Report
Instructions for configuring the Business Anomaly detection model.
On the main Business Anomaly screen, in the Anomaly Groups list, when clicking on the line of the desired group, as highlighted below:

The system will display a screen with details of the registered anomaly group, where the following information will be displayed:
Number of Enabled Models: Number of models enabled for the selected anomaly group.
Anomalies from the last report: Number of anomalies presented in the last report.
Total Deviations: Total value of the deviation in dollars.

In addition to a report that can be filtered by a specific period, as highlighted below:

And an anomaly report for each day in the filtered period, containing the day, number of anomalies detected, number of models Infringed and the total deviations in dollars.

Action: For each day in the report, the system allows you to download the report, in CSV format, by clicking on the "
" icon, as highlighted below:

For each line of the report, click on the line corresponding to the desired day, as highlighted below:

The system will display a detailed screen of the anomalies identified for the specific day, containing the following information:
Number of Enabled Models: Number of models enabled for the anomalies of the respective day.
Anomalies found: Number of anomalies identified on the respective day.
Total Deviations: Total value of the deviation in dollars.

In addition to a report that allows you to view anomalies marked as verified or not, by clicking on the option highlighted below:

And an anomaly report, containing the main key, the violated models and the total deviations in dollars.

Verified: In the verified column, the system allows you to see whether that anomaly is already marked as verified or not, in addition to allowing you to flag it as verified by clicking on the "
" icon, if necessary:

On the screen displayed, enter the Classification:
Anomaly: Behavior outside the expected pattern.
False Positive: Alert generated by something legitimate identified as a threat.
Expected Behavior: When it is a behavior that is different from normal, but expected by the system due to a specific moment/event.
Enter the Description and then click the Save button.

Action: For each anomaly, clicking on the "
" icon, as highlighted below:

The system allows you to open the view generated in the Workspace and make adjustments, if necessary:

Clicking on the line corresponding to the desired anomalies, as highlighted below:

The system will open a detailed description of the anomaly containing the following information:
Details:
Main key;
Main key value;
Status.
Infringed Models:
Models;
Expected Cost;
Increase in dollar ($)
Percentage Increase (%)
In addition to notes containing the classification of the anomaly.

Last updated