The following examples are included:
Privilege control
Safe search
Tenant control
Advanced tenant control
UTM bypass
Customized SaaS application and user activity
Support control factors in exchanged JSON data for custom SaaS applications