Questions and answers
Below are the most common questions from customers. If you have not found the answer to your question contact us.
- All
- Computers monitoring
- Computers monitoring 2
- Features
- IAM
- IAM 2
- IAM eA
- IAM eA 2
- Licensing and pricing
- Monitoring of remote
- Monitoring of remote 2
- Pricing
- Pricing 2
- Protocols
- Security
- Technical
Yes, the Employee Panel allows you to view the current permissions assigned to a user. The user can see a list of all the systems and roles to which he or she has access, as well as details about each authorization.
Yes, the system integrates with AD. You can automatically import data from AD, including user information, system access permissions (domain login capability) and organizational structures.
Yes, IAM systems are typically scalable and can be customized to meet the needs of small, medium and large enterprises. They can be expanded as the company grows and its identity management needs increase.
Approval templates make it possible to clearly identify those responsible for accepting or rejecting an application. Email notifications are also defined to inform all participants in the approval process.
Yes, the system allows you to plan and manage longer periods of absence such as maternity leave by automatically assigning substitutes and updating authorizations during the period of absence.
Yes, the system supports permission verification for different roles and access levels, allowing you to control and audit the permissions assigned to different roles and access levels in your information systems.
The opening balance audit is a function used to import and verify the current privileges granted to employees. After importing data into the system, the administrator can check the compliance of assigned accesses to information systems.
Yes, the system allows you to assign permissions with a specific expiration date. When granting permissions, you can set the start and end dates of the permissions, which is useful for projects with limited duration or tasks that require temporary accesses.
The eAuditor system does not adversely affect computer performance, running in the background (transparently to users) without noticeable slowdowns.
Collected data is secured by means of encryption, access control (a multi-level system of access to the eAuditor application and its various options) and advanced security mechanisms in the system itself. The eAuditor system is subject to regular vulnerability tests performed by specialized and independent entities.
Yes, the eAuditor system allows you to customize the level of inventory and monitoring according to the needs of the entity, allowing you to configure monitoring policies for different roles and departments and users.
Yes, the eAuditor system can inventory and monitor computers on the local network, VPN and computers outside the local IT network (behind NAT). The monitored computers do not need to be permanently connected to the eAuditor system server – periodic access to the Internet is sufficient.
Benefits include improved data security, optimized productivity, regulatory compliance, IT asset management and early threat detection.
Yes, employees must be effectively informed about monitoring. Effective information is one where the Employer will ensure accountability of the process (i.e., preferably in writing). An employee may refuse to sign an information document, but this does not affect the Employer’s authority to monitor. It is recommended that Employers specify the scope and purpose of monitoring when informing.
Yes, it is legal to monitor computers as long as the employer informs employees about the monitoring while complying with relevant privacy laws.
Monitoring of computers in the eAuditor system includes inventory of technical parameters, configuration, installed software, files, monitoring of user activity, such as logging in, launching applications, visiting a website, printed documents, connected devices, opened files. Monitoring also includes analysis of parameters affecting IT security: disk encryption, status of patches and updates, creating, modifying and deleting files, sending files to clouds, etc.
The monitoring system can generate reports on user activity, work efficiency, resource utilization, compliance with security policies, and data security incidents.
Best practices include clear communication with employees, ensuring transparency in monitoring processes, regular compliance audits, and applying strict data privacy measures.
The eAuditor system is designed to minimally affect computer performance, running in the background without any noticeable system load. Users experience no reduction in computer performance.
Monitoring systems use technologies such as tracking application activity, logging key activities, monitoring network traffic and analyzing system logs.
Yes. The eAuditor system has a so-called Employee Panel, which provides employees with detailed information from monitoring the computers they use. The scope of the shared data is configurable. The Manager’s Panel available in the eAuditor system allows a supervisor to view the data of subordinate employees. Both panels are simple web applications included in the eAuditor system.
Yes, remote work monitoring systems are usually flexible and can be customized to meet specific company needs, such as monitoring specific applications, adjusting access levels or generating custom reports.
The monitoring system does not allow employees to disable monitoring. Only the system administrator has this ability and can remotely manage monitoring processes.
Monitoring remote work enhances data security, optimizes work efficiency, ensures regulatory compliance, enables better management of resources and provides transparent reports.
Yes, monitoring of remote work is compliant, provided that employees are properly informed and consent to the monitoring, and the data is processed in accordance with applicable regulations.
The monitoring system collects information about user activity, such as work time, applications used, websites visited, documents printed, USB devices used, and actions on files and documents.
