Servers are actively monitored for known attack vectors, suspect traffic and indications of compromise.