A company's network security team has observed unusual outbound traffic patterns on their network. Upon investigation, the team discovers that these patterns coincide with the exfiltration of sensitive data. Which of the following features of a SIEM solution would most effectively aid the security team in detecting and preventing such unauthorized data transfers in the future?
Configuring notifications for anomalous activities based on predefined thresholds and patterns
Correlating events from different security appliances to identify patterns
Implementing automated asset tracking for all network-connected devices
Extending log retention policies to store a larger amount of historical data