Abuse Info
Please refer to the abuse info section in the edge documentation for the specific privilege granted.Opsec Considerations
Please refer to the OPSEC section in the edge documentation for the specific privilege granted.Edge Schema
Source: User, Group, ComputerDestination: AIACA, CertTemplate, Computer, Container, Domain, EnterpriseCA, Group, GPO, IssuancePolicy, NTAuthStore, OU, RootCA, User
Traversable: Yes