2 Overview of Steps in Using Thredd Protect
This topic provides a high-level overview of the steps to help your organisation get up and running with Thredd Protect, with pointers to where to find further information.
Step 1 – Access Thredd Protect
To access Thredd Protect, you use a browser such as Google Chrome or Microsoft Edge. You also require a username and password from Thredd to access the system. For more information, see Accessing Thredd Protect.
Step 2 – Familiarise yourself with the User Interface
Before you begin, learn how to use the Thredd Protect toolbar, menu options and dashboard — see Understanding the Thredd Protect Display.
Thredd Protect provides powerful transaction monitoring functionality, with the ability to flag suspicious events for further investigation. For more information, see Transaction Monitoring .
What you can see and do in Thredd Protect depends on your role and access rights. For more information about user roles and permissions, see User Access Management.
Step 3 – Understand Case Management
Thredd Protect allows you to create cases to track suspicious events and transactions requiring further investigation. For more information about using cases to investigate potential fraud, see Managing Cases for Investigation.
Step 4 – Understand Thredd Protect Rules
Thredd Protect checks all data from the Thredd Apex platform against a set of predefined rules and logic to identify patterns of fraudulent card activity. To view the rules through which transaction verification happens, see Using the Rule Manager.