The following examples are included:
Privilege control
Safe search
Tenant control
UTM bypass
Customized SaaS application and user activity