Enabling security and auditing logs should be completed according to the specific operating system and computer manufacturer specifications and include