In this section, two sections will be differentiated.

  • IDS: This is an intrusion detection system, in which all the anomalies detected will appear; from warnings to fraud. This will be translated into reports which will detail what type of anomaly it is, which user it affects, which location was used and the device with which the operation was attempted.


  • Logs: This is a section in which the usual correct or incorrect authentications and anomalies are added up as reports, i.e., it is a history of all the operations carried out in the company.