You must perform 10 specific hardening tasks for MAC OS X or Windows. Choose anyone which suits you best. Once hardened, you must enable auditing in your newly secured OS. Steps for configuring auditing are available on the Internet for any OS you used.
1. Screen shots
2. Step-by-step instructions that looks like a security configuration manual for the OS (Keep it simple).
3. When auditing has been enabled you must interact with a small number of files to generate audit events. You will then produce a report from the OS’ auditing system which shows some of the actions your auditing policy captured (reads, writes, accesses, etc).