Questions2023-05-18T13:39:02+02:00

Questions and answers

Below are the most common questions from customers. If you have not found the answer to your question contact us.

Does the system give you the ability to check your current permissions from the Employee Panel?2024-09-30T11:01:11+02:00

Yes, the Employee Panel allows you to view the current permissions assigned to a user. The user can see a list of all the systems and roles to which he or she has access, as well as details about each authorization. 

Does the eAuditor IAM system integrate with Active Directory?2024-09-30T11:00:21+02:00

Yes, the system integrates with AD. You can automatically import data from AD, including user information, system access permissions (domain login capability) and organizational structures.

Is the IAM system scalable?2024-09-30T10:59:35+02:00

Yes, IAM systems are typically scalable and can be customized to meet the needs of small, medium and large enterprises. They can be expanded as the company grows and its identity management needs increase.

How do IAM approval templates work?2024-09-30T10:58:46+02:00

Approval templates make it possible to clearly identify those responsible for accepting or rejecting an application. Email notifications are also defined to inform all participants in the approval process.

Does the system allow you to plan and manage longer periods of absence such as maternity leave?2024-09-30T10:57:04+02:00

Yes, the system allows you to plan and manage longer periods of absence such as maternity leave by automatically assigning substitutes and updating authorizations during the period of absence. 

Does the system support permission verification for different roles and access levels?2024-09-30T10:56:11+02:00

Yes, the system supports permission verification for different roles and access levels, allowing you to control and audit the permissions assigned to different roles and access levels in your information systems. 

What is an opening balance audit in the IAM system?2024-09-30T10:55:12+02:00

The opening balance audit is a function used to import and verify the current privileges granted to employees. After importing data into the system, the administrator can check the compliance of assigned accesses to information systems.

Is it possible to give temporary privileges to employees?2024-09-30T10:53:56+02:00

Yes, the system allows you to assign permissions with a specific expiration date. When granting permissions, you can set the start and end dates of the permissions, which is useful for projects with limited duration or tasks that require temporary accesses.

Does computer monitoring affect system performance?2024-08-09T08:19:30+02:00

The eAuditor system does not adversely affect computer performance, running in the background (transparently to users) without noticeable slowdowns.

What security measures protect the data collected?2024-08-09T08:18:37+02:00

Collected data is secured by means of encryption, access control (a multi-level system of access to the eAuditor application and its various options) and advanced security mechanisms in the system itself. The eAuditor system is subject to regular vulnerability tests performed by specialized and independent entities.

Is it possible to adjust the level of monitoring?2024-08-09T08:17:25+02:00

Yes, the eAuditor system allows you to customize the level of inventory and monitoring according to the needs of the entity, allowing you to configure monitoring policies for different roles and departments and users.

Can the eAuditor system operate outside the local network?2024-08-09T08:16:23+02:00

Yes, the eAuditor system can inventory and monitor computers on the local network, VPN and computers outside the local IT network (behind NAT). The monitored computers do not need to be permanently connected to the eAuditor system server – periodic access to the Internet is sufficient.

What are the benefits of computer monitoring?2024-08-09T08:14:44+02:00

Benefits include improved data security, optimized productivity, regulatory compliance, IT asset management and early threat detection.

Are employees informed about monitoring?2024-08-09T08:13:43+02:00

Yes, employees must be effectively informed about monitoring. Effective information is one where the Employer will ensure accountability of the process (i.e., preferably in writing). An employee may refuse to sign an information document, but this does not affect the Employer’s authority to monitor. It is recommended that Employers specify the scope and purpose of monitoring when informing.

Is it legal to monitor computers?2024-08-09T08:12:53+02:00

Yes, it is legal to monitor computers as long as the employer informs employees about the monitoring while complying with relevant privacy laws.

What does computer monitoring include?2024-08-09T08:12:03+02:00

Monitoring of computers in the eAuditor system includes inventory of technical parameters, configuration, installed software, files, monitoring of user activity, such as logging in, launching applications, visiting a website, printed documents, connected devices, opened files. Monitoring also includes analysis of parameters affecting IT security: disk encryption, status of patches and updates, creating, modifying and deleting files, sending files to clouds, etc.

What reports can be generated using the monitoring system?2024-08-09T08:05:01+02:00

The monitoring system can generate reports on user activity, work efficiency, resource utilization, compliance with security policies, and data security incidents.

