Most enterprises already monitor their networks. Dashboards track utilization. Alerts trigger when thresholds are crossed. Logs are collected in vast quantities.