Insiders are those users – be they employees, contractors, or partners – that already have access to the organization's network and resources. The threat is that these insiders may either accidentally or intentionally do something to harm the network, compromise resources, or leak private data. This report brings together passive listening and host analysis to assist with monitoring users on the network and combating insider threats.