a) Configure a group policy.
b) Implement file system security.
c) Implement auditing and logging.
d) Install a spyware scanner.