which of the following methods is NOT Check Point recommended?

If using AD Query for seamless identity data reception from Microsoft Active Directory (AD), which
of the following methods is NOT Check Point recommended?

If using AD Query for seamless identity data reception from Microsoft Active Directory (AD), which
of the following methods is NOT Check Point recommended?

A.
Identity-based enforcement for non-AD users (non-Windows and guest users)

B.
Basic identity enforcement in the internal network

C.
Leveraging identity in Internet application control

D.
Identity-based auditing and logging



Leave a Reply 3

Your email address will not be published. Required fields are marked *


Vlad

Vlad

Yes as A is Browser based authentication AKA Captive Portal

CP_R77_IdentityAwareness_WebAdminGuide

Esteban

Esteban

A. Identity-based enforcement for non-AD users (non-Windows and guest users)