Risk Triggers
Risk Trigger | Description | Examples |
---|---|---|
Device | Anomalies related to the device being used by a particular user, including device fingerprints, device environments, and cookies |
|
Network | Anomalies associated with network identifiers from where the user makes a connection |
|
Location | Anomalies associated with the location of the user |
|
Behavior | General anomalies in the behavior and visitation patterns of a user |
|
Updated 12 days ago