Your organization plans to implement CrowdStrike to streamline identity management and secure access to cloud-based applications. The goal is to integrate with an existing Identity-as-a-Service (IDaaS) provider that already manages user authentication and role-based access. Which connector type should you configure to achieve this integration effectively?
You are using Falcon Identity Protection to monitor the behavior of users and detect potential identity-based threats. Which of the following correctly describes the primary focus of the Monitor menu within Falcon Identity Protection?
Your organization conducts weekly risk reviews, and the security team needs an automated report summarizing "Anomalous Logon Activities" for all privileged accounts. The report should be scheduled to run every Friday and emailed directly to the team. What configuration should you use to schedule the custom report to meet these requirements?
Your organization has recently experienced a series of phishing attacks targeting users in multiple domains. You are tasked with updating the "Goal" in the Domain Security Overview of CrowdStrike's Identity Protection platform to better address this threat. Which goal should you select?