When using AD Query to authenticate users for Identity Awareness, identity data is received seamlessly from the Microsoft Active Directory (AD). What is NOT a recommended usage of this method?
A.
Leveraging identity in Internet application control
B.
Identity-based enforcement for non-AD users (non-Windows and guest users)
C.
Identity-based auditing and logging
D.
Basic identity enforcement in the internal network
B
source:https://sc1.checkpoint.com/documents/R76/CP_R76_IdentityAwareness_AdminGuide/62007.htm