As an application or network owner, we should know who or what is accessing our network resources. If we do not know or do not keep track of our activity and instead just assume what is happening on the network, we cannot guarantee data security and the safety of end-users.
We need to start with the basics of security. This begins with understanding what's on our network.