1. Capture Strategy and Scoping
$ core idea: Before starting a capture, define the question. Are you troubleshooting a broken connection, validating an alert, or gathering evidence of potential exfiltration? The question determines where to capture, how long to run, and what filters to apply. Capturing without a question produces large, unwieldy files that slow analysis.
$ defender angle: Capture filters reduce volume at collection time; display filters narrow analysis after the fact. Use them intentionally. An overly narrow capture filter can permanently exclude evidence you need later — you cannot recover packets that were never written to disk.
$ prove understanding: Capture traffic safely and understand capture scope limitations.