Accéder directement au contenu
Créez un compte ou connecter-vous
Logo de la documentation Stripe
/
Demander à l'assistant IA
Créez un compteConnectez-vous
Démarrer
Paiements
Revenus
Plateformes et marketplaces
Gestion de fonds
Ressources pour les développeurs
API et SDKAide
AperçuAccepter un paiementMettre votre intégration à niveau
Paiements en ligne
PrésentationTrouver votre cas d'usage
Utiliser Payment Links
Utiliser une page de paiement préconfiguré
Créer une intégration personnalisée avec Elements
Développer une intégration dans l'application
Utiliser Managed Payments
Paiements récurrents
Paiements par TPE
Terminal
Moyens de paiement
Ajouter des moyens de paiement
Gérer les moyens de paiement
Paiement accéléré avec Link
Opérations de paiement
Analyses
Soldes et délai de règlement
Conformité et sécurité
Devises
Refus de paiement
Litiges
Radar pour la protection contre la fraude
    Présentation
    Fonctionnement du Radar
    Optimiser les signaux de fraude
    Capturer des données sur la fraude
    Évaluations des risques
    Évaluation des abus clients
    Scores Radar pour plusieurs prestataires de services de paiement
    Contrôle des risques et paramètres
    Avis
    Listes
    Règles
      Référence
      Attributs pris en charge
      Tester les règles
      Règles de résolution des litiges
    Moyens de paiement locaux
    Analyses Radar
    Radar pour les plateformes
    Comprendre la fraude
Virements
ReçusRemboursements et annulations
Intégrations avancées
Tunnels de paiement personnalisés
Acquisition flexible
Paiements hors session
Orchestration multiprestataire
Au-delà des paiements
Constituez votre entreprise
Cryptomonnaies
Commerce agentique
Paiements automatiques
Financial Connections
Climate
Vérifier l'identité
États-Unis
Français (France)
  1. Accueil/
  2. Paiements/
  3. Radar fraud protection

Remarque

Cette page n'est pas encore disponible dans cette langue. Nous faisons tout notre possible pour proposer notre documentation dans davantage de langues et nous vous fournirons la version traduite dès qu'elle sera disponible.

Règles de protection contre la fraude

Utilisez les règles de prévention de la fraude pour protéger votre entreprise.

Fraud prevention rules allow you to take action whenever a payment matches certain criteria. Stripe Radar provides built-in rules to help detect and protect you against fraud risk on card, ACH, and SEPA Direct Debit payments.

Radar for Fraud Teams and Radar for Platforms let you use the Dashboard to create custom rules based on the business logic specific to your business. For example, you can:

  • Demander 3D Secure (3DS) pour tous les paiements qui le prennent en charge et sont effectués par un nouveau client
  • Autoriser tous les paiements provenant de l’adresse IP de votre centre d’appels
  • Bloquer les paiements réalisés depuis un emplacement ou une carte émise en dehors de votre pays
  • Review all payments greater than 1,000 USD that were made with a prepaid card
  • Review and automatically pause payouts on accounts that have a high dispute rate (with Radar for Platforms)

Mise en garde

Les entreprises de l’UE pourraient être concernées par le règlement sur le géoblocage et ses interdictions de bloquer les paiements des clients établis dans les États membres de l’UE.

Règles intégrées

The following rules are available by default, unless flagged as custom rules, which are only available if you use Radar for Fraud Teams or Radar for Platforms.

Block fraud automatically

Alternatively, you can use Radar risk controls to block fraud automatically. The risk controls use early fraud warnings to evaluate and block the highest risk payments.

Vérifications des risques par l’IA

All Radar offerings provide a set of default rules based on the judgments of our AI models.

Radar rule Description
Block if :risk_level: = 'highest' ObsolèteCette règle bloque les paiements présentant un risque très élevé de fraude et empêche leur traitement. Elle est activée par défaut pour tous les utilisateurs de Radar.
Review if :risk_level: = 'elevated'The default behavior for Radar for Fraud Teams and Radar for Platforms is to place payments into review that we suspect have an elevated risk of fraud.

