Anomaly detection

It is important to have a basic understanding of how Airlock Anomaly Shield processes request data and how the output is used in the policy enforcement logic, to be able to configure it properly. The following sections give you a brief introduction to how data are being processed.