摘要 |
A security system keeps a record of configuration information for apparatus (e.g. computer equipment) at a monitoring station. Changes in the configuration information for the apparatus is monitored by the apparatus and the changes are transmitted to the monitoring station. This enables the monitoring station to quickly assess whether the configuration changes are indicative of a security breach and if so to take appropriate action. By deleting changes in configuration and in patterns of use, the system can audit hardware and software to detect theft, software piracy and insurance fraud. |