You work as a network administrator at Bilco Engineering, Inc. You have recently received instruction to configure the servers hosting confidential data. The solution you are busy designing should require security related actions performed by an administrator that affects company servers to be logged. You are required to select which of the actions you would perform.
What should you do?
A.
The Security Configuration and Analysis snap-in should be run
B.
The Microsoft Baseline Security Analyzer should be used
C.
An IPSec policy should be created that requires IPSec encryption
D.
An audit policy should be created to track object access events on the required server