Procedures for capturing and analyzing network traffic during security incidents.
Guide for using network traffic analysis to support incident investigation and threat hunting.
Plan network traffic capture strategy.
Capture relevant network traffic.
Perform initial traffic analysis.
Investigate suspicious traffic.
Document analysis findings.