If using AD Query for seamless identity data reception from Microsoft Active Directory (AD),
which of the following methods is NOT Check Point recommended?
![PrepAway - Latest Free Exam Questions & Answers](https://www.briefmenow.org/img/pa5.jpg)
A.
Basic identity enforcement in the internal network
B.
Leveraging identity in Internet application control
C.
Identity-based enforcement for non-AD users (non-Windows and guest users)
D.
Identity-based auditing and logging