If using AD Query for seamless identity data reception from Microsoft Active Directory (AD), which
of the following methods is NOT Check Point recommended?
A.
Identity-based enforcement for non-AD users (non-Windows and guest users)
B.
Basic identity enforcement in the internal network
C.
Leveraging identity in Internet application control
D.
Identity-based auditing and logging
A
Yes as A is Browser based authentication AKA Captive Portal
CP_R77_IdentityAwareness_WebAdminGuide
A. Identity-based enforcement for non-AD users (non-Windows and guest users)