2.5.1.3 Monitoring
After all of a company's assets have been configured and connected to a network, an IT administrator has to monitor the computers and their status. This monitoring activity is crucial for a number of reasons: to gather performance data and assess the efficiency of the company resources, to identify security breaches that malicious applications or unauthorized computers caused, to discover computer failures or other technical problems, to audit activity for legal reasons, and many other activities. The monitoring activity inherently collects dynamic data, either in real time or after storage and aggregation on the local computers.
Monitoring is a one-to-many operation with one WM application and many managed entities. The WM application can subscribe to updates of the managed computer's CIM resources, periodically query the state of CIM resources, or both.
The following diagram shows the monitoring interactions between the WM client and the WM server.

Figure 6: Monitoring use cases