Analyze data as part of security monitoring activities.
Examples: heuristics, trend analysis, endpoint, network, log review, impact analysis, security information and event management (SIEM) review, query writing, e-mail analysis, Sender Policy Framework, digital signature, embedded links