- Misconfigured systems.
- Hosts that have fallen off the radar of asset management.
- Systems compromised by opportunistic malware or other attacks by malicious software.
- Inappropriate or unauthorized access of sensitive data or resources from both internal and external parties; for example, detecting websites that should be blocked at the proxy server, but were not.