

In most cases, alerts for suspicious activity are based on IP addresses. Windows user account from Kerberos trafficĪny host generating traffic within your network should have three identifiers: a MAC address, an IP address, and a hostname.Device models and operating systems from HTTP traffic.

