A company's network security team has observed unusual outbound traffic patterns on their network. Upon investigation, the team discovers that these patterns coincide with the exfiltration of sensitive data. Which of the following features of a SIEM solution would most effectively aid the security team in detecting and preventing such unauthorized data transfers in the future?
Configuring notifications for anomalous activities based on predefined thresholds and patterns
Implementing automated asset tracking for all network-connected devices
Correlating events from different security appliances to identify patterns
Extending log retention policies to store a larger amount of historical data