2.6 List User Activity Rules
Any operation performed by the user that requires monitoring can be termed as User Activity. For instance, logging in, user transaction's like retail banking, credit card based activity, and so on.
OARM provides an out-of-the-box user activity called User Authentication with a rich set of prepackaged rules that evaluates the user activity to detect commonly found threats and take remedial actions and raise alerts.
To view the User Activity rule list, perform the following steps:
- Click the Application Navigation hamburger menu on top-left and click Adaptive Risk Management.
- From the User Authentication tile, click the Rules link.
User Activity
Elements | Description |
---|---|
Select User Activity | Provides a list of user activities, both User Authentication and custom. |
Rule Outcome | Provides a list of rule types based on the outcome, such as Block , Allow , Challenge , and All .
|
Search Rule | Allows you to search a rule based on the specified text. |
Add New Rule | Allows you to create a new rule. |
Active | Specifies whether the rule is active or not. |
Details | Displays information about a rule. |
Edit | Allows you to edit a rule. |
Delete | Allows you to delete a rule. |