# Anomaly Detection Report

#### Anomaly Detection Report&#x20;

The Anomaly Detection Report identifies unusual or suspicious user activities by analyzing login patterns, device details, and access behavior. It helps detect potential fraud, unauthorized access, and abnormal actions that may pose security risks.&#x20;

This Table will show the details of the Anomaly Detection Reports.&#x20;

<table data-header-hidden><thead><tr><th width="135.66668701171875"></th><th></th></tr></thead><tbody><tr><td>Status Type </td><td>Allows you to filter anomaly records based on their status, such as Fraud, Possibly Fraud, or Anomaly. </td></tr><tr><td>Start Date </td><td>Select the beginning date for the report. Only records detected on or after this date will be shown. </td></tr><tr><td>End Date </td><td>Select the ending date for the report. Only records detected on or before this date will be included. </td></tr><tr><td>Search Button </td><td>Applies the selected filters and displays the matching anomaly records. </td></tr></tbody></table>

<figure><img src="https://1757876898-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNHJr75kSc6HL16U7k3F6%2Fuploads%2FkNYo8k0dn1nYMg2EbE7J%2Fimage.png?alt=media&#x26;token=4c16c991-2f19-43c0-8fd3-91a59422beb7" alt=""><figcaption></figcaption></figure>

<table data-header-hidden><thead><tr><th width="103.4444580078125"></th><th></th></tr></thead><tbody><tr><td>S. No </td><td>Displays the serial number for each anomaly entry. </td></tr><tr><td>Name </td><td>Shows the user’s name associated with the detected anomaly. </td></tr><tr><td>IP Address </td><td>Indicates the IP address from which the suspicious or unusual activity originated. </td></tr><tr><td>Browser </td><td>Displays the browser used during the anomalous login or activity. </td></tr><tr><td>Status </td><td>Shows the classification of the detected activity (e.g., Fraud, Possibly Fraud, Anomaly). </td></tr><tr><td>Operating System </td><td>Specifies the operating system used during the activity (e.g., Windows, macOS, Android). </td></tr><tr><td>Address </td><td>Displays the approximate geographic location derived from the IP address. </td></tr></tbody></table>

***Generate Report:***&#x20;

* The admin clicks on the Generate Report button.&#x20;
* The system processes and compiles the list of users who haven’t logged in within the defined inactivity threshold.&#x20;
* Once the report generation is completed:&#x20;

**Note:** The admin receives an email notification confirming that the report is ready for download.&#x20;

<figure><img src="https://1757876898-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNHJr75kSc6HL16U7k3F6%2Fuploads%2FVsrhN7m4991qNYLzdwUD%2Funknown.png?alt=media&#x26;token=00a6205d-8da8-490a-9046-e77b4e0f380e" alt=""><figcaption></figcaption></figure>

***View Download:***&#x20;

* The admin clicks on the View Download button to view all generated report logs.&#x20;
* A Report Download Table is displayed with the following fields:&#x20;

<table data-header-hidden><thead><tr><th width="134.5555419921875"></th><th></th></tr></thead><tbody><tr><td>S. No: </td><td>Report sequence number </td></tr><tr><td>Status: </td><td>Indicates report generation status (e.g., Completed, In Progress, Failed) </td></tr><tr><td>Download: </td><td>Provides a download link (once the report is ready) </td></tr><tr><td>Generated By: </td><td>Displays the email of the admin who triggered report generation </td></tr><tr><td>Started Time: </td><td>Time when the report generation was initiated </td></tr><tr><td>Finished Time: </td><td>Time when the report was successfully completed </td></tr></tbody></table>

<figure><img src="https://1757876898-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNHJr75kSc6HL16U7k3F6%2Fuploads%2FxRxPRPbbJk9cmw1NYctL%2Funknown.png?alt=media&#x26;token=18d624e3-4cef-483a-bd5c-d50f07f838c7" alt=""><figcaption></figcaption></figure>

***Download Report***&#x20;

* When the report status shows Completed, the admin clicks Download to retrieve the generated file.&#x20;
* The downloaded report contains inactive user details, which can be used for analytics, communication, or cleanup activities.&#x20;
