Skip to main content

Risk Intelligence dashboard

The Risk Intelligence dashboard provides detailed risk engine analytics for authentication events. Use it to monitor Level of Assurance (LoA) scores, track friction rates, see how individual risk analyzers (IP, browser fingerprint, location, ML anomaly) score each authentication, and detect credential stuffing patterns. Data updates hourly.

For authentication system health and MFA adoption metrics, see Authentication Summary. For threat alerts like leaked credentials and failed login spikes, see Risk Insights.

The dashboard is organized into two tabs:

  • Overview shows authentication activity, risk quality indicators, geographic distribution, anomaly detection trends, and a transaction log.
  • Risk Assessment shows risky users, IPs, burst login detection, and credential stuffing patterns.

Overview tab

Risk and authentication overview

Eight summary cards show risk engine activity at a glance.

CardDescription
Total UsersTotal number of unique users in the risk engine, regardless of the selected time filter.
Active UsersNumber of unique active users in the risk engine during the selected time range.
Successful AuthsAuthentications completed successfully where auth and post-auth steps executed and the user security posture was updated.
Incomplete AuthsAuthentications missing the post-auth call. The user security posture was not updated.
Cutoff AuthsAuthentications where a cutoff rule (such as a red flag) was triggered, forcing the LoA to 0 regardless of other analyzer scores.
Missing Device FingerprintAuthentications without a captured device fingerprint. Missing device data can lower LoA and increase friction.
Low LoA AuthAuthentications with a LoA score below the threshold.
Connected ApplicationsTotal number of applications integrated with the risk engine.

Why it matters: A quick snapshot of risk engine coverage. A high number of incomplete auths or missing device fingerprints may indicate integration issues that reduce risk evaluation accuracy. Cutoff auths show how often risk rules are forcing LoA to zero, which may warrant policy review. Low-LoA auths highlight authentications that fell below the confidence threshold.

When to check: At the start of each security review, or when investigating a spike in blocked authentications.

Risk and authentication overview cards

Risk quality indicators

Three gauges show key risk engine health metrics.

IndicatorDescription
Avg Friction RatePercentage of authentication attempts that required additional verification (step-up) during the selected time range.
Avg Level of Assurance (LoA) RateThe average Level of Assurance across authentication events in the selected time range.
Total Login Attempts RateTotal number of authentication attempts during the selected time range.

Why it matters: These three metrics together tell you whether your authentication security is balanced. A declining LoA with rising friction means growing risk and more users being challenged. Monitor these after policy changes to measure their impact.

When to check: Regularly as key security metrics, and after any policy or configuration changes that affect authentication flows.

Risk quality indicator gauges showing friction rate, LoA rate, and total login attempts

Geographic activity

A world map and ranked country list show where authentication events are coming from.

What it shows: The map displays login distribution by country with shaded regions indicating activity volume. The Top countries by login attempts table beside it ranks countries by authentication count.

Why it matters: Helps you visualize the geographic distribution of authentication activity and spot unexpected regions. If you see significant traffic from countries where you have no users, investigate further.

When to check: During security reviews, or when investigating geographic patterns in risky authentication activity.

Geographic activity map and top countries table

Anomaly detection

Six time series charts track risk analyzer behavior and authentication patterns over the selected time period.

Authentication Distribution Over Time Shows authentication attempts where the calculated LoA was 75 or above, allowing the user to authenticate without additional MFA. Use it to track how many authentications pass the frictionless threshold over time.

Browser Fingerprint Analyzer
Distribution of browser fingerprint analyzer risk scores during the selected time range.

IP Analyzer
Distribution of IP analyzer risk scores during the selected time range.

Location Analyzer
Distribution of location analyzer risk scores during the selected time range.

ML Group Based Time Anomaly
Distribution of ML group-based time anomaly risk scores during the selected time range.

Level of Assurance (LoA) Distribution Over Time
Shows how authentication events are distributed across different LoA ranges over time. Higher LoA values indicate stronger authentication confidence. Events are grouped into buckets: below 10%, 10-50%, 50-75%, and 75% or above.

When to check: When investigating why LoA scores are changing, or when troubleshooting risk engine behavior after policy updates.

Anomaly detection time series charts

Authentication breakdown

Three charts show the distribution of authentication methods, platforms, and applications.

Auth Methods
Distribution of successful authentications by authentication method (such as password, SSO, or MFA) during the selected time range.

Platforms
Distribution of successful authentications by device platform (such as Windows, iOS, or Android) during the selected time range.

Applications
Distribution of successful authentications by application during the selected time range.

When to check: When reviewing which authentication methods and platforms are most common in risk-evaluated sessions, or when investigating whether a specific method or platform correlates with lower LoA scores.

Authentication breakdown showing auth methods, platforms, and applications

Authentication transactions

A paginated table showing individual authentication events with full details.

