Your organization recently implemented CrowdStrike Falcon Identity Protection. A team member asks how it integrates with your existing MFA provider. What is the primary way Falcon Identity Protection extends the capabilities of an existing MFA provider?
You are tasked with generating a custom report in CrowdStrike to assist in planning a risk mitigation strategy. The report must focus on accounts exhibiting high-risk behaviors, such as excessive failed logins or abnormal activity patterns. Which configuration would best achieve this goal?