Anomalies
-
- Last UpdatedNov 06, 2024
- 3 minute read
Data Risk Analytics detects anomalous activity based on a baseline learned from the audit data it receives. If the activity is suspicious, but not enough to deem an incident, it is displayed in the Open Anomalies page. You can then perform all actions available for incidents (e.g. investigate, star, search, filter, etc.) except for Allow List rules.
An anomaly, in contrast to an incident, is a suspicious activity that is not categorized by severity. It is another piece of information that can be attributed to an employee, and in conjunction with their incidents, lets you asses the risk they might pose.
The Open Anomalies page aggregates all detected suspicious activities in table format. It shows general details on each open anomaly.
General details shown for each anomaly include:
Anomaly Details
When you click on an anomaly in the table, you are shown a more comprehensive details page about the anomaly. In addition to the details, you can perform all actions available for incidents, except Allow List rules.
Comprehensive details include:
Comprehensive Anomaly Details