User account menu

  • OneSpan.com
  • Trust Center
  • Login
  • English
  • Español
  • Français
Toggle navigation
  • Products
    • Intelligent Adaptive Authentication
      • Getting Started
      • Documentation
      • Code Share
      • Forums
    • Mobile Security Suite
      • Getting Started
      • Documentation
      • Code Share
      • Forums
    • OneSpan Cloud Authentication
      • Getting Started
      • Documentation
      • Code Share
      • Forums
    • OneSpan Identity Verification
      • Getting Started
      • Documentation
      • Code Share
      • Forums
    • OneSpan Sign
      • Getting Started
      • Documentation
      • Code Share
      • Forums
    • Risk Analytics
      • Getting Started
      • Documentation
      • Code Share
      • Forums
  • Documentation
    • Intelligent Adaptive Authentication
      • Guides
      • Interactive API Reference
      • Release Notes
      • Free Developer Sandbox
    • Mobile Security Suite
      • Guides
      • Release Notes
      • Free Developer Sandbox
    • OneSpan Cloud Authentication
      • Guides
      • Interactive API Reference
      • Release Notes
      • Free Developer Sandbox
    • OneSpan Identity Verification
      • Guides
      • Release Notes
    • OneSpan Sign
      • Guides
      • Interactive API Reference
      • Release Notes
      • Free Developer Sandbox
    • Risk Analytics
      • Guides
      • Interactive API Reference
      • Release Notes
      • Free Developer Sandbox
  • Forums
    • Intelligent Adaptive Authentication
    • Mobile Security Suite
    • OneSpan Cloud Authentication
    • OneSpan Identity Verification
    • OneSpan Sign
    • Risk Analytics
  • Demos
Search
Advanced Search
  1. Home
  2. Documentation
  3. Risk Analytics
  4. Guides
  5. Admin Guides
  6. Design Rules and Actions

Design Rules and Actions

Last modified: 2022-04-13

Design rules and actions

Via the DESIGN RULES & ACTIONS menu of Risk Analytics Presentation ServiceClosed A highly dynamic web interface that provides webpages for the user to intuitively interact with Risk Analytics. It is a Microsoft .NET 4.7.2 ASP.NET application hosted inside Microsoft Internet Information Services (IIS). you define a decision strategy to detect any behavior that is to be supervised and/or investigated. Defining a decision strategy involves:

  • Defining criteria to analyze risks.
  • Designing and organizing rulesClosed Rules are used to define sets of criteria to verify if an event (transaction and non-monetary event) matches any fraudulent behavior. If an event matches a previously defined rule, an alert can be raised. and combinations of rules against which events are matched.
  • Defining actions to be taken when an event has matched any of the defined rules.

Concept Information

Defining and Grouping Criteria to Manage Risks

Rule Management: Divisions and Campaigns

Rules Actions and Response Status

Delaying or Delegating Event Processing

Alerts Email Notification Configuration

Related Tasks

Auditing a Decision Path

Using Hot Lists

Design Rules and Actions

  • Design Rules and Actions
  • Defining and Grouping Criteria to Manage Risks
  • Rule Management: Divisions and Campaigns
  • Rules Actions and Response Status
  • The Create Rule and Action Wizard
  • Creating Basic Rules
  • Creating Rules with History Criteria
  • Creating Rules with Match Criteria and Match Keys
  • Creating Actions
  • Setting the Response Status
  • Toggling Items as Active
  • Auditing a Decision Path
  • Using Hot Lists
  • Managing Hot List Records within Rules
  • Using Hot Lists in Rules
  • Delaying or Delegating Event Processing
  • Alerts Email Notification Configuration
Was this information helpful?
  • Home
  • Products
  • Documentation
  • Forums
  • Demos
OneSpan

Footer menu

  • Getting Started
  • Products
  • Documentation
  • Forum
  • Contact Support
  • Partner Portal
  • Trust Center

OneSpan.com

Stay connected

  • Privacy Center
  • Cookie Policy
  • Terms of Use
  • Legal Notice
  • Preference Center

Copyright 2022 OneSpan. All Rights Reserved.

X

Log in

Two-step verification is required

Log in with Mobile Authenticator app

  • Create new account
  • Request new password
Haven’t registered yet? Register.