2.7 List User Sessions

The User Sessions page provides information about sessions and enables easy access to key information regarding a session, such as the session information, device information, location information from where the user logged in, user activities associated with the session, rules, actions, and alerts triggered for the session.

The User Sessions page displays an overview of the events that transpired during a specific session, which enables investigators and customer care personnel to investigate for fraud detection.

Example

You see a session with a Risky IP alert and a Block authentication status. In your experience, this combination is indicative of a fraud attempt. This may be a case of stolen authentication credentials that you want to investigate. You open the details screen for this session to review exactly what occurred in this session.

To view User Sessions page, perform the following steps:
  1. Click the Application Navigation hamburger menu on top-left.
  2. Click Monitor User Sessions.
  3. From the menu, click the Session ID link of the session you are interested in.

The User Sessions page for that session is displayed.

The User Sessions page consolidates information needed for fraud detection.

It contains several panels that provide the information needed to investigate a session. They are as follows:

  • Session Information: Contains all the general information related to that session, such as the user name, last updated on date and time, and internal session ID.
  • Device Information: Contains information associated with the device that was used for the transaction, such as the device ID, device type, and the operating system.
  • Location Information: Contains all the related information regarding the location of the user. It shows the IP address, country, and state from which the user logged in.
  • User Activities: Contains information about the activity performed by the user. It shows you the action generated by the rule triggered for that activity and the time taken to execute the activity.
  • The last panel contains information about the rules that were triggered, action performed, and alerts triggered for the investigators.