Answer:
The investigation would begin with the IT infrastructure itself while concurrently monitoring the employee usage. During the monitoring of the IT infrastructure, we would examine the setup of the Group Policy and what permissions, if any the individual employees have, does the system update automatically, how often are backups made. In addition, how are managers utilizing their logons; are they using their master manager logon, have they created users specific to group policy, Windows Update Services, and Microsoft Deployment Services. When evaluating employee usage, we would look at the type of sites they are able to access due to company policies that are in place, will an employee readily click on a link in an email to be brought to an outside source?
Step-by-step explanation: