Please read the following recommendations to use the Control Centre of the antifraud system in the most effective way.
Customizable Dashboard is the main module of the Control Centre, examine the sections with pre-defined widgets carefully.
After that, tailor the Dashboard to your needs: configure, add, remove, or reposition widgets in different sections. Or you can use the upper section (the Summary section) for all customization. As a result, the Dashboard should allow you to monitor all critical fraudulent traffic metrics in the most convenient way, giving you the ability to take prompt and effective actions.
We recommend keeping the blocking action set to 'Reject calls' for all fraud types to block fraud preparations in your traffic and thus prevent fraud attacks before they happen.
Due to the extremely low number of false alarms, we highly recommend keeping the blocking action set to 'Break and block calls' for all fraud types you want to eliminate from your traffic.
A blockage window should be long enough to ensure that fraudsters do not resume their activity after the blockage is expired.
Do not mute alerting to stay informed about major fraud attacks.
Set a few usage thresholds (ranging from low to critical severity) for a given parameter, for the same destination or country, to monitor the changes. Set the blocking action to 'None', but use 'Unmuted' as the alerting option. This will help you understand the usage of your clients without negatively affecting the traffic.
Keep in mind that the block list is prioritized over the allow list.
Avoid excessive blocklisting of numbers and number ranges.
Remember that fraud attacks:
On the other hand, the block lists are static, meaning that the blocklisted numbers or number ranges will remain blocked until your fraud management team decides to remove them from the block list. Additionally, the block list for A-numbers/number ranges (as well as the block list for B-numbers/number ranges) uses only one side for blocking.
This is why the use of other protection methods is more desirable.
Keep in mind that the allow list has a lower priority than the block list.
Do not allowlist your verification/authentication service A-numbers; otherwise, the antifraud system will not protect them from calls to fraudulent numbers.