Security teams want to understand their networks. Many fear that encryption will interfere with that goal. This presentation will examine how network security monitoring can adapt to serve security teams. Examples of logs from Corelight sensors and open source Zeek software will highlight JA3, HASSH, and more to characterize encrypted conversations. Learn how to make the network work for you!