You are a security administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows 2000 Professional.
The company’s written security policy states the following requirements: All access to files must be audited. File servers must be able to record all security events.You create a new Group Policy object (GPO) and filter it to apply to only file servers. You configure an audit policy to audit files and folders on file servers. You configure a system access control list (SACL) to audit the appropriate files.
You need to ensure that the GPO enforces the written security policy. Which two additional actions should you perform to configure the GPO? (Each correct answer presents part of the solution. Choose two.)
A.
Set a manual retention method for the security log.
B.
Set the security log to retain entries for days.
C.
Set the maximum security log size to the maximum allowed size.
D.
Configure the GPO to shut down the computer if it is unable to log security audits.
E.
Ensure that users who are responsible for reviewing audit log data are granted the right to manage the security log.