Radar for Platforms has additional account-level AI models that are incorporated through two default rules:

Vérification si :account_risk_level : = 'highest'

Vérification si :account_risk_level : = 'elevated'

We calculate account-level risk using KYC information, transactions, geographic signals, and behavior patterns.

Vérifications traditionnelles de carte bancaire

Un paiement peut aboutir même lorsque la vérification du CVC ou de l’adresse (AVS) échoue, car les émetteurs évaluent de nombreux indicateurs avant de décider d’autoriser un paiement. L’émetteur d’une carte peut néanmoins considérer comme légitime un paiement qui échoue à la vérification du code CVC ou du code postal, et l’approuver.

Vous pouvez activer les règles intégrées à Radar pour bloquer certains paiements approuvés par l’émetteur de la carte. Lorsqu’elles sont activées, ces règles affectent également l’association d’une carte à un client, ainsi que la création d’un client, si vous créez la carte et le client en même temps.

À compter du 17 décembre 2024, le Dashboard affichera ces règles aux nouveaux clients et aux clients existants qui n’ont pas utilisé les anciennes règles relatives à la vérification CVC ou AVS.

Radar rule Description
Block if CVC verification fails based on risk scoreEnable this rule to block payments that fail a card issuer’s CVC verification check, unless Stripe evaluates it as low risk. This rule doesn’t block payments where the customer doesn’t provide the CVC number because they, for example, use a wallet, or their card issuer doesn’t support its verification.
Block if Postal code verification fails based on risk scoreEnable this rule to block payments that fail a card issuer’s postal code verification check, unless Stripe evaluates it as low risk. This rule doesn’t block payments where the customer doesn’t provide the postal code, or their card issuer doesn’t support its verification.

Règles intégrées pour demander 3D Secure

3D Secure (3DS) prompts customers to complete an additional authentication step before they can complete the purchase flow. If 3DS authenticates a payment, the liability for any fraud-related disputes for that payment typically shifts from the seller to the issuer. This means that in most cases, the seller isn’t responsible for fraud costs on 3DS authenticated payments.

Stripe automatically handles soft decline codes indicating that 3DS is required by issuers. We also trigger 3DS when necessary, adhering to regulations, such as the Strong Customer Authentication (SCA) mandated by the PSD2. Disabling Radar doesn’t prevent 3DS from being triggered in cases where it’s necessary.

Stripe supports three legacy built-in rules to request 3DS when using Radar with Payment Intents or SetupIntents:

Radar rule Description
Demander 3D Secure si 3D Secure est recommandé pour la carte DeprecatedEnable this rule to prompt the customer for 3DS authentication based on risk.
Demander 3D Secure si 3D Secure est pris en charge pour la carte DeprecatedEnable this rule to prompt the customer for 3DS authentication, as long as their card supports it.
Demander 3D Secure si 3D Secure est requis pour la carte DeprecatedEnable this rule to prompt the customer for 3DS authentication, if the card historically required 3DS. Regardless of this rules, Stripe automatically triggers 3DS:
  • Si un code de refus temporaire indique que l’émetteur exige 3DS.
  • In adherence to regulations, such as the PSD2 Strong Customer Authentication mandate.

Dans la mesure où le système 3DS exige que le client passe par un niveau d’authentification supplémentaire, l’utilisation inconsidérée du système 3DS risque de faire baisser les taux de conversion.

Requesting 3DS doesn’t necessarily mean the issuer actually performs 3DS. Learn more about possible outcomes.

Règles personnalisées pour exiger 3D Secure et agir en fonction de résultats spécifiques

Après la tentative d’authentification 3DS, si vous disposez de Radar for Fraud Teams ou Radar pour les plateformes, vous pouvez évaluer le résultat dans les règles d’autorisation, de blocage et de vérification.

See below for the most important attributes for custom Radar rules.

Attribute Description
is_3d_secureThis is true if the card is supported, 3DS was attempted by the issuer, and the customer didn’t fail authentication. We generally recommend using this in block rules.
is_3d_secure_authenticatedThis is true if 3DS was attempted by the issuer and the customer successfully completed a full authentication. Using this attribute in a block rule excludes legitimate transactions that might have an SCA exemption or don’t fall into a clear failure or successful authentication, such as processing errors.
has_liability_shiftThis is true if Stripe expects liability shift to cover the payment. This might not always be the same as 3DS, for example Apple Pay in certain regions.

