Within which Identity Protection menu would an administrator enableAuthentication Traffic Inspection (ATI)for a domain?
Falcon Identity Protection can continuously assess identity events and associate them with potential threatsWITHOUTwhich of the following?
How does Identity Protection extend the capabilities of existing multi-factor authentication (MFA)?
When an endpoint that has not been used in the last90 daysbecomes active, a detection forUse of Stale Endpointis reported.
Under which CrowdStrike documentation category could you find Identity Protection API information?
What trigger will cause a Falcon Fusion Workflow to activate from Falcon Identity Protection?
Which of the following IDaaS connectors will allow Identity to ingest cloud activity along with applying SSO Policy?
When creating an API client, which scope withWritepermissions must be enabled prior to using Identity Protection API?

Which of the followingBESTindicates that this user has an established baseline?
How many days will an identity-based incident be suppressed if new events related to the same incident occur?
Which option can be selected from the Threat Hunter menu to open the current Threat Hunter query in a new window as Graph API format?
The CISO of your organization recently read a report about the increased usage of identity brokers and is interested in finding a solution for the company. Which of the following makes Falcon Identity a valid solution for the organization?