Features

AUTOMATED COMPLIANCE

Pico Audit transforms the complex, manual burden of NIST SP 800-53 and JSIG RMF log reviews into a streamlined, secure, and automated process. Designed specifically for standalone Windows, RHEL, and Debian-based systems (Ubuntu, Kali).

πŸ“–

The Storyline Engine

Human-Readable Intelligence

Forget scrolling through thousands of cryptic Event IDs. Our proprietary engine ingests raw data and reconstructs a chronological, plain-English narrative.

  • Translation: Converts codes like Event ID 4624 into “User JSmith logged in successfully.”
  • Context Aware: Groups related events (e.g., USB insertion followed by file access).
  • Gap Detection: Algorithmically detects suspicious time gaps indicating tampering or power loss.
πŸ‘οΈ

Automated “Watcher”

Silent Continuous Monitoring

A lightweight background service running as a privileged process (LocalSystem/Root) to capture critical security events in real-time.

  • Logons: Tracks all successful and failed authentications.
  • Peripherals: Instantly detects USB/Optical mounts.
  • Integrity: Monitors protected files and audit log clearing.
  • Resource Efficient: Handles ~100MB logs/week without slowing hardware.
πŸ”

“The Vault” Archive

Chain-of-Custody Guaranteed

Automates the tedious task of log rotation and retention, ensuring you never lose data due to overwrites or negligence.

  • Auto Clearing: Configurable schedules to save & clear native OS logs.
  • Safety Net: Executes on next boot if a schedule is missed.
  • Tamper-Proof: Every archive is SHA-256 hashed immediately to prove chain of custody.
πŸ–₯️

Hardware Integrity

Know Your Baseline

Secure environments demand strict hardware control. Pico Audit helps you spot unauthorized changes instantly.

  • Baselining: Snapshots connected drives on first run.
  • Verification: Detects unauthorized Wi-Fi dongles or keyloggers on launch.
  • AV Monitoring: Reports “Last Definition Update” to catch air-gap drift.
πŸ“Š

Auditor Dashboard

Built for the ISSO

Designed to make the weekly audit review fast, accurate, and complete.

  • Role-Based: Only users in the ‘auditors’ group can launch the GUI.
  • Manual Checks: Integrated checklists for physical security (tamper seals, etc.).
  • Business Hours: Visual highlights for high-risk events outside operating hours.
πŸ“

One-Click Reporting

Audit-Ready Documentation

Generate a professional Evidence Report in seconds via our native PDF engineβ€”no third-party libraries required.

  • Digital Attestation: Includes auditor name, timestamp, and sign-off.
  • Full Scope: Summarizes automated events, manual checks, and notes.
  • Config Review: Validates 800-53 configuration settings.
πŸ›‘οΈ

Secure & Compliant Architecture

Trust No One. Verify Everything.

US-Based Code: Developed entirely in the USA with a strict supply chain policy. We are TAA Compliant.

Offline Licensing: A secure challenge-response licensing system that requires no internet connection, perfect for SCIFs and secure labs.

PLATFORM SUPPORT

Windows 10 (32/64-bit) & 11 (64-bit)
Linux RHEL 7/8/9/10, Ubuntu, Kali, Debian