Monitoring with Icinga primarily focuses on servers and infrastructure. But there are also the people operating these systems from their workstations and laptops. If a server can be accessed from a machine with an outdated operating system, the patch level of the server becomes irrelevant. In computer security, the allegory of a chain and its weakest link is often used to describe the security of a system. This weakest link may be a person using a machine for various tasks, from systems admin...