You are a desktop support technician for your company. The manager of the sales department reports that unauthorized users are making changes to several sales files located on a Windows Server 2003 file server named FS01. She has configured the appropriate permissions and file auditing on the files. However, no audit information is generated on the server when users access the files.
You confirm that the manager has the ability to modify file permissions and auditing settings on the sales
files. You also confirm that the manager has access to the correct logs to review audit information.
You need to ensure that all access to the sales files is tracked.
What should you do?
A.
Instruct the manager to audit only successful file access to the sales files on FS01.
B.
Instruct the manager to create a file for the security log on FS01.
C.
Ask an administrator to enable auditing on FS01.
D.
Increase the security log size on FS01.