A company has implemented a centralized proxy to manage web traffic. Which of the following tasks would MOST effectively utilize the proxy to enhance the organization's security posture?
Allowing users to tunnel web traffic through SSH to enhance encryption.
Inspecting and logging web traffic for analysis and compliance.
Configuring automatic backups of user data every 24 hours.
Restricting all users' access to the control panel on their respective machines.