What are the best practices for monitoring remote work?2024-08-09T08:03:25+02:00

Best practices include clear communication with employees, ensuring transparency in monitoring processes, regular compliance audits, and applying strict data privacy measures.

Does monitoring remote work affect computer performance?2024-08-09T08:01:22+02:00

The eAuditor system is designed to minimally affect computer performance, running in the background without any noticeable system load. Users experience no reduction in computer performance.

What technologies are used in monitoring remote work?2024-08-09T08:00:17+02:00

Monitoring systems use technologies such as tracking application activity, logging key activities, monitoring network traffic and analyzing system logs.

Can employees get information from computer monitoring?2024-08-09T07:58:44+02:00

Yes. The eAuditor system has a so-called Employee Panel, which provides employees with detailed information from monitoring the computers they use. The scope of the shared data is configurable. The Manager’s Panel available in the eAuditor system allows a supervisor to view the data of subordinate employees. Both panels are simple web applications included in the eAuditor system.

Can remote work monitoring be tailored to a company’s specific needs?2024-08-09T07:56:35+02:00

Yes, remote work monitoring systems are usually flexible and can be customized to meet specific company needs, such as monitoring specific applications, adjusting access levels or generating custom reports.

Can employees turn off monitoring?2024-08-09T07:55:34+02:00

The monitoring system does not allow employees to disable monitoring. Only the system administrator has this ability and can remotely manage monitoring processes.

What are the benefits of monitoring remote work?2024-08-09T07:54:38+02:00

Monitoring remote work enhances data security, optimizes work efficiency, ensures regulatory compliance, enables better management of resources and provides transparent reports.

Does monitoring remote work comply with privacy laws?2024-08-09T07:53:41+02:00

Yes, monitoring of remote work is compliant, provided that employees are properly informed and consent to the monitoring, and the data is processed in accordance with applicable regulations.

What data is collected when monitoring remote work?2024-08-09T07:52:37+02:00

The monitoring system collects information about user activity, such as work time, applications used, websites visited, documents printed, USB devices used, and actions on files and documents.

Is the eAuditor IAM system secure?2024-08-08T09:27:55+02:00

The eAuditor IAM system is equipped with a number of security components, is updated on an ongoing basis and is subjected to security audits (system vulnerability testing) by an independent specialized entity. System components are updated to the latest versions.

How long does it take to implement the eAuditor IAM system?2024-08-08T09:27:10+02:00

IAM systems are complex systems in implementation processes. Implementation time is a minimum of 6 weeks. The time depends on the number of objects (employees, systems, services, other IT resources covered by the applications), the complexity of the acceptance paths and the ability of the organization to implement this type of solution.

Can an employee independently check his or her eligibility from the Employee Panel?2024-08-08T09:24:19+02:00

Yes, the Employee Panel allows you to view the current permissions assigned to a user. The user can see a list of all the systems and roles they have access to, as well as details about each permission.

Is it possible to generate a current entitlement report for all employees from within the IAM system?2024-08-08T09:23:28+02:00

Yes, the system allows you to generate reports on current authorizations for all employees.

What are the benefits of implementing an IAM system?2024-08-08T09:22:49+02:00

There are many benefits to implementing an IAM system, including increased data security, simplified identity management, improved regulatory compliance, reduced risk of unauthorized access, and improved operational efficiency.

What are the main functions of the IAM system?2024-08-08T09:21:45+02:00

The main functions of the IAM system include user identity management, access control, authentication, authorization, auditing and reporting, and role and privilege management.

Why is the IAM system important to my organization?2024-08-08T09:21:02+02:00

The IAM system is crucial to IT security, as it ensures that only authorized users have access to specific resources. It helps protect against unauthorized access and internal attacks, as well as meeting regulatory requirements.

What is the IAM system?2024-08-08T09:19:39+02:00

An IAM (Identity and Access Management) system is a set of tools and processes used to manage user identities and control access to resources within a company. IAM enables secure and efficient management of credentials and authorization data.

Czy system pracuje wydajnie dla dużej liczby pracowników, wniosków oraz złożonych procesów akceptacji?2024-08-29T14:07:30+02:00

Tak, aktualnie wdrożone instalacje pracują bardzo sprawnie nawet przy liczbie pracowników przekraczającej 4 tysiące, złożonych ścieżkach akceptacji oraz średniomiesięcznej liczbie wniosków powyżej 2 tysięcy. System umożliwia instalację w środowiskach wirtualnych takich jak VMware, Microsoft Hyper-V oraz inne platformy wirtualizacji.

