While monitoring network traffic, you notice an unfamiliar MAC address communicating with several internal systems. Upon investigation, you determine the device is not authorized and is not following standard security protocols. What should your next step be?
Isolate the device from the network
Monitor the device for more activity
Gather information about the device
Notify the network team for further instructions