The document discusses anomaly detection and motivation for detecting anomalies in system monitoring. It notes that traditional monitoring looks for fixed rules and thresholds but behaviors can vary over time, services, and other factors. The key to anomaly detection is watching for differences between usual and unusual behaviors. Examples are given of applying anomaly detection to network traffic amounts and email spam rates to detect issues like DDoS attacks or misconfigured spam filters. Heuristics are suggested like only alerting if an anomaly persists for over 15 minutes to avoid false alarms from temporary spikes.