-
Configuring Single Sign-On
Kount 360 gives you the option to configure Single Sign-On (SSO) as Security Assertion Markup Language (...
-
Creating, Editing, and Deleting Policies
Policies are a collection of conditions that, when met, resolve as an outcome. The collection of all pol...
-
Creating, Editing, and Deleting Segments
Segments are defined by the event type and can be used to group requests by certain criteria in Policy M...
-
Customizing the Dashboard
When first signing in to Kount 360, depending on your solution, you will see the dashboard displayed wit...
-
Editing Trust States in Event Analysis
You can edit the trust state and friendly name of an event in Event Analysis. The default trust state is...
-
Explore Mode in Kount 360
Further explore data elements in graphs or charts with Explore Mode. Explore Mode provides additional da...
-
Filtering and Sorting Events
The Event Analysis table is equipped with filtering and sorting functions to find data.Filtering EventsIn...
-
Kount 360 Omniscore Overview
Omniscore is a transaction safety rating that can be used in rule creation and during the manual review ...
-
Managing Lists
In Policy Management, you can add, edit, or delete list entries. You can create lists that allow or bloc...
-
Managing Tags
Tags allow you to send custom information with the login or orders decision. Tags are user-defined text ...
-
Managing Users
Creating a New User and Adding them to an Organization Sign in to Kount 360. Select Admin. Sel...
-
Managing Webhooks
A webhook is a secure system that notifies you of events that have occurred in Kount 360. The event noti...
-
Resetting Your Password
If you forget your Kount 360 password, you can request to reset it. On the Kount 360 sign-in page, e...
-
Signing in to Kount 360 with Multi-Factor Authentication
All users are required to use a second method of authentication when signing in to Kount 360. Email au...
-
Single Sign-On Overview
Single sign-on (SSO) is an authentication method that lets you authenticate to multiple applications o...
-
Viewing Device History in Event Analysis
You can view device history for specific events to better inform how you assign trust states. To access ...
-
Viewing User History in Event Analysis
You can view user history for specific events to better inform how you assign trust states. To access an...