Anomalies
Anomalies are actions or behaviors that exceed set thresholds in Threat Protection. While they do not always indicate malicious behavior, they should be investigated to determine their cause.
- About Anomalies
- About Anomalies
- About Anomaly Settings
- Adjust Sanctioned IT Anomaly Thresholds
- Anomaly Cloud Card
- Create Anomaly Exceptions
- Delete Anomaly Exceptions
- Export Anomalies to a CSV File
- View Anomaly Exceptions
- User Details Cloud Card on Anomalies
- User Details Page on Anomalies
- User Risk Score on Anomalies
- Frequently Asked Questions About Anomalies
- Custom Anomalies
- About Custom Anomalies
- Create a Custom Anomaly
- Activate and Deactivate a Custom Anomaly
- Delete a Custom Anomaly
- Include or Exclude a User from a Custom Anomaly Rule
- Configure Activity Count Rules
- Configure Device ID Rules
- Configure Device Rules
- Configure Location Rules
- Configure Source IP Rules
- Configure Source Rules
- Configure User Agent Rules
- About Custom Anomaly Incident