home/glossary/network activity baseline

network activity baseline

nounid 3345·updated May 12, 2026
candidate

Establishing a trusted baseline document involves identifying the following: - network data points of interest - length of the baseline data collection period - methods and tools used to collect and store data Suggested network data points of interest include the following: - a list of predetermined devices a given workstation or server should communicate with - VPN usage, including access times, bandwidth and resources used, source IP addresses, and geolocation information - the known set of ports and protocols in use by the network - firewall and intrusion detection system logs - normal traffic patterns and flows.

MWE

Classifications

Entity Type

Artifact0%rule-basedmulti_axis_classifier_low_confidence.v1

Sensitivity

Internal68%llm-generatedllm:claude-haiku-4-5

Information Class

Cui75%llm-generatedllm:claude-haiku-4-5

Variants

synonym
network baseline
plural
network activity baselines
possessive
network activity baseline's
pluralpossessive
network activity baselines'

Framework definitions

NIST Cybersecurity Framework1 senseview framework →
§1
Establishing a trusted baseline document involves identifying the following: - network data points of interest - length of the baseline data collection period - methods and tools used to collect and store data Suggested network data points of interest include the following: - a list of predetermined devices a given workstation or server should communicate with - VPN usage, including access times, bandwidth and resources used, source IP addresses, and geolocation information - the known set of ports and protocols in use by the network - firewall and intrusion detection system logs - normal traffic patterns and flows.
FFIEC Cybersecurity Assessment Tool, Baseline, May 20171 senseview framework →
§1
Establishing a trusted baseline document involves identifying the following: - network data points of interest - length of the baseline data collection period - methods and tools used to collect and store data Suggested network data points of interest include the following: - a list of predetermined devices a given workstation or server should communicate with - VPN usage, including access times, bandwidth and resources used, source IP addresses, and geolocation information - the known set of ports and protocols in use by the network - firewall and intrusion detection system logs - normal traffic patterns and flows.
Federal Financial Institutions Examination Council (FFIEC) IT Examination Handbook Infobase, Glossary1 senseview framework →
§1
A base for determining typical utilization patterns so that significant deviations can be detected.

Outgoing relationships

No outgoing triples
This term is not the subject of any RDF-style relationship yet.

Incoming relationships

No incoming triples
No other term currently asserts a relationship to this one.