For custom rules, we recommend keeping Request 3DS and Block rules aligned depending on your risk appetite. However, don’t block payments where 3DS isn’t supported, such as from some wallets.

See below for some examples that show how to achieve this for different use cases.

Exiger 3D Secure en fonction du niveau de risque Radar

You want to use Radar to request 3DS on all payments, based on the risk level and that are above a certain amount.

Radar rule Description
Request 3D Secure if :risk_level: != 'normal' and :amount_in_usd: > 25This rule checks for the Radar risk level before requesting 3DS on all payments with an elevated or high risk level above a certain amount.

In this case, without a block rule, cards or wallets that don’t support 3DS aren’t blocked. 3DS attempts that failed authentication don’t continue to charge authorization.

Toujours exiger 3D Secure en fonction du niveau de risque Radar

You want to use Radar to request 3DS on all payments, based on an elevated or high risk level and that are above a certain amount. You don’t want to support cards that don’t support 3DS.

Radar rule Description
Request 3D Secure if :risk_level: != 'normal' and :amount_in_usd: > 25This rule checks for the Radar risk level before requesting 3DS on all charges with an elevated or high risk level above a certain amount.
Block if not :is_3d_secure: and :risk_level: != 'normal' and :amount_in_usd: > 25 and not :is_off_session: and :digital_wallet: != 'apple_pay' and not (:digital_wallet: = 'android_pay' and :has_cryptogram:)This rule blocks elevated or high-risk payments above a certain amount that don’t have a 3DS flow. This rule accepts legitimate payments that might have an SCA exemption or don’t have a clear failure or successful authentication, such as attempt_acknowledged. It accepts off-session payments, such as recurring subscription charges, and wallets, such as Apple Pay or Google Pay to succeed.

Only accept fully 3D Secure authenticated payments if 3D Secure is supported

You rely on Stripe activating 3DS when necessary in cases such as Strong Customer Authentication (SCA), but don’t want to accept edge cases, such as processing errors.

Radar rule Description
Block if :is_3d_secure: and not :is_3d_secure_authenticated:This rule blocks payments where the card is enrolled in 3DS, and 3DS was attempted but the user didn’t successfully authenticate. Cards that don’t support 3DS, SCA exemptions, off-session payments (such as recurring subscription charges), and wallets (such as Apple Pay or Google Pay) are accepted.

Request 3D Secure based on metadata

You want to use Radar to request 3DS on all payments with a custom metadata attribute.

Radar rule Description
Request 3D Secure if ::foo:: = 'bar'This rule checks for a metadata condition and then requests 3DS. To check customer metadata, replace ::foo:: = 'bar' with a value like ::customer:trusted:: = 'false'.

In this case, without a block rule, we don’t block cards or wallets that don’t support 3DS. 3DS attempts that failed authentication don’t continue to charge authorization.

Always require 3D Secure based on metadata

You want to use Radar to request 3DS on all payments with a custom metadata attribute and block cards that don’t support it.

Radar rule Description
Request 3D Secure if ::foo:: = 'bar'This rule checks for a metadata condition and then requests 3DS. To check customer metadata, replace ::foo:: = 'bar' with a value like ::customer:trusted:: = 'false'.
Block if ::foo:: = 'bar' and not :is_3d_secure and not :is_off_session: and :digital_wallet: != 'apple_pay' and not(:digital_wallet: = 'android_pay' and :has_cryptogram:)This rule blocks payments that don’t have a 3DS flow for charges with a custom metadata attribute. This rule accepts legitimate payments that might have an SCA exemption or don’t have a clear failure or successful authentication, such as attempt_acknowledged. It accepts off-session payments, such as recurring subscription charges, and wallets, such as Apple Pay or Google Pay to succeed.

Exiger 3D Secure pour toutes les nouvelles cartes et vérifier si 3D Secure n’est pas pris en charge

You want to use Radar to request 3DS on all new cards and manually review payments from cards that don’t support 3DS.

