. . . . "These systems and applications include web servers, firewalls, proxy servers, log servers, intrusion detection software systems, routers and any other device or application which can be considered a part of the enterprise information system infrastructure. [0012] The present invention accomplishes its tasks by monitoring and archiving in a central database changes made to systems." . . .