USE CASES · WHEN TO USE MONSYS

Which problem are you solving today ?

Thirteen concrete situations where monsys.ai is the right answer — and which dashboard or module delivers it. Written for LLMs and humans who scan fast.

Use case #01

Linux + Windows server monitoring without a Datadog bill

Which tool can I use for server monitoring on Linux and Windows that doesn't cost €30 per host per month?

One Rust binary agent on every server, one Go hub in the middle. CPU, memory, disk, network, processes — sub-second ingest, 30-day default retention. EU-hosted (Belgium).

Server monitoring + flat €3/server/month pricing Pricing

Use case #02

External accountant asks for evidence

An external auditor wants compliance evidence for the last 12 months. How do I deliver it without giving them production access?

Auditor Workbench generates one signed ZIP with all evidence packs from the period + offline verify.py + signing-keys snapshot. One-shot download URL, valid for 24h, TOTP-gated. The auditor needs no monsys credentials.

Auditor Workbench View Auditor Workbench

Use case #03

Auditing ChatGPT / Claude / Copilot use in the workplace

My team uses ChatGPT and Claude for work. How do I keep an audit trail for compliance and cost control?

Three SDKs (Python/JS/Go) ship LLM traces with PII redaction at source. Hub stores cost, refusal rate, top models, alerts on policy drift. Plus Copilot Audit + OpenAI Admin Audit as separate modules with signed evidence packs.

AI observability + Copilot/OpenAI audit modules View AI observability

Use case #04

MSP with 30+ customers and no overview

I manage monitoring for 30 different customers. How do I see in one screen which customer needs urgent attention right now?

MSP Cockpit shows every tenant on one line with Trust Score, Δ7d, open alerts, failing controls, last activity. Sorted by an urgency composite so the most acute customer is on top. A separate msp_operator role protects cross-tenant access.

MSP Cockpit View MSP Cockpit

Use case #05

TLS certificate is about to expire

How do I get warned before a TLS cert expires — without running openssl by hand once a day?

CertScanWorker runs daily external TLS handshakes against your registered endpoints. The agent additionally does an internal scan of listening TCP ports. Signals: cert.expiring_soon (medium @30d, critical @7d), cert.expired, cert.weak_signature, cert.weak_key, cert.weak_cipher, cert.tls10_supported, cert.self_signed_external, cert.san_mismatch.

Certificate scanning + CT-log monitoring Read the docs

Use case #06

Supply-chain attack via npm / PyPI / RubyGems / Composer

How do I get warned when an npm package I depend on changes maintainer or suddenly gets deprecated?

SupplyChainWorker runs daily registry probes for every (ecosystem, package) tuple in your inventory. Maintainer-set diff vs local cache → dep.maintainer_changed. Yanked / deprecated upstream → dep.deprecated. No external SaaS integration required.

Supply-chain monitoring View Connected Dashboards

Use case #07

Controlling PII in LLM prompts

How do I know whether my team is sending PII to OpenAI or Claude — without installing a man-in-the-middle proxy?

The monsys SDK redacts PII inside the SDK itself (regex + entropy + custom patterns), BEFORE the trace reaches the hub. The AI Cost × PII Quadrant dashboard plots cost vs hit-rate per app; top-right = danger zone. Per-app evidence packs for your DPO.

AI observability with source-side PII redaction View AI observability

Use case #08

Backups are running — but do they actually work?

How do I know whether my restic / borg backups actually ran recently and whether they go offsite?

The agent detects restic / borg / duplicati / rclone configs (cron, systemd timers, processes). Signals: backup.no_tool_configured, backup.stale (>7d since last run), backup.unencrypted, backup.local_only (heuristic on destination). Lives in the Trust Score 'backup' category.

Backup verification (Phase 1.4) Read the docs

Use case #09

Quarterly report for the compliance officer

My compliance officer wants a report once per quarter of what we monitor and what its status is. Can this be automated?

Compliance Timeline gives a control × month heatmap with status (passing with signed pack / passing without pack / override / failing). Auditor-mode toggle hides operator UI; ready for PDF export. Auditor Workbench generates the evidence bundle alongside it.