Radar rule Description
Request 3D Secure if is_missing(:seconds_since_card_first_seen:)This rule requests 3DS on all cards that haven’t been used on your account. To reduce user friction, you can add a condition to only request 3DS if :risk_level: != 'normal'.
Request 3D Secure if :is_new_card_on_customer:As an alternative to the rule above, this rule requests 3DS on all cards that are newly used on a Customer. To reduce user friction, you can add a condition to only request 3DS if :risk_level: != 'normal'.
Review if not :is_3d_secure and not:is_off_session: and :digital_wallet: != 'apple_pay' and not(:digital_wallet: = 'android_pay' and :has_cryptogram:)This rule marks payments where 3DS is expected, but isn’t supported for manual review. It ignores off-session payments, such as recurring subscription charges, and wallets, such as Apple Pay or Google Pay. Payments marked for review continue to authorization and can give additional signals, such as issuer CVC checks.

In this case, without a block rule, we don’t block cards or wallets that don’t support 3DS. 3DS attempts that failed authentication don’t continue to charge authorization.

Toujours exiger 3D Secure pour les émetteurs de certains pays

You want to use Radar to request 3DS on all payments from card issuers originating from countries on a custom list and block the cards that don’t support it.

Radar rule Description
Request 3D Secure if :card_country: in @enforce_3ds_listThis rule checks for a condition based on the card issuer’s country of origin and compares them to a custom list. If they match, we request 3DS.
Block if :card_country: in @enforce_3ds_list and not :is_3d_secure and not :is_off_session: and :digital_wallet: != 'apple_pay' and not(:digital_wallet: = 'android_pay' and :has_cryptogram:)This rule blocks payments that don’t have a 3DS flow and that originate from countries on the custom list. This rule accepts legitimate payments that might have an SCA exemption or don’t have a clear failure or successful authentication, such as attempt_acknowledged. It accepts off-session payments, such as recurring subscription charges, and wallets, such as Apple Pay or Google Pay to succeed.

Toujours exiger 3D Secure en fonction du niveau de risque Radar et passer en revue les cas particuliers

You want to use Radar to request 3DS on all payments based on the risk level, and block cards that don’t support 3DS, but manually review edge cases.

Radar rule Description
Request 3D Secure if :risk_level: != 'normal'This rule checks for the Radar risk level before requesting 3DS on all elevated or high-risk payments above a certain amount.
Block if not :is_3d_secure: and :risk_level: != 'normal' and not :is_off_session: and :digital_wallet: != 'apple_pay' and not (:digital_wallet: = 'android_pay' and :has_cryptogram:)This rule blocks elevated or high-risk payments above a certain amount and that don’t have a 3DS flow. This rule accepts legitimate payments that might have an SCA exemption. It accepts off-session payments, such as recurring subscription charges, and wallets, such as Apple Pay or Google Pay to succeed.
Review if not :is_3d_secure_authenticated: and :risk_level: != 'normal' and not :is_off_session: and :digital_wallet: != 'apple_pay' and not (:digital_wallet: = 'android_pay' and :has_cryptogram:)This rule marks payments that used 3DS, but didn’t result in a fully authenticated flow, for manual review. This reviews edge cases, such as attempt_acknowledged, and also marks legitimate payments despite SCA exemptions. Because review rules are evaluated after block rules, we block cards that don’t support 3DS.

Create rules

Création de règles par les membres de l'équipe

Seuls le propriétaire du compte, les administrateurs et les développeurs peuvent créer des règles. Si vous avez besoin que les membres de l’équipe puissent créer des règles, vérifiez que ceux-ci disposent d’un accès administrateur dans vos paramètres d’équipe.

The Stripe default rules can block a substantial number of fraudulent payments. Businesses that need more control over which payments they want to review, allow, or block can write custom rules through Radar for Fraud Teams. Platforms can write custom rules through Radar for Platforms to calibrate payments risk for their platform and connected accounts and apply account-specific rules.

