Content deleted Content added
Reverting edit(s) by 2600:1700:9E58:B000:A9BC:E4D4:85EC:6A32 (talk) to rev. 1157711980 by LR0725: Unexplained content removal (RW 16.1) Tags: RW Undo Disambiguation links added |
No edit summary Tags: Reverted Visual edit Mobile edit Mobile web edit |
||
Line 28:
* Analyze network problems
* Detect
* Detect network misuse by internal and external users
* Documenting regulatory compliance through logging all perimeter and endpoint traffic
* Gain information for effecting a network intrusion
* Identify data collection and sharing of software such as operating systems (for strengthening
* Aid in gathering information to isolate exploited systems
* Monitor WAN bandwidth utilization
* Monitor network usage (including internal and external users and systems)
* Monitor
* Monitor WAN and
* Gather and report network statistics
* Identify suspect content in network traffic
* Troubleshoot performance problems by monitoring network data from an application
* Serve as the primary data source for day-to-day network monitoring and management
* Spy on other network users and collect sensitive information such as login details or users cookies (depending on any content
*
* Debug
* Debug network protocol implementations
* Verify adds, moves, and changes
* Verify internal control system effectiveness (
Packet capture can be used to fulfill a warrant from a
==Notable packet analyzers==
|