Hasad is the system administrator for a marketing company. The company stores sensitive data in a folder named Assets on the company's network drive. Hasad is asked to identify the users who access the files within the folder or make changes to them.

Which of the following steps should Hasad take to track all the activity within the folder Assets?