Network traffic analysis could reveal patterns of compromise if devices attempt to access unusual targets or resources.
Application vetting may be able to identify applications that perform Discovery or utilize existing connectivity to remotely access hosts within an internal enterprise network.
| Data Component | Name | Channel |
|---|---|---|
| Network Traffic Content (DC0085) | Network Traffic | None |
| Network Communication (DC0113) | Application Vetting | None |
Network traffic analysis could reveal patterns of compromise if devices attempt to access unusual targets or resources.
Application vetting may be able to identify applications that perform Discovery or utilize existing connectivity to remotely access hosts within an internal enterprise network.
| Data Component | Name | Channel |
|---|---|---|
| Network Traffic Content (DC0085) | Network Traffic | None |
| Network Communication (DC0113) | Application Vetting | None |