Anomalies
Anomalies are actions or behaviors that exceed set thresholds in Threat Protection. While they do not always indicate malicious behavior, they should be investigated to determine their cause.
- Custom Anomalies
- About Custom Anomalies
- Create a Custom Anomaly
- Activate and Deactivate a Custom Anomaly
- Delete a Custom Anomaly
- Include or Exclude a User from a Custom Anomaly Rule
- Configure Activity Count Rules
- Configure Device ID Rules
- Configure Device Rules
- Configure Location Rules
- Configure Source IP Rules
- Configure Source Rules
- Configure User Agent Rules
- About Custom Anomaly Incident