Explanation: 1. Create a policy to capture the privilege used by a user for privilege analysis. 3. Start analyzing the data captured by the policy. 6. Stop analyzing the data. 2. Generate a report with the data captured for a specified privilege capture. 5. Compare the used and unused privileges’ lists. 4. Revoke the unused privileges.