How Do Threat Hunting Tools Find Outbound Connections?

Why You Can’t Monitor a 1 GB Connection With a 1 GB Span Port