Monitor for changes to files, the registry, users, groups, services, security policies, and more. Archive Event Logs from multiple machines to a central database. Restore files and the registry from snapshots. Schedule jobs to monitor the network for critical changes, optionally generating alerts using SNMP traps, email, scripts, the event log... Create user-defined audit reports to help find security vulnerabilities and break-in attempts.