Quiz 70-640, TS: Windows Server 2008 Active Directory, Configuring
What should you do?
What should you do to audit any attempts by the users to open or manipulate the folder?
Which of the following tools should be used to achieve this functionality?