Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.

5.4.2. Voice, Video, and Collaboration Security

💡 First Principle: You cannot defend what you cannot see. Network security monitoring provides visibility into traffic patterns, anomalies, and attack signatures — the telemetry that enables detection of attacks that have bypassed preventive controls. In a world where breaches are often measured in months before detection, monitoring is the control that determines how quickly you discover and respond.

Traffic capture and analysis:
Tool/MethodWhat It DoesData CapturedSecurity Use
Packet capture (PCAP)Full packet capture at specific pointsAll traffic including payloadsDeep forensic analysis; full content inspection
NetFlow / IPFIXTraffic metadata only (no payloads)Source, destination, port, bytes, durationTraffic pattern analysis; anomaly detection; high volume feasible
SPAN / port mirroringSwitch port that mirrors traffic to capture deviceAll traffic on monitored portsIDS/IPS placement; protocol analysis
Network TAPPhysical device that copies traffic passivelyAll traffic; even duplex separatelyReliable full capture without switch config
SIEMAggregates logs and events from multiple sourcesLog events, not packetsCorrelation across systems; alert generation
Key network monitoring metrics:
MetricWhat It Reveals
Bandwidth utilizationUnusual spikes may indicate DDoS or large data exfiltration
Connections per secondPort scans, SYN floods generate high connection rates
DNS query volumeSpikes to unusual domains suggest C2 or DNS tunneling
Unusual port usageC2 over non-standard ports; data exfiltration on unusual ports
Geographic anomaliesConnections from unexpected countries for user accounts
Protocol anomaliesHTTP over non-standard ports; large DNS TXT responses
Time-of-day anomaliesAuthentication at 3am for user who normally works 9-5
Security information and event management (SIEM):

SIEM aggregates log data from multiple sources (firewalls, IDS, servers, endpoints, cloud) and applies correlation rules to detect multi-step attacks that individual point tools miss. A single failed login is noise; 500 failed logins across 50 accounts from the same IP is a password spray attack — visible only when logs are aggregated and correlated.

SIEM capabilities:

  • Log aggregation and normalization from diverse source formats
  • Real-time correlation rules (if event A and event B occur within time window → alert)
  • Historical analysis and threat hunting
  • Incident response workflow integration
  • Compliance reporting (evidence of monitoring for HIPAA, PCI, SOX)

SIEM challenges:

  • Data volume: enterprises generate terabytes of logs; storage and processing are expensive
  • Alert fatigue: too many rules → too many alerts → analysts ignore alerts
  • Skill requirement: effective correlation rule writing requires deep security and business context
Full Packet Capture (FPC) vs. metadata:

For most network monitoring, NetFlow/IPFIX metadata is sufficient and scalable. Full packet capture is reserved for: forensic investigation of specific incidents, compliance with specific legal requirements, and high-security environments with the storage infrastructure to support it. Capturing everything generates enormous data volumes and creates privacy/legal concerns.

⚠️ Exam Trap: NetFlow captures metadata — source, destination, port, bytes, duration — not packet payloads. It can detect that a workstation made 10,000 connections to an external IP on port 443 (suspicious), but it cannot tell you what data was transmitted (payload content). For content inspection, you need NGFW with TLS inspection, or full packet capture with decryption keys. The exam tests whether you understand this distinction when asked what type of monitoring would reveal specific evidence.

Reflection Question: A forensic analyst is investigating a suspected insider data theft incident. They have NetFlow data showing large volumes of outbound traffic to a personal cloud storage service from the suspect's workstation. What can they conclusively determine from NetFlow alone, what can they not determine, and what additional evidence source would provide the content-level proof needed for a disciplinary or legal proceeding?

Alvin Varughese
Written byAlvin Varughese
Founder15 professional certifications