Linux.com has a short review of Auditor. Includes a good walkthrough of instances where Auditor can be used.
Many security engineers arrive on a client’s site and find that the network documentation required for solving the task properly is incorrect or even obsolete.