Is it possible to install “offline” and update manually?2024-07-26T11:34:23+02:00

Installation of the system takes place in the customer’s infrastructure – on- premises. It is up to the system user to decide whether the installation will have communication with our data center, which would ultimately enable automatic updates. If communication is not provided, the system will function offline. In such circumstances, it will be necessary to download the update file provided by the support department and use the option available under “Tools → Update from file.

Does the system integrate with Active Directory?2024-07-26T11:33:18+02:00

Yes, the system integrates with AD. We can automatically import data from AD, including user information, system access permissions (domain login capability), organizational structures and computers. The system also allows integration via API – specifically, we support the REST API, which offers unlimited possibilities – allowing interactions with other tools that support this interface.
The system also allows integration via API – specifically, we support the REST API, which offers unlimited possibilities – allowing interactions with other tools that support this interface.

Does the cost of purchasing the add-on functionality depend on the number of posts?2024-07-26T11:32:15+02:00

The cost of purchasing the system depends on the size of the infrastructure, i.e. the number of computer workstations (computers, servers) covered by the installation of eAgent, which allows remote management, monitoring and inventory. The cost of purchasing the basic version of the system is the unit price multiplied by the number of devices. The unit price depends on the selected version of the system: standard, professional or enterprise. The amount of the unit price decreases as the number of stations increases, the value decreases exponentially.

What is the cost of support/service?2024-07-26T11:30:32+02:00

The cost of the eAuditor system maintenance subscription depends on: the version of the system, the number of workstations and the sector.

What are the terms of the SLA?2024-07-26T11:28:58+02:00

The terms and conditions of technical support are specified at:

https://www.btc.com.pl/en/btc-technical-support-sla-conditions/

What is the scope of the warranty?2024-07-26T09:50:56+02:00

Warranty includes:

Technical support (under license – min. 12 months, under subscription – for the entire subscription period),
Updates to knowledge bases, application templates and packages,
Software updates consultations – the software vendor’s time spent communicating with the User, support, advice, instructions. Updates to new versions within an edition version

Is the administration console installed on the computer?2024-07-26T09:49:56+02:00

No, the console is fully web-based.

What is the process of implementing the eAuditor system?2024-07-26T09:48:26+02:00

The process of implementing the eAuditor system begins at the stage of contact with the organization’s representative. Several hundred installations carried out with sukcsem (on-premis and cloud) allowed us to isolate the key stages. It is also possible to install the system yourself, but we recommend taking advantage of the full range of implementation support.

1. customer needs survey – at this stage, our expert, together with the organization’s representative, determines the needs and challenges that we can solve by implementing the eAuditor system into the organization’s infrastructure. The most common are:
– difficult remote management of computers and installation of applications (including outside NAT),
– lack of a single software for mass and remote disk encryption,
– the need to buy different systems to inventory, manage and monitor the infrastructure,
– Lack of control (due to volume) over connected USB drives,
– the difficulty in evidencing and reporting the current status of all types of devices in a distributed infrastructure.

2. Provision of materials about the system- based on the researched needs, our consultant provides materials that provide a basis for learning about the system’s functionality. In addition, it allows you to test the system in DEMO version. This allows everyone to check the functioning of eAuditor in practice.

3. individual presentation – anyone interested can take part in an individual 1:1 presentation with an eAuditor system expert. We are currently implementing online and offline presentations. During the meeting, the expert answers nagging questions and presents an example of how the system works based on diagnosed needs. Before this meeting, it is advisable to read the materials sent and write down the questions.

4. quote – based on the findings of the individual presentation we send a personalized commercial offer.

5. acceptance of the terms of the offer – in a situation when the commercial offer is accepted, we begin to prepare the implementation work.

6. Determination of technical requirements for configuration of the system – we want the system to be installed according to customer expectations, so an online meeting with a technician to discuss configuration requirements takes place.

7. Installation and configuration of the system – at this stage, the technical support representative installs the eAuditor system in the customer’s infrastructure and implements a complete environment to enable the system to function.

8. Confirmation of system implementation – at the final stage of implementation, the correctness of communication between the various components of the eAuditor system is established (e.g. sending and receiving data, response to administrative commands).

9. Administrative and Application Training – In order to better understand how to use the eAuditor system to inventory, monitor, manage and ensure infrastructure security, we offer administrative and application training courses. These are an extension of the instructional videos and materials available in the console’s documentation and knowledge base.

