A. Grant all registered employees access to each machine.
B. Restrict device access to only the user to whom the laptop is assigned.
C. Limit device access to departments and guest users.
D. Give each team member a USB drive that bypasses the reader to allow guest users to log in.