Monitors system activity and sends alerts if any suspicious or unusual activity is detected
The will run in the background, collecting data on system resource usage, network activity, process activity, and other metrics. It could then compare this data to predefined thresholds or baseline values, and send alerts to the system administrator if any thresholds are exceeded or anomalies are detected.