We believe in complete transparency about what data we collect, how we use it, and how we protect it. This page provides comprehensive details about every data point collected by our desktop monitoring agent.
Our desktop agent collects system-level metrics for IT management purposes. Click on each section to see detailed technical specifications.
Basic system identification and hardware specifications including computer name, serial number, CPU information, memory capacity, operating system version, system architecture, uptime, and manufacturer details.
Comprehensive security posture monitoring including compliance checks, firewall status, encryption configuration, automatic update settings, and CIS benchmark assessments to ensure your systems meet security standards.
System performance metrics including running processes, CPU utilization, memory consumption, and application performance data to help identify bottlenecks and optimize system resources.
Comprehensive inventory of installed applications including software names, versions, publishers, installation dates, size, and crash history to manage software assets and detect issues.
Network connectivity and performance data including connection status, bandwidth measurements, latency tests, packet loss detection, and DNS resolution times for troubleshooting connectivity issues.
Administrator-configured monitoring scripts that collect specific system metrics such as disk space, service status, custom performance indicators, and business-specific measurements.
Scheduled maintenance tasks, system remediation scripts, and automated administrative operations such as software updates, cache clearing, service restarts, and custom IT workflows.
Automated notification system that monitors sensor data and triggers alerts when thresholds are violated or system issues are detected, enabling proactive IT management.
Enterprise-grade security measures to ensure your data remains safe and private.
All data transmitted between systems uses TLS 1.3 encryption with HTTPS, ensuring data security in transit.
All stored data is encrypted using AES-256 encryption, protecting information when stored in our databases.
Granular permissions system ensures users only access data appropriate to their organizational role.
Periodic third-party security assessments and penetration testing to identify and address vulnerabilities.
Your data is never shared with third parties without explicit consent. We don't sell or distribute your information.
Our platform adheres to industry security standards and best practices for data protection.
You maintain full control over data collection and can exercise your rights at any time.
Full control over data collection through sensor and script configuration. Administrators decide what metrics to monitor.
Configurable retention periods for different data types. Historical data can be archived or deleted based on policies.
Request complete data deletion when deregistering systems. All associated data can be permanently removed.
Export collected data in standard formats for compliance, auditing, or migration purposes.
If you have any questions about what data we collect, how we use it, or our security practices, please don't hesitate to contact our security team.
Security & Privacy Team: [email protected]
General Support: Visit our Contact Page
We are committed to transparency and will respond to all security and privacy inquiries within 48 hours.