Loading of illegal software packages onto a network by an employee is MOST effectively detected by: