If using AD Query for seamless identity data reception from Microsoft Active Directory (AD),
which of the following methods is NOT Check Point recommended?
A.
Basic identity enforcement in the internal network
B.
Leveraging identity in Internet application control
C.
Identity-based enforcement for non-AD users (non-Windows and guest users)
D.
Identity-based auditing and logging