If using AD Query for seamless identity data reception from Microsoft Active Directory (AD), which of the following methods is NOT Check Point recommended?
A. Identity-based enforcement for non-AD users (non-Windows and guest users)
B. Basic identity enforcement in the internal network
C. Leveraging identity in Internet application control
D. Identity-based auditing and logging