Flow Directionality Support : Part 1 When the security team identifies a suspicious activity, they often turn to NetFlow or IPFIX first to gain insight into how the bad actor...