Discuss the configuration and activation of auditing for files, users or other system objects to help technical personnel recognize, diagnose, deter and/or work to prevent attempts to compromise or break into a computer network.
this second question
Complete the main portion of this assignment as outlined below.
Briefly describe how the following tools are used:
Event viewer
Authority delegation
Update services
Describe 1 scenario in which each tool would be used.