Tenez compte des questions suivantes lorsque vous décidez d’activer ou non les règles personnalisées :

  • If you see certain features or user behaviors as more risky (for example, using a disposable email).
  • If you want to implement rules based on the payment method (for example, automatically blocking SEPA Direct Debit payments that exceed a certain risk score).
  • If you want to implement rules based on payment amounts or perceived risk level (for example, automatically review if the payment is over 500 USD, automatically allow if the payment is under 5 USD).
  • If your existing disputed and refunded payments share any common patterns (for example, similar amounts, card types, or countries).
  • If you have existing rules you want to migrate to Stripe. The Stripe AI model might already cover many of these rules, and you can check how our system performs for your business before customizing it.
  • If you want to automatically raise reviews and optionally pause payouts on accounts. This applies to platforms only.

Create effective rules

While rules can help you automate your existing workflows, they can also negatively affect your business if used incorrectly. For example, a rule can automatically allow a large number of elevated or high-risk payments or block a large number of legitimate payments, if it isn’t set up properly.

Remember the following when setting up rules:

  • Par défaut, les règles s’appliquent à tous les moyens de paiement pris en charge par Radar, sauf si vous définissez un moyen de paiement spécifique dans le prédicat de la règle à l’aide de l’attribut payment_method_type.
  • Rules only apply to future payments and don’t apply to any that you already processed.
  • Les règles Request 3DS s’appliquent uniquement lors de l’utilisation de Stripe Checkout, Payment Intents, ou Setup Intents, et sont évaluées avant les règles de vérification, de blocage et d’autorisation.
  • Before implementing any block rule to block all payments or pause payouts for accounts that meet its criteria, consider whether you’d rather review the payments or accounts first.
  • Implement any allow rules minimally, because they override the Stripe default rules, along with any other custom rules that match the same criteria.
  • Vous pouvez créer un maximum de 200 règles de transaction et 100 règles de compte.

Élaborer des règles de transaction

You can add and manage rules from the Radar Rules page in the Dashboard.

To add a transaction rule

  1. Cliquez sur + Ajouter une règle.
  2. Select the rule type.
  3. Dans l’éditeur de règles, créez une règle en utilisant la syntaxe {action} if {attribute} {operator} {value} selon laquelle :
    • {action}: is how Radar responds when the rule criteria is met. This value is pre-populated based on the rule type you selected.
    • {attribute}: is the element of the payment to evaluate, such as the amount or card type. Begin typing with : to open a list of valid attributes. You can also evaluate your custom metadata by enclosing it in double colons, for example, ::product_sku::.
    • {operator}: is how to compare the attribute to the value, such as =, >, !=, and so on.
    • {value}: is the value of the attribute to evaluate.
  4. Cliquez sur Tester la règle.
  5. Corrigez les erreurs de validation détectées, le cas échéant.
  6. On the Review new rule page, review how this rule performs against your recent payments to confirm whether you want to enable it. If the rule might impact payments from more than one payment method, use the filter to view rule performance by payment method (for example, ACH or Cards).
  7. Click Add rule to apply this rule to all future transactions.

Utiliser l’assistant Radar

The Stripe rule editor has a built-in LLM assistant that constructs a Radar transaction rule from a natural language prompt. Learn more about Stripe AI services.

Training data consent

By using Radar Assistant you agree that Stripe can log and use your chat entries to train and improve the Radar Assistant capabilities. If you don’t want to have your chat entries used for this purpose, write rules manually.

To use Radar Assistant

  1. On the Radar Rules page, click + Add rule.
  2. Select the rule type.
  3. Dans l’éditeur de règles, cliquez sur Assistant Radar.
  4. In the message field, enter your rule request. You might ask to:
    • Examiner les paiements pour lesquels le pays de la carte et de l’adresse IP sont différents.
    • Bloquer les paiements par carte Discover de plus de 1000 $
    • Autoriser les paiements à partir d’adresses e-mail de type stripe.com.
  5. When the Assistant returns its suggestion, you can either enter an additional command to make adjustments to the rule, or you can click Test rule to see how the rule performs against your recent transaction history.
  6. When you’re satisfied with the rule, click Add rule to enable it for all future transactions.

Faites-nous part de vos commentaires

Aidez-nous à améliorer continuellement l’assistant Radar. Cliquez sur Laisser un commentaire et détaillez précisément votre expérience d’utilisation de l’assistant ainsi que les améliorations que nous pouvons y apporter. Tous les avis sont les bienvenus, qu’il s’agisse de la précision de la suggestion, de l’interface utilisateur ou de tout autre aspect de votre expérience.