The eAuditor IAM system is equipped with a number of security components, is updated on an ongoing basis and is subjected to security audits (system vulnerability testing) by an independent specialized entity. System components are updated to the latest versions.
IAM systems are complex systems in implementation processes. Implementation time is a minimum of 6 weeks. The time depends on the number of objects (employees, systems, services, other IT resources covered by the applications), the complexity of the acceptance paths and the ability of the organization to implement this type of solution.
Yes, the Employee Panel allows you to view the current permissions assigned to a user. The user can see a list of all the systems and roles they have access to, as well as details about each permission.
Yes, the system allows you to generate reports on current authorizations for all employees.
There are many benefits to implementing an IAM system, including increased data security, simplified identity management, improved regulatory compliance, reduced risk of unauthorized access, and improved operational efficiency.
The main functions of the IAM system include user identity management, access control, authentication, authorization, auditing and reporting, and role and privilege management.
The IAM system is crucial to IT security, as it ensures that only authorized users have access to specific resources. It helps protect against unauthorized access and internal attacks, as well as meeting regulatory requirements.
An IAM (Identity and Access Management) system is a set of tools and processes used to manage user identities and control access to resources within a company. IAM enables secure and efficient management of credentials and authorization data.
Tak, aktualnie wdrożone instalacje pracują bardzo sprawnie nawet przy liczbie pracowników przekraczającej 4 tysiące, złożonych ścieżkach akceptacji oraz średniomiesięcznej liczbie wniosków powyżej 2 tysięcy. System umożliwia instalację w środowiskach wirtualnych takich jak VMware, Microsoft Hyper-V oraz inne platformy wirtualizacji.
Installation of the system takes place in the customer’s infrastructure – on- premises. It is up to the system user to decide whether the installation will have communication with our data center, which would ultimately enable automatic updates. If communication is not provided, the system will function offline. In such circumstances, it will be necessary to download the update file provided by the support department and use the option available under “Tools → Update from file.
Yes, the system integrates with AD. We can automatically import data from AD, including user information, system access permissions (domain login capability), organizational structures and computers. The system also allows integration via API – specifically, we support the REST API, which offers unlimited possibilities – allowing interactions with other tools that support this interface.
The system also allows integration via API – specifically, we support the REST API, which offers unlimited possibilities – allowing interactions with other tools that support this interface.
The cost of purchasing the system depends on the size of the infrastructure, i.e. the number of computer workstations (computers, servers) covered by the installation of eAgent, which allows remote management, monitoring and inventory. The cost of purchasing the basic version of the system is the unit price multiplied by the number of devices. The unit price depends on the selected version of the system: standard, professional or enterprise. The amount of the unit price decreases as the number of stations increases, the value decreases exponentially.
The cost of the eAuditor system maintenance subscription depends on: the version of the system, the number of workstations and the sector.
The terms and conditions of technical support are specified at:
https://www.btc.com.pl/en/btc-technical-support-sla-conditions/
Warranty includes:
Technical support (under license – min. 12 months, under subscription – for the entire subscription period),
Updates to knowledge bases, application templates and packages,
Software updates consultations – the software vendor’s time spent communicating with the User, support, advice, instructions. Updates to new versions within an edition version
No, the console is fully web-based.
The process of implementing the eAuditor system begins at the stage of contact with the organization’s representative. Several hundred installations carried out with sukcsem (on-premis and cloud) allowed us to isolate the key stages. It is also possible to install the system yourself, but we recommend taking advantage of the full range of implementation support.
1. customer needs survey – at this stage, our expert, together with the organization’s representative, determines the needs and challenges that we can solve by implementing the eAuditor system into the organization’s infrastructure. The most common are:
– difficult remote management of computers and installation of applications (including outside NAT),
– lack of a single software for mass and remote disk encryption,
– the need to buy different systems to inventory, manage and monitor the infrastructure,
– Lack of control (due to volume) over connected USB drives,
– the difficulty in evidencing and reporting the current status of all types of devices in a distributed infrastructure.
2. Provision of materials about the system- based on the researched needs, our consultant provides materials that provide a basis for learning about the system’s functionality. In addition, it allows you to test the system in DEMO version. This allows everyone to check the functioning of eAuditor in practice.
3. individual presentation – anyone interested can take part in an individual 1:1 presentation with an eAuditor system expert. We are currently implementing online and offline presentations. During the meeting, the expert answers nagging questions and presents an example of how the system works based on diagnosed needs. Before this meeting, it is advisable to read the materials sent and write down the questions.
4. quote – based on the findings of the individual presentation we send a personalized commercial offer.
