This document provides an overview of network audit and monitoring techniques. It discusses examples of network activities that are often overlooked, including discovering DDOS agents, harassing emails, rogue servers, and system administrator misuse. The document outlines recommendations for audit and monitoring goals, enablers like logs and packet sniffers, and trends in audit and monitoring tools.