To view and manage user activity on the shared drive:
- Identify the purpose of the shared drive and the users’ access levels.
 - Establish rules and protocols for viewing and managing user activity.
 - Create a schedule for regularly tracking user activity.
 - Implement data security measures, such as two-factor authentication and encryption.
 - Audit user activity regularly to ensure compliance with established rules.
 - Run manual checks when necessary to identify unusual activity.
 - Review data collected from audits and manual checks.
 - Respond to any breaches of data security protocols.
 