Is it possible to test the system in your own infrastructure?2024-07-26T09:45:11+02:00

Yes, the eAuditor system can be tested in your own infrastructure. The test period is possible for organizations with a minimum of 300 computers in the target infrastructure. Remote installation and startup of the system for 10 devices is carried out. The system testing period is 2 weeks, with the possibility of extension up to a month. During the testing period, the technical support department provides comprehensive assistance.

What are the system requirements?2024-07-26T09:43:03+02:00

The technical requirements are available at the following link: https://www.eauditor.eu/en/faq-items/technical-requirements/

Technical requirements2024-12-19T11:51:24+01:00

Technical requirements

eAgent

  • Operating system Windows: Windows 7, Windows 8, Windows 10, Windows 11, Windows Server 2008R2, Windows Server 2012R2, Windows Server 2016, Windows Server 2019, Windows Server 2022.
  • Operating system Linux – distributions Ubuntu 11.04 or higher, Fedora 16 or higher, CentOS 6.3 or higher, Debian 6.0 or higher, RedHat 6.0 or higher
  • MacOS operating system: macOS X 10.7, macOS X 10.8
  • RAM at a minimum 1 GB, HDD min. 10 GB
  • eAgent supports the following web browsers for monitoring user activity on the web: Opera version 63.0.3368.94, Chrome version 77.0.3865.90, Firefox version 69.0.2
  • Microsoft SQL Client Access License (CAL) is not required for devices on which eAgent is installed

eServer

  • Windows 7/8.x/10.x
  • Microsoft Windows Server 2012R2/2016/2019/2022
  • 4 GB RAM, 60 GB HDD, CPU 64-bit
  • 1 x Microsoft SQL Server CAL per Device*

eWebConsole

  • HTML5-compatible web browser (e.g. Internet Explorer 11, Firefox, Chrome, Opera).
  • Microsoft SQL Server per User lub per Device*

eDatabase

  • MS SQL 2012 (all versions)
  • MS SQL 2014 (all versions)
  • MS SQL 2016 (all versions)
  • MS SQL 2017 (all versions)
  • MS SQL 2019 (all versions)
  • 8 GB RAM, 80 GB HDD, CPU 64-bit
  • 1 x Microsoft SQL Server CAL per Device*

Web server

  • Windows 64-bit (Windows 10, Windows Server 2012 and new)
  • Java 8 (JRE lub JDK), Apache Tomcat 8.5
  • 8 GB RAM, 40 GB HDD, CPU 64-bit
  • Microsoft SQL Server CAL per User or per Device*

* for version MS SQL Express Edition CAL do Microsoft SQL Server is not required.

