Suspicious touchpoints can be detected by identifying unusual lag time or Touchpoint-To-Install-Time. Touchpoint-To-Install-Time is the time interval between a touchpoint and the following app install.
1. Navigate to [Settings]>[Fraud Validation Rules].
2. Select the [Lag Time] tab and click Add a rule.
3. Select Click or Impression as [Touchpoint].
4. Select Less than or Greater than as [Condition].
5. Enter the time interval. It can be set in seconds, minutes, hours, and days.
6. Select [Prevention Level] and click Save.
7. Click Add a rule to add more rules. When you have added multiple rules, any touchpoint that matches at least 1 of the configured rules will be considered suspicious.
Attention
It is advised to start from "Prevention Level 1" and switch to higher levels after consulting with your media partner, as the prevention level setting may have a direct impact on the ad performance.
Events attributed to the suspicious touchpoints detected by the lag time rules are processed according to the set prevention levels.
Prevention Level |
Description |
---|---|
Level 1: Tag as fraud | - Events attributed to the suspicious touchpoints will be tagged as fraud in the Airbridge reports and raw data export files. |
Level 2: Don't send postbacks | - Events attributed to the suspicious touchpoints will be tagged as fraud in the Airbridge reports and raw data export files. - Events attributed to the suspicious touchpoints won't be sent as postbacks. |
Level 3: Don't attribute | - Events attributed to the suspicious touchpoints will be tagged as fraud in the Airbridge reports and raw data export files. - Events attributed to the suspicious touchpoints won't be sent as postbacks. - Events attributed to the suspicious touchpoints won't be attributed or aggregated. |
The events attributed to suspicious touchpoints detected by the set rules can be viewed in your Airbridge reports and raw data export files.
In the Actuals Report, select "Touchpoint Fraud Tag" as a GroupBy to visualize the suspicious events tagged as fraud.
In the [App Raw Data Export], select "Touchpoint Fraud Tag" and "Fraud Tags" in the [Select Property] step to export suspicious events as a CSV file.
Fraud_Touchpoint_ClickShortLagTime: Suspicious events with the Click-To-Install-Time shorter than the set time interval
Fraud_Touchpoint_ClickLongLagTime: Suspicious events with the Click-To-Install-Time longer than the set time interval
Fraud_Touchpoint_ImpressionShortLagTime: Suspicious events with the Impression-To-Install-Time shorter than the set time interval
Fraud_Touchpoint_ImpressionLongLagTime: Suspicious events with the Impression-To-Install-Time longer than the set time interval
Was this page helpful?