What should you do?
What should you do to audit any attempts by the users to open or manipulate the folder?
Which of the following tools should be used to achieve this functionality?