A corporation has experienced several media leaks of proprietary data on various web forums. The posts were
made during business hours and it is believed that the culprit is posting during work hours from a corporate
machine. The Chief Information Officer (CIO) wants to scan internet traffic and keep records for later use in
legal proceedings once the culprit is found. Which of the following provides the BEST solution?