Mechanisms exist to monitor for unauthorized activities, accounts, connections, devices and software.