During routine monitoring, a security analyst discovers unexpected outbound traffic to an unknown network location. Which of the following artifacts would best serve as an Indicator of Compromise (IoC) for further investigation?
Scheduled maintenance reported by IT
Outbound connections to unknown network locations
Authentication logs showing successful logins
Regularly updated antivirus definitions