When using AD Query to authenticate users for Identity Awareness, identity data is received
seamlessly from the Microsoft Active Directory (AD). What is NOT a recommended usage of this
method?

A.
Leveraging identity in the application control blade
B. Basic identity enforcement in the internal network
C.
Identity-based auditing and logging
D.
Identity-based enforcement for non-AD users (non-Windows and guest users)
D)
0
0
{D}
0
0