Analyze outbound communications traffic at the external interfaces to the system and selected [interior points within the system where communications traffic is to be analyzed are defined;] to discover anomalies.
Supplemental
Organization-defined interior points include subnetworks and subsystems. Anomalies within organizational systems include large file transfers, long-time persistent connections, attempts to access information from unexpected locations, the use of unusual protocols and ports, the use of unmonitored network protocols (e.g., IPv6 usage during IPv4 transition), and attempted communications with suspected malicious external addresses.