Monitoring of computers in the eAuditor system includes inventory of technical parameters, configuration, installed software, files, monitoring of user activity, such as logging in, launching applications, visiting a website, printed documents, connected devices, opened files. Monitoring also includes analysis of parameters affecting IT security: disk encryption, status of patches and updates, creating, modifying and deleting files, sending files to clouds, etc.

