An administrator must configure a NetScaler system to be compliant with security policies
that require the Security Team to have the ability to provide the identity of all the connected
users. Which action could the administrator take to meet this requirement?

A.
Configure SNMP.
B.
Generate a Custom Report.
C.
Generate a Trace file.
D.
Configure an audit policy.