Watch this video on YouTube
The information security team has identified traffic from a device to a recognized malicious IP. What should be the team's initial action to address this issue?