Risk Triggers
| Risk Trigger | Description | Examples |
|---|---|---|
| Device | Anomalies related to the device being used by a particular user, including device fingerprints, device environments, and cookies |
|
| Network | Anomalies associated with network identifiers from where the user makes a connection |
|
| Location | Anomalies associated with the location of the user |
|
| Behavior | General anomalies in the behavior and visitation patterns of a user |
|