulator of health care services of appropriate scope and coverage.