This section lists the commands monitored by the Collector because they have the potential to create dependencies.