Understand how Active Directory data is used in associated apps after integration.
| Feature | Associated App | Description | 
| Data Synchronization | Email Asset Inventory | Email Asset Inventory uses Active Directory
                                 data to manage Email Sensor on protected email accounts. | 
| Phishing Simulation Assessment | Phishing Simulation Assessment uses Active Directory data to add recipients to phishing simulations and identify
                                 employees who require additional Security Awareness Training education. | |
| Cyber Risk Exposure Management | Cyber Risk Exposure Management uses Active
                                 Directory data to gain deeper insight regarding the apps and devices your users
                                 access, and the behaviors that contribute to users' risk analysis. | |
| Zero Trust Secure Access | Zero Trust Secure Access uses Active Directory data to
                                 authenticate users and perform Zero Trust actions for Private Access and Internet
                                 Access. | |
| User Accounts | User Accounts uses Active Directory data
                                 to create user accounts using the distribution list email addresses and member
                                 names. | |
| Identity Security | Identity Security uses Active Directory data to discover identity assets, providing you a comprehensive
                                 and centralized inventory of identities in your organization. | |
| Security Event Forwarding | Cyber Risk Exposure Management | Cyber Risk Exposure Management uses Active
                                 Directory security event information to gain deeper insight regarding the security
                                 of the Active Directory server. | 
| Zero Trust Secure Access | Zero Trust Secure Access uses Active Directory security
                                 event information to monitor user sign in activity. | |
| Identity Security | Identity Security uses Active Directory security event information to detect identity-related threats
                                 in your IAM environment, and forwards these events to Workbench for centralized visibility and investigation. | |
| User Access Control | Observed Attack Techniques | Perform policy enforcement actions in Active Directory, such as disabling user accounts
                                 and forcing password reset. | 
| Cyber Risk Exposure Management | ||
| Search | ||
| Workbench | ||
| Zero Trust Secure Access | 
 
		