You are investigating a potential attack that deploys a new ransomware strain. You plan to perform automated actions on a group of highly valuable machines that contain sensitive information. You have three custom device groups. You need to be able to temporarily group the machines to perform actions on the devices. Which three actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.
A. Add a tag to the device group
B. Add the device users to the admin role
C. Add a tag to the machines
D. Create a new device group that has a rank of 1
E. Create a new admin role
F. Create a new device group that has a rank of 4