Share your findings on any cyber security tool that can be used to monitor an IT infrastructure, what it monitors, how frequently it should monitor, how it monitors