This document provides guidelines on conducting internal investigations related to network security, focusing on issues like misuse of company resources and intrusion detection. It outlines steps for initial responses, proactive collection methods, and network analysis techniques, including auditing and capturing network traffic. Procedures for dealing with data exports, malicious software, and gathering logs from routers and switches are also discussed.