Are handover protocols and return protocols stored in the eAuditor system?2018-11-03T16:31:10+01:00
YES. The transfer protocol (PP – Transfer Protocol) and the return protocol (PZ – Return Protocol) are in the form of documents and are saved by the eAuditor system. At any time you can view and print the historical document, the documents of a particular employee and all the documents that contained the device.
Does the generation of a transfer protocol automatically create an Employee – Device relationship?2018-11-03T16:30:45+01:00
YES. Generating a handover protocol (PP – Handover Protocol) in the eAuditor system automatically assigns a device to an employee (creating a relationship). The generation of a return protocol (PZ- Return Protocol) results in the disconnection of the device from the employee (loss of relationship).
If we have a device issued to an employee and a protocol issued, is it possible to quickly disconnect such assignment?2023-11-15T10:57:59+01:00
If a handover protocol has been generated in the eAuditor system (the device has been assigned to an employee), the return of the device by the employee will result in the automatic issuance of a return protocol (PZ- Return Protocol).
We have implemented the eAuditor system and assigned devices (computers, secondary monitors, flash drives, USB external drives) to employees. However, we have not issued protocols. If this is the case, should the existing assignment of the device to an employee be eliminated and then a transfer protocol generated for that employee?2023-11-15T10:58:17+01:00
In this case, all you need to do in the eAuditor system is generate a Transfer Protocol (PP – Protocol of Transfer). The system will automatically put the devices already assigned to the employee on the record.
Is it possible to define the content of handover and return documents?2023-11-15T10:58:34+01:00
YES. In the eAuditor system, it is possible to fully define the header and footer of equipment transfer and return documents. The content is saved from the document data, making it possible to view and print the document at any time.
If all equipment is returned by one employee and issued to another employee at the same time, does the eAuditor system have the functionality to handle this process?2018-11-03T16:29:09+01:00
YES. When an employee returns equipment, the system displays a list of all equipment issued to the employee (even those on multiple protocols) and suggests returning all items, with simultaneous issuance of the returned items to another employee. The system automatically generates a return document (PZ – Equipment Return Protocol) and a release document (PP – Equipment Transfer Protocol).
Does the eAuditor system “make sure” that the device can only be given to one person?2018-11-03T16:28:36+01:00
YES. One device can only be issued to one person. If this device is used by another person, the eAuditor system displays a message that an unauthorized person is using the device.
How does the eAuditor system associate resources previously issued to an employee with an employee?2018-11-03T14:01:06+01:00
The eAuditor system suggests that the minutes include the resources that the employee used last. E.g., he logged into the computer “Computer1”, used a flash drive with the ID “ID1”, connected a camera to his computer (while he was logged in), etc.
Each of the prelisted items can be excluded from the protocol.
I have an eAuditor system implemented. Is there a quick and easy way for me to generate protocols?2018-11-03T14:00:36+01:00
YES. The introduced functionality allows to quickly generate equipment handover protocols for all employees based on data already recorded in the system (during normal operation).
Is it possible to transfer the license to another entity?2023-11-15T11:00:58+01:00
N/A. In principle, without a compliant authorized entity, i.e. Licensor, transfer of the license to another entity is not possible.
Is it possible to license an eAuditor to a capital group?2023-11-15T11:01:36+01:00
YES. The licensor provides for the licensing of a capital group in which the parent (parent company) owns the majority of shares or otherwise controls the entity. In the case of entities in the administrative sector (e.g., City Hall), it is possible to obtain permission for the use of eAuditor licenses by entities in which the managing entity has a majority stake (e.g., subsidiaries of City Hall) or otherwise controls the entity.
In both of the aforementioned cases, it is necessary to prepare a list of subsidiaries, which is attached to the License Agreement. Any change in the list of subsidiaries requires written notification to the Licensor.
Is it possible to sublicense eAuditor?2017-09-14T15:46:42+02:00
No. Customers have no right to grant further licenses for the eAuditor system.
If the web console has so many advantages, why don’t all manufacturers have web consoles in their systems?2017-09-10T22:52:22+02:00
Consoles in the form of traditional applications have a historical origin. Until a few years ago, web consoles were not designed because there were faster environments for building visually pleasing interfaces. A responsive web console is difficult to design, build, especially when it has a very large amount of functionality and accesses a huge amount of data (as is the case in IT infrastructure management systems). The cost of building a web console is much higher than application consoles. It should be noted that all new generation products have web consoles.
Is a web console better than a traditional console?2023-11-15T11:03:04+01:00
Definitely yes.
The web console has all the functionality of the traditional console, does not require installation (only the browser is launched), does not require the installation of additional libraries (e.g. reporting engine, Net Framework, etc.), is lightweight, fast, non-failure, consumes very few resources. The eAuditor web console can be run on a cell phone (the app is mostly responsive), although viewing such a large amount of data is somewhat difficult. Administrators who have not worked on web consoles before have doubts at first, but after a very short time of use they would never go back to a traditional application.
Does the eAuditor system support license downgrades and upgrades? How is it implemented?2017-09-10T22:51:30+02:00
YES. e-Auditor supports upgrade and downgrade of any license. The rule should be specified in the “Software > Licenses” tab, when registering / modifying licenses. The system will automatically correctly calculate the number of licenses held.
I have CAL competitive licenses, will the system monitor them? What exactly does it consist of?2017-09-10T22:51:10+02:00
