Anomalies
Anomalies are actions or behaviors that exceed set thresholds in Threat Protection. While they do not always indicate malicious behavior, they should be investigated to determine their cause.
- Custom Anomalies
- About Custom Anomalies
- Create a Custom Anomaly
- Activate and Deactivate a Custom Anomaly
- Delete a Custom Anomaly
- Include or Exclude a User from a Custom Anomaly Rule
- Activity Type or Category Rules
- Activity Count Rules
- Device ID Rules
- Device Rules
- Location Rules
- Source IP Rules
- Source Rules
- User Agent Rules
- About Custom Anomaly Incident