Contrôle des risques
Ajustez le seuil de blocage des tentatives de fraude au niveau de votre entreprise avec Radar for Fraud Teams.
Stripe Radar lets you choose a risk setting that automatically adjusts your protection thresholds based on your business needs and tolerance. Based on the risk setting you choose, we recommend the risk controls that help protect against fraud.
Paramètres de risque
Risk settings let you balance authorization and fraud on your account by using risk controls. These risk controls set different thresholds to block payments that might result in fraudulent disputes or early fraud warnings. Certain risk settings also recommend that you enable or disable additional risk controls, such as adaptive 3DS, to help protect your account from fraud while allowing non-fraudulent payments.
On the risk controls page, you can choose or modify your risk setting from the options below. You might need to upgrade your plan to adjust your risk setting.
- Maximize protection: Prioritize protecting your business against fraud by blocking payments that are likely to receive early fraud warnings.
- Balance risk and revenue: Balance protecting your business against fraud with tolerating some risk.
- Maximize revenue: Prioritize revenue by blocking high-risk payments, which can help minimize losses because of fraud.
When you change your risk setting, the modal displays the impact to payments with the following statistics. The numbers shown are estimated projections based on your last four months of payment data.
| Indicateur | Description |
|---|---|
| Fraud | The estimated payments this setting blocks before they become fraudulent disputes or early fraud warnings. |
| Payments | The estimated payments and percentage change your business accepts, based on what this setting allows. |
Adjust your blocking preference using risk settings
Beginning March 1, 2026, existing Radar for Fraud Teams users can change blocking preferences using risk settings, instead of the default risk thresholds. If you previously set a risk score block threshold, the Block if :risk_ rule is likely still enabled. If this is the case, you won’t see the option to change your risk score threshold on the risk controls page.
If you want to change your default block threshold, you can do either of the following:
- (Recommended) Modify your risk setting. Changing your risk setting alters the enabled risk controls and the thresholds set for each control. Each risk control uses individualized machine learning to improve cost and fraud protection on your behalf. When you first enable a risk setting, Stripe disables the corresponding high risk block rule that uses risk score.
- (Legacy) For users on Radar for Fraud Teams, you can still write custom rules on the risk score, but we don’t recommend this method for most users.
Contrôle des risques
Risk controls use AI to protect your account. You enable them on your account to block payments that might result in fraudulent disputes or early fraud warnings. Risk settings determine which risk controls are enabled and recommend additional risk controls, such as adaptive 3DS.
Risk settings automatically manage the blocking thresholds for risk controls, so you can’t adjust a threshold manually. To block more or less traffic from a risk control, you can change your risk setting, which automatically changes the blocking threshold for the risk control, but doesn’t allow you to select your own threshold.
Risk controls and risk settings won’t override the custom rules you created. You can continue to update your controls, settings, and rules at any time.
You can find the following controls on the risk controls page in the Dashboard.
Litige pour fraude
This risk control dynamically blocks payments that are likely to result in fraudulent disputes. Radar determines the number of payments to block versus accept based on your risk setting, and maximizes conversion while preventing the risk of entering monitoring programs.
To change how much this control blocks, change your risk setting.
Early fraud warning
This risk control determines which payments are likely to result in an early fraud warning. Radar determines the threshold based on your risk preferences, and maximizes conversion while preventing the risk of entering monitoring programs.
This control is only available if you choose the Maximize protection risk setting. We recommend turning on this setting if you’re in a card brand monitoring program, which counts early fraud warnings toward the VAMP monitoring program.
3DS adaptatif
Radar’s adaptive 3D Secure (3DS) authentication control adds an extra layer of authentication during checkout to help protect against fraud. Stripe runs machine learning in the background to authenticate medium-risk payments.
In most cases, 3DS authentication happens with no action required by your customer. If the customer’s bank detects anything unusual, they might ask the customer to confirm their identity through a security challenge. If 3DS authenticates a payment, the liability for any fraud-related disputes for that payment typically shifts from your business to the issuer. This means that in most cases, the seller isn’t responsible for fraud costs on 3DS-authenticated payments.
Stripe activates 3DS automatically, if required by a regulatory mandate such as Strong Customer Authentication (SCA). Disabling adaptive 3DS doesn’t prevent 3DS from activating when required for compliance. Authentication fraud prevention control isn’t available in testing environments.
Risk score Deprecated
Stripe Radar gives each payment a numerical risk score between 0 and 99, where 0 is the lowest risk and 99 is the highest. This risk score is the probability that a payment results in a fraudulent dispute or early fraud warning.
Remarque
Adjusting the risk score applies to card, ACH, and SEPA Direct Debit payments. You can select a specific payment method to test different thresholds and view affected payments.
Block payments
Radar is deprecating the high risk block rule that uses risk score to block payments. To change your block preference, you must use risk settings, which use separate models to block payments. When you select a risk setting, your default high risk block rule is disabled and you can’t re-enable it.
If you use Radar for Fraud Teams and want to block payments based on the risk score (even after selecting a risk setting) you can continue writing custom rules on :risk_.