Reconnaissance is commonly used by cyberattackers to identify an opening any weakness that will allow them to bypass an organization’s security controls to access and exfiltrate data, hold assets hostage for ransom or even sabotage systems. During reconnaissance, adversaries avoid activities that will trigger security alarms. Most organizations rely on reactive attack detection and response tools, they are often unable to identify reconnaissance activity. How do we avoid adverse effects of Reconnaissance