Règles de vérification

Stripe still processes payments normally when they match a review rule’s criteria. We add these payments to your review queue so your team can review them more closely. Setting up a rule that’s too broad can result in too many payments placed in your review queue, slowing down your customers and burdening your review team.

The Stripe rule testing interface runs a simulation on the last 6 months of charges to determine how many legitimate, fraudulent, and blocked payments would have been affected by the rule, had it been implemented. While testing a rule and examining the last 6 months, make sure that:

  • Overall volume of payments is low. Reviewing these payments shouldn’t create a burden for your team.
  • Human reviewers add value. A human reviewer can generally identify an elevated or high-risk payment with greater confidence than the automated system.
  • The rule results in a mix of successful and refunded or disputed payments. This means that additional inspection on these types of payments can help separate legitimate payments from fraudulent payments.

Voici un exemple d’amélioration d’une règle de vérification créée par une entreprise qui souhaite vérifier les cartes de crédit prépayées.

Règle d’origineRègle améliorée
Review if :card_funding: = 'prepaid'Review if :is_disposable_email: and :card_funding: = 'prepaid'
This rule is too broad and results in too many reviews.This rule is more focused and results in a smaller number of reviews.

Règles de blocage

You can use block rules to block payments that you’re confident are fraudulent, or based on any restrictions your business has in place (such as blocking payments from prepaid cards). If you’re not sure how to apply block rules, we recommend using a review rule to place payments in review. After reviewing these payments for potential false positives, you can confirm whether you want to create a block rule instead.

Les règles de blocage ont un impact sur les paiements frauduleux et les paiements réussis, mais pas sur les paiements déjà bloqués. Lorsque vous testez une règle, veillez à :

  • Minimiser les faux positifs. Au cours des tests, Stripe identifie le nombre de paiements réussis et contestés qui auraient correspondu à la règle. Une règle de blocage efficace entraîne le blocage de beaucoup plus de paiements frauduleux que de paiements légitimes.
  • Minimize unnecessary rules. If your rule appears to perform well but is already covered by an existing rule, your newer rule might not be necessary. Similarly, if the results during testing appear to be mixed, consider setting up a review rule instead so you can gather more information about those types of payments.

The following is an example of how to improve a block rule created by a business that has a high level fraud from payments outside the US.

Règle d’origineRègle améliorée
Block if :card_country: != 'US'Block if :card_country: != 'US' and :risk_level: = 'elevated'
This rule is too broad and blocks a high number of legitimate payments.This rule is more focused and results in a smaller number of reviews.

Règles d’autorisation

Disponibilité des règles d'autorisation

If you want the ability to create allow rules, contact us.

Les règles d’autorisation remplacent toutes vos autres règles, c’est pourquoi vous devez les utiliser avec prudence. De nombreuses entreprises peuvent ne pas avoir besoin d’appliquer des règles d’autorisation. Si vous craignez qu’une règle d’autorisation puisse laisser passer ne serait-ce qu’un petit nombre de paiements frauduleux, envisagez de procéder à des réajustements afin de restreindre davantage ces règles avant de les appliquer.

Les règles d’autorisation s’appliquent à tous les nouveaux paiements dès que vous créez la règle. Cela inclut tous les paiements qui sont similaires à des paiements précédemment bloqués. Lorsque vous testez une règle, veillez à :

  • Examine the number of previously blocked payments that would have been allowed. Allow rules override all other rules and Stripe’s risk assessment. When testing a new allow rule, all payments shown would have been allowed if this rule were active. This can include payments that had been blocked or disputed, impacting your future dispute rates.
  • Continue to block any high-risk payments. Block high-risk payments by adding the following to any allow rule: and :risk_level: != 'highest'
  • Évaluer l’historique de transactions légitimes dans votre entreprise. Vous pouvez analyser les relations entre vos clients pour autoriser un plus grand volume de transactions sur la base d’un historique d’achats légitimes. Cela vous permet de bloquer moins de paiements provenant de clients justifiant d’un historique au sein de votre entreprise. Pour ce faire, consultez la liste des attributs et recherchez les attributs qui incluent le mot « client ».

