Which feature of the CrowdStrike Identity Analyzer enables administrators to determine the last time a specific user changed their password across the cloud infrastructure?
When analyzing cloud findings for misconfigurations, which of the following would be considered a high-risk practice that should be flagged for remediation?