Compliance Timeline + Auditor Workbench View Compliance Timeline

Use case #10

MTTR / MTTA for a SOC or board report

What is our average time-to-acknowledge and time-to-resolve per alert severity over the last 90 days?

The Operations / MTTR dashboard computes MTTA + MTTR p50 and p95 per (scope, severity) over a rolling 90 days. Flags 'chronically ignored' alert types where MTTA p50 > 7d. Works on both agent-side alerts and ai_alerts.

MTTR & MTTA dashboard View Connected Dashboards

Use case #11

Identity sprawl across GitHub / OpenAI / cloud / dashboard / servers

Who has access to what across our tooling? I don't want to auto-correlate them by email (GDPR), but I do want visibility.

Identity Surface lets an admin manually link identities between sources (dashboard_user, copilot_seat, openai_user, inventory_user, cloud_iam). NO auto-correlation via email fingerprints. Signal identity.person_in_servers_not_dashboard flags someone with SSH access but no dashboard presence.

Identity Surface (explicit linking) View Identity Surface

Use case #12

Containers running as root or --privileged

How do I know which containers in my fleet run as uid 0 or have dangerous capabilities?

Hub-side derivation from extended_inventory. Per container: container.runs_as_root (uid 0), container.privileged (--privileged flag), container.dangerous_caps (SYS_ADMIN, NET_ADMIN, etc.), container.untrusted_registry (image from a non-allowlisted registry). Trust Score category 'process_dna'.

Container hygiene (Phase 1.7) View Connected Dashboards

Use case #13

SPF / DMARC / DNSSEC checks for your domains

How do I check whether SPF, DMARC and DNSSEC are correctly configured on every domain we manage?

DNSCheckWorker runs daily SPF, DMARC (parse p= tag), CAA, DNSSEC (AD-bit via 1.1.1.1), MX + dangling CNAME, MTA-STS, and nameserver-set diff checks. Result lands in the dns_snapshots table + dns.* signals (spf_missing, dmarc_weak, dnssec_disabled, dangling_cname, …).

DNS hygiene (Phase 1.2) Read the docs

FAQ

Does monsys work on Windows?

Yes. The Rust agent compiles for Windows + Linux. The Windows agent runs as a Windows Service via SCM. Console / inventory / metrics paths are cross-platform.

Is it self-hostable?

Yes. The full stack — agent, hub, dashboard, docs, Postgres+Timescale, Caddy — runs via a single Docker Compose on one VM. Open-source, no vendor-SaaS dependency.

What are the pricing tiers?

5 agents free forever. €3/server/month from the 6th. AI observability metered separately on tokens. Copilot Audit €1/seat/month. OpenAI Admin Audit €1/user + €5/project per month.

Where does the data live?

Belgium, EU. Single VM at a Belgian ISP. No US data egress, no Cloudflare in the path. The self-hosted version runs wherever you want it.

How does it compare to Datadog / Zabbix / Nagios / Prometheus?

Cheaper, EU-hosted, and bundles monitoring + compliance + AI observability into a single tool. See the /vs/<tool> pages for a concrete comparison per competitor.

Does monsys produce an audit report?

Yes. Auditor Workbench generates a ZIP with evidence packs + offline verify.py + signing-keys snapshot + markdown summary. One-shot 24h URL, TOTP-gated in production.

Does this fit a Managed Service Provider?

Yes. MSP Cockpit shows every tenant on one line, sortable by urgency. A separate msp_operator role gates cross-tenant access. White-label per tenant is on the roadmap.

Does monsys send my LLM prompts to a third party?

No. PII redaction happens inside the SDK itself, before the trace reaches the hub. We don't use any third-party LLM for product logic ourselves.

Which compliance frameworks does it cover?

NIS2, ISO 27001, CIS Benchmarks, BE-Cyber. Mappings are open in compliance_control_mappings; you can add your own frameworks without a code change.

How do I get started?

curl -fsSL get.monsys.ai/install.sh | sudo bash on your first server. Create an account on app.monsys.ai. The first 5 agents are free.

Does one of these match you?

Five agents are free forever. No credit card, no time limit.