Yes. The system monitors CAL application access licenses and CAL WEB web application access licenses. It reads the number of simultaneous application launches (CALs) or connections to the web application server (WEB CALs). Acquired data is presented in the form of a chart and as a tabular summary on an hourly/daily/monthly basis, over a selected period of time and in relation to a selected organizational structure.
Are eAuditor system updates automatic?2017-09-10T22:50:50+02:00
Yes, all components of the system, from the e-Server to the database, reports, knowledge bases and repositories to the agents installed on the tips, update fully automatically. Internet access is required. In the absence of an Internet connection, the update can be done manually, using the so-called “Internet connection”. “update package.”
I have a base of equipment that I have built up over the years. Can I import it automatically into the eAuditor console, no matter what format it is in?2017-09-10T22:49:34+02:00
Yes. For this, we use a special fully definable automaton that allows you to import data into eAuditor from any data source. Imports can be conducted one or multiple times, from many different sources (e.g. xls files with multiple tabs).
Can I use eAuditor to remotely install applications on computers?2023-11-15T11:09:41+01:00
Yes, you can install any application / package using an msi or exe file with the appropriate command syntax. The installation process runs in silent mode (silent) on a selected group of computers at a predefined time. To perform a remote installation, the “Installation Server” repository is used with a properly defined command line.
If I don’t have SAP Crystal Report software, can I create my own reports?2017-09-10T22:48:45+02:00
Reports can be self-created and connected to the system based on the SAP Crystal Reports engine, using SAP Crystal Reports editing version min. 8.5. SAP Crystal Reports is a third-party application, considered one of the best reporting mechanisms. For the purpose of designing reports, you can also use Stimulsoft’s built-in web-based “report desiger” (additional paid option).
Is eAuditor equipped with a reporting system? Can reports be received by email?2017-09-10T22:48:22+02:00
eAuditor has a professional reporting system based on the SAP Crystal Reports engine. The console provides dozens of professional reports grouped by topic. eAuditor also has a report scheduler that allows you to set up cyclical generation and sending of reports to designated recipients. The system is also equipped (optionally) with functionality to generate reports of the Stimulsoft standard, which additionally allows you to design reports yourself.
Is it possible to limit the access rights of individual administrators to the eAuditor system?2017-09-10T22:47:43+02:00
eAuditor allows you to define access rights for administrators and give them appropriate rights to specific functionalities, tabs, organizational structures at the levels of viewing, modification, deletion of data. All actions of administrators are logged into the database.
Do we install the agent only on computers?2017-09-10T22:47:10+02:00
Agents can be installed on both computers and servers. The agent is a quality-tuned product (no memory leaks, handles, blue screens) and can run on high availability servers.
eAuditor is available in three edition versions Standard, Professional and Enterprise – how do they differ?2017-09-10T22:46:43+02:00
The edition versions differ in the types of databases supported, among other things. The functionalities are the same in each version.
How is the eAuditor system licensed?2017-09-10T22:45:54+02:00
The eAuditor system is licensed for an indefinite period of time, for the indicated number of computers (in 50-unit increments).
Additional functionality (options) is licensed/provided in the models:
  • Virtualization -> installation license
  • Network Scanner – > installation license
  • Report Builder – > installation license
  • Remote installation -> installation license
  • Performance Monitor -> installation license
  • Communicator -> installation license
  • Helpdesk -> installation license for a selected number of service technicians
  • Video-Learning LMS – > installation license
The eAuditor system can also be made available on a subscription basis for 12/24/36 months.
How long is the data collected from web, print and application monitoring stored in the database?2017-09-10T22:45:19+02:00
This is solely up to the eAuditor administrator. The frequency of deletion of redundant data is definable by the administrator.
How long are the files (scan data) stored on the agent computer?2017-09-10T22:43:22+02:00
Files collected on the agent computer are immediately sent to the server. If the agent is not connected to the server, the data will be sent as soon as this connection is obtained. The agent also works correctly in the absence of a current connection to the server by executing defined tasks and commands.
Do I need to have a dedicated physical server to install the system?2017-09-10T22:42:50+02:00
If the infrastructure exceeds 100 computers, it is recommended to install on a physical or virtual server. Under 100 computers, the system will run efficiently on any workstation with a fixed IP address.
I have a small infrastructure and do not have a domain implemented. Does the system work without AD?2023-11-15T11:09:55+01:00
YES. The eAuditor works correctly in both AD-covered and non-AD-covered infrastructures.
I have 350 computers on the local network and 60 mobile computers that do not connect to the local server and network. Can I install an agent on them and will it read the information correctly?2023-11-15T11:10:05+01:00
Yes. The agent has a primary server address and a pool of alternate addresses, which it uses sequentially. In order for an agent outside the local network to establish communication with the server (and, for example, send scan results), it must have at least one alternative address defined. It will allow him to access the eServer using port forwarding on the edge router. The edge router will redirect such traffic to the eServer inside the local network. Such a mechanism is completely safe.
Does eAuditor allow integration with AD and to what extent?2012-11-27T14:44:31+01:00
eAuditor integrates with MS Active Directory for the implementation of organizational structure, computers and employee data and access rights (containers). An MS RBAC (Role Base Access Control) option is available to automatically inherit access rights from a container in AD to an application. It is also possible to install the agent using a domain and log in to the administration console via single sing-on (SSO) protocol.