An administrator suspects that files are being copied to a remote location during off hours. The file server does not have logging enabled. Which of the following logs would be the BEST place to look for information?
A.
Intrusion detection logs
B.
Firewall logs
C.
Antivirus logs
D.
DNS logs