During network monitoring, an analyst observes periodic, predictable network traffic from a specific internal device to an external server. Which action should the analyst prioritize to identify if this is an indicator of beaconing?
Check if the traffic is using non-standard ports.
Analyze the packet contents to check for signs of malicious communication.
Validate the reputation of the external server.
Ignore the traffic since it is periodic and predictable.