Risk reports
Risk reports illustrate the comparison between the incoming device fingerprint and the registered device fingerprint for each risk score calculation. Each risk report contains the incoming device fingerprint that attempts to access a protected resource as compared to the registered device fingerprint. Analysis of each risk report provides the following information about the corresponding risk score calculation:
- Outcome of the risk score calculation.
- Matcher the risk engine used for the comparison between the device fingerprints.
- Attributes that were compared between the incoming fingerprint and the registered fingerprint.
- Other calculations that were made during the risk score determination.
The administrator can use risk reports to complete the following objectives:
- Write more effective risk profiles.
- Monitor system activity.
Parent topic: Risk management overview
Related concepts
Related tasks