5. acceptance of the terms of the offer – in a situation when the commercial offer is accepted, we begin to prepare the implementation work.
6. Determination of technical requirements for configuration of the system – we want the system to be installed according to customer expectations, so an online meeting with a technician to discuss configuration requirements takes place.
7. Installation and configuration of the system – at this stage, the technical support representative installs the eAuditor system in the customer’s infrastructure and implements a complete environment to enable the system to function.
8. Confirmation of system implementation – at the final stage of implementation, the correctness of communication between the various components of the eAuditor system is established (e.g. sending and receiving data, response to administrative commands).
9. Administrative and Application Training – In order to better understand how to use the eAuditor system to inventory, monitor, manage and ensure infrastructure security, we offer administrative and application training courses. These are an extension of the instructional videos and materials available in the console’s documentation and knowledge base.
Yes, the eAuditor system can be tested in your own infrastructure. The test period is possible for organizations with a minimum of 300 computers in the target infrastructure. Remote installation and startup of the system for 10 devices is carried out. The system testing period is 2 weeks, with the possibility of extension up to a month. During the testing period, the technical support department provides comprehensive assistance.
The technical requirements are available at the following link: https://www.eauditor.eu/en/faq-items/technical-requirements/
Technical requirements
eAgent
- Operating system Windows: Windows 7, Windows 8, Windows 10, Windows 11, Windows Server 2008R2, Windows Server 2012R2, Windows Server 2016, Windows Server 2019, Windows Server 2022.
- Operating system Linux – distributions Ubuntu 11.04 or higher, Fedora 16 or higher, CentOS 6.3 or higher, Debian 6.0 or higher, RedHat 6.0 or higher
- MacOS operating system: macOS X 10.7, macOS X 10.8
- RAM at a minimum 1 GB, HDD min. 10 GB
- eAgent supports the following web browsers for monitoring user activity on the web: Opera version 63.0.3368.94, Chrome version 77.0.3865.90, Firefox version 69.0.2
- Microsoft SQL Client Access License (CAL) is not required for devices on which eAgent is installed
eServer
- Windows 7/8.x/10.x
- Microsoft Windows Server 2012R2/2016/2019/2022
- 4 GB RAM, 60 GB HDD, CPU 64-bit
- 1 x Microsoft SQL Server CAL per Device*
eWebConsole
- HTML5-compatible web browser (e.g. Internet Explorer 11, Firefox, Chrome, Opera).
- Microsoft SQL Server per User lub per Device*
eDatabase
- MS SQL 2012 (all versions)
- MS SQL 2014 (all versions)
- MS SQL 2016 (all versions)
- MS SQL 2017 (all versions)
- MS SQL 2019 (all versions)
- 8 GB RAM, 80 GB HDD, CPU 64-bit
- 1 x Microsoft SQL Server CAL per Device*
Web server
- Windows 64-bit (Windows 10, Windows Server 2012 and new)
- Java 8 (JRE lub JDK), Apache Tomcat 8.5
- 8 GB RAM, 40 GB HDD, CPU 64-bit
- Microsoft SQL Server CAL per User or per Device*
* for version MS SQL Express Edition CAL do Microsoft SQL Server is not required.
YES. The transfer protocol (PP – Transfer Protocol) and the return protocol (PZ – Return Protocol) are in the form of documents and are saved by the eAuditor system. At any time you can view and print the historical document, the documents of a particular employee and all the documents that contained the device.
YES. Generating a handover protocol (PP – Handover Protocol) in the eAuditor system automatically assigns a device to an employee (creating a relationship). The generation of a return protocol (PZ- Return Protocol) results in the disconnection of the device from the employee (loss of relationship).
If a handover protocol has been generated in the eAuditor system (the device has been assigned to an employee), the return of the device by the employee will result in the automatic issuance of a return protocol (PZ- Return Protocol).
In this case, all you need to do in the eAuditor system is generate a Transfer Protocol (PP – Protocol of Transfer). The system will automatically put the devices already assigned to the employee on the record.
YES. In the eAuditor system, it is possible to fully define the header and footer of equipment transfer and return documents. The content is saved from the document data, making it possible to view and print the document at any time.
YES. When an employee returns equipment, the system displays a list of all equipment issued to the employee (even those on multiple protocols) and suggests returning all items, with simultaneous issuance of the returned items to another employee. The system automatically generates a return document (PZ – Equipment Return Protocol) and a release document (PP – Equipment Transfer Protocol).
YES. One device can only be issued to one person. If this device is used by another person, the eAuditor system displays a message that an unauthorized person is using the device.
