The company wants to evaluate making all business office users administrators on their client computers.
You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?
A.
On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policy.
B.
On all client computers, implement logon auditing for all user account logons.
C.
On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policy.
D.
On all domain controllers, implement logon auditing for all user account logons.