the desktop machine was cleaned, and the network was scanned for viruses and no other data was found. the firewall is configured to block bit torrent traffic, but the helpdesk technician was able to circumvent the block using a vpn provider. what solution could be implemented to detect this type of user behavior before it becomes problematic?