The eAuditor system suggests that the minutes include the resources that the employee used last. E.g., he logged into the computer “Computer1”, used a flash drive with the ID “ID1”, connected a camera to his computer (while he was logged in), etc.
Each of the prelisted items can be excluded from the protocol.
YES. The introduced functionality allows to quickly generate equipment handover protocols for all employees based on data already recorded in the system (during normal operation).
N/A. In principle, without a compliant authorized entity, i.e. Licensor, transfer of the license to another entity is not possible.
YES. The licensor provides for the licensing of a capital group in which the parent (parent company) owns the majority of shares or otherwise controls the entity. In the case of entities in the administrative sector (e.g., City Hall), it is possible to obtain permission for the use of eAuditor licenses by entities in which the managing entity has a majority stake (e.g., subsidiaries of City Hall) or otherwise controls the entity.
In both of the aforementioned cases, it is necessary to prepare a list of subsidiaries, which is attached to the License Agreement. Any change in the list of subsidiaries requires written notification to the Licensor.
No. Customers have no right to grant further licenses for the eAuditor system.
Consoles in the form of traditional applications have a historical origin. Until a few years ago, web consoles were not designed because there were faster environments for building visually pleasing interfaces. A responsive web console is difficult to design, build, especially when it has a very large amount of functionality and accesses a huge amount of data (as is the case in IT infrastructure management systems). The cost of building a web console is much higher than application consoles. It should be noted that all new generation products have web consoles.
Definitely yes.
The web console has all the functionality of the traditional console, does not require installation (only the browser is launched), does not require the installation of additional libraries (e.g. reporting engine, Net Framework, etc.), is lightweight, fast, non-failure, consumes very few resources. The eAuditor web console can be run on a cell phone (the app is mostly responsive), although viewing such a large amount of data is somewhat difficult. Administrators who have not worked on web consoles before have doubts at first, but after a very short time of use they would never go back to a traditional application.
YES. e-Auditor supports upgrade and downgrade of any license. The rule should be specified in the “Software > Licenses” tab, when registering / modifying licenses. The system will automatically correctly calculate the number of licenses held.
Yes. The system monitors CAL application access licenses and CAL WEB web application access licenses. It reads the number of simultaneous application launches (CALs) or connections to the web application server (WEB CALs). Acquired data is presented in the form of a chart and as a tabular summary on an hourly/daily/monthly basis, over a selected period of time and in relation to a selected organizational structure.
Yes, all components of the system, from the e-Server to the database, reports, knowledge bases and repositories to the agents installed on the tips, update fully automatically. Internet access is required. In the absence of an Internet connection, the update can be done manually, using the so-called “Internet connection”. “update package.”
Yes. For this, we use a special fully definable automaton that allows you to import data into eAuditor from any data source. Imports can be conducted one or multiple times, from many different sources (e.g. xls files with multiple tabs).
Yes, you can install any application / package using an msi or exe file with the appropriate command syntax. The installation process runs in silent mode (silent) on a selected group of computers at a predefined time. To perform a remote installation, the “Installation Server” repository is used with a properly defined command line.
Reports can be self-created and connected to the system based on the SAP Crystal Reports engine, using SAP Crystal Reports editing version min. 8.5. SAP Crystal Reports is a third-party application, considered one of the best reporting mechanisms. For the purpose of designing reports, you can also use Stimulsoft’s built-in web-based “report desiger” (additional paid option).
eAuditor has a professional reporting system based on the SAP Crystal Reports engine. The console provides dozens of professional reports grouped by topic. eAuditor also has a report scheduler that allows you to set up cyclical generation and sending of reports to designated recipients. The system is also equipped (optionally) with functionality to generate reports of the Stimulsoft standard, which additionally allows you to design reports yourself.
eAuditor allows you to define access rights for administrators and give them appropriate rights to specific functionalities, tabs, organizational structures at the levels of viewing, modification, deletion of data. All actions of administrators are logged into the database.
Agents can be installed on both computers and servers. The agent is a quality-tuned product (no memory leaks, handles, blue screens) and can run on high availability servers.
The edition versions differ in the types of databases supported, among other things. The functionalities are the same in each version.
The eAuditor system is licensed for an indefinite period of time, for the indicated number of computers (in 50-unit increments).
Additional functionality (options) is licensed/provided in the models:
-
Virtualization -> installation license
-
Network Scanner – > installation license
-
Report Builder – > installation license
-
Remote installation -> installation license
-
Performance Monitor -> installation license
-
Communicator -> installation license
-
Helpdesk -> installation license for a selected number of service technicians
-
Video-Learning LMS – > installation license