Perform alarm validation on NMS/EMS and the device. Check utilization graphs and see if there is a trend in the utilization (known patterns – data backup causing high utilization) – check QoS configurations (if any) to show which classes of applications are impacted.