ColumnDescription
DateWhen the authentication event occurred.
UserThe user ID associated with the event.
ApplicationThe application identifier.
Level of AssuranceThe overall LoA score for the event.
MethodThe authentication method used (PUSH, SYMBOL_PUSH, TOTP, and others).
IPThe source IP address of the authentication attempt.
CountryGeographic location of the login attempt.
Risk IndicatorsSpecific risk signals detected, such as KNOWN_USER_IP_USED_BY_MANY_USERS, LOCATION_CITY_CHANGED, or LOCATION_COUNTRY_CHANGED. Displays a dash when no risk indicators are present.
Analyzer ScoresIndividual scores from each risk analyzer: AuthMethod, BehaviourSignal, MlKtg, MlKtu, DBFP, IP, and Location. Scores of -1.00 indicate the analyzer was not computed for that event.

Why it matters: Provides full visibility into individual authentication events for investigating specific incidents or auditing authentication activity.

When to check: When investigating specific users, IPs, or risk events flagged in other dashboard sections.

Authentication transactions table

Risk Assessment tab

Risk assessment overview

Four summary cards show the current threat landscape.

CardDescription
Risky UsersNumber of users with more than 10 low-LoA authentication events during the selected time range.
Burst Login UsersNumber of users with more than 10 logins within a 5-minute window, indicating potential brute-force behavior.
Credential Stuffing PairsNumber of user and IP combinations with more than 8 logins in a 5-minute window, indicating credential stuffing patterns.
New DevicesTotal number of new device detections during the selected time range.

When to check: Daily as part of security operations to get a quick threat summary.

Risky auth indicators

A horizontal bar chart showing which risk indicators are triggered most often.

What it shows: Breakdown of risky authentications by risk indicators triggered during the selected time range, such as:

  • KNOWN_USER_IP_BUT_USED_BY_OTHERS - A known user's IP is being used by other accounts.
  • KNOWN_USER_IP_USED_BY_MANY_USERS - The IP address is shared across many user accounts.
  • LOCATION_STATE_CHANGED - The user's state or region changed between authentication events.
  • LOCATION_CITY_CHANGED - The user's city changed between authentication events.
  • LOCATION_COUNTRY_CHANGED - The user's country changed between authentication events.
  • LOCATION_CHANGE_NOT_SIGNIFICANT - A location change was detected but was not significant enough to flag as risky.

Why it matters: Shows the most common threat types affecting your environment. A high count of shared-IP indicators may suggest NAT or proxy usage, while frequent location changes may indicate account compromise or travel.

When to check: When tuning risk policies, or when investigating the types of threats targeting your applications.

Top 10 IPs with low LoA auths

Top 10 IP addresses with the lowest Level of Assurance during the selected time range.

Why it matters: Risky IPs may indicate botnets, proxy networks, or compromised infrastructure being used to attack your authentication system.

What to do: Cross-reference risky IPs with known threat intelligence. Consider adding high-risk IPs to block lists or adjusting geo-based policies.

Top 10 risky users

Top 10 users with the most low-LoA authentication events (average LoA below 20%, more than 10 low-LoA events) during the selected time range.

Why it matters: These users may be compromised, under attack, or authenticating from high-risk contexts. They should be investigated first during security reviews.

What to do: Investigate the flagged accounts. Consider requiring step-up authentication, forcing password resets, or reviewing their authentication transactions on the Overview tab.

Anomalous login patterns

Six tables detect unusual login behavior that may indicate attacks or automation.

TableDescription
Frequent Logins by IPIP addresses with the highest number of login attempts during the selected time range.
Frequent Logins by UserUsers with the most low-LoA authentication events (more than 10 low-LoA events) during the selected time range.
Burst Logins by User (5m window)Users with the highest number of login attempts within a 5-minute window, indicating potential brute-force or automated login behavior.
Multi-IP UsersUsers logging in from the most distinct IP addresses, which may indicate account sharing or compromised credentials.
User + IP Burst (Credential Stuffing)User and IP combinations with the highest login bursts in a 5-minute window, indicating potential credential stuffing patterns.
New Device Detection Over TimeTrend of first-time device logins over time. Spikes may indicate account takeover attempts or credential stuffing campaigns.

Why it matters: Abnormal login volumes and burst patterns are strong indicators of automated attacks, credential stuffing, or account abuse.

When to check: When investigating suspicious activity alerts, or as part of daily security operations.

What to do: Investigate flagged accounts and IPs. Burst login patterns from a single user+IP combination are a strong signal for credential stuffing. Consider implementing rate limiting or blocking the source.

How to use this dashboard

  1. In SecureAuth Connect, from the left menu, go to Analytics > Remote Risk Dashboard.
  2. Select a time range at the top of the page: 60 days, 30 days, 7 days, 48 hours, 24 hours, 1 hour, or a custom range.
  3. Start on the Overview tab to review summary cards, risk quality indicators, and geographic activity.
  4. Check the Anomaly Detection charts for trends in analyzer scores and LoA distribution.
  5. Use the Authentication Transactions table to drill down into individual events.
  6. Switch to the Risk Assessment tab to investigate risky users, IPs, and credential stuffing patterns.

When to escalate

Contact your security team if you see:

  • Average LoA dropping significantly below 75%
  • Spike in cutoff events or low-LoA authentications
  • Multiple users or IPs appearing in the risky users and risky IPs tables
  • Burst login patterns indicating credential stuffing
  • Growing data quality gaps (missing device fingerprints or incomplete auths)
  • New risk indicators appearing that weren't present before

See also