You have grounds for suspicion that someone using a domain user account may have accessed and altered private spreadsheets on one of your application servers.
To track file access and modification, you choose to enable auditing.
By using Group Policy, you can provide the files access to the Audit Object Access policy.
When you review the audit logs two weeks later, you discover that they are blank.
What explanation is most likely for this development?