You are an administrator at the Contoso Corporation. You have had several reports that the computers of users who are traveling have been hacked and accessed without the users' knowledge. So what can you do to ensure that the system is secure that would prevent these types of access while out of the office, but allow full access when at work.