Browsing: How are Security Audits Done by Continuous Security Monitoring Tools?