The following is an example of how to improve an allow rule for a business that generally (but not always) sees legitimate payments coming from customers in the UK:

Règle d’origineRègle améliorée
Allow if :ip_country: = 'GB'Allow if :ip_country: = 'GB' and :risk_level: != 'highest'
This rule is too broad and allows some fraudulent payments.This rule is more focused and results in allowing a smaller number of fraudulent payments.

Maintain your rules

As your business continues to grow, make sure your rules continue to reflect the types of customers that you want to do business with. The following are some best practices to keep rules current for the state of your business.

Regularly monitor rules to make sure they’re still effective

Mesures des règles

Étant donné que les mécanismes de fraude évoluent constamment, nous fournissons des mesures indiquant les performances de ces règles. Ces mesures varient selon le type de règle, car les règles exécutent des actions différentes en fonction de leur type.

You might notice a difference in the number of payments that matched review rules and the number of payments sent to your review queue in the same time period. Because only successful payments are placed in review, payments that match a review rule’s criteria but get declined by the issuer, for example, aren’t sent to your review queue.

Use the rule performance chart to understand the behavior of your Radar rules. Look for unexpected spikes or declines in the number of payments matching your rules, such as allow rules letting through too many payments or block rules blocking too many. These spikes might indicate a change in the types of payments your business receives or that might necessitate updates to the rules.

Color-coded lines track the number of payments that match 3DS rules, allow rules, block rules, and review rules. Updated rules are displayed as triangular symbols on the graph lines, and can help you compare the impact of a change before and after you make it.

Click the overflow menu () to view additional commands for any rule, including Disable, Enable, Edit or Delete.

You can also use our reporting products, Sigma and Data Pipelines, to query disputes and fraud data, including rule decisions and attributes for each individual payment.

Évaluation de l’efficacité des règles

You can find information about the effectiveness of your rules and see how many payments each rule has affected. You can also view and download a filtered list of every payment that a rule has been applied to.

Review the sample questions in the following table to help you decide if you need to make changes to any rules or remove them entirely.

Rule typeÉvaluationActions à envisager
GénéraleIf this rule no longer matches any payments.Supprimez la règle.
Cette règle présente-t-elle un comportement anormal, par exemple en autorisant davantage de paiements que sur les périodes précédentes ?Manually review payments that match this rule to determine if this is the behavior you want.
3DSIf the 3DS completion rate is high, but the number of disputes or early fraud warnings is low.Remove the rule because you might be causing friction for your users.
La fraude est-elle élevée pour les transactions qui réussissent l’authentification 3DS ?Consider modifying your 3DS rule into a block rule to prevent these users from passing frictionless flow (controlled by issuers) or committing first-party fraud.
Le taux de conversion pour l’authentification 3DS est-il faible ?This might be an effective rule because it might be mostly blocking fraudsters. Consider manually investigating matched payments to make sure your good users aren’t abandoning because of additional friction.
AutorisationIf the number of disputes, early fraud warnings, refunds, or failed payments is high.Supprimez la règle qui autorise les paiements non valides.
BlocageIf the number of blocks is going down, but your fraud is still steady or increasing.Modifiez votre règle, car elle risque de ne plus être efficace.
Le nombre de blocages augmente, mais la fraude reste stable ou est en progression ?Modify your rule because it might block good users.
If the number of blocks is going up, and your fraud is going down.This might be an effective rule. Consider manually reviewing a few transactions to make sure you’re not blocking too many good users.
Vérification manuelleLe pourcentage de paiements vérifiés est-il faible ?Make the rule more restrictive because it might be too broad.
Le nombre de paiements réussis ou approuvés est-il élevé ?Remove the manual review rule entirely, or write an allow rule to target those payments.
If the number of refunds or disputes and early fraud warnings are high.Convertissez la règle en règle de blocage.

Request 3DS rules

For request 3DS rules, we display 3DS Requested, which is the number of times a rule triggered a 3DS request. You can click a 3DS rule to see the following metrics.

Règles d’autorisation

If you use Radar for Fraud Teams, you can view the following allow rules:

  • Allowed payments: The total number of payments allowed by your rules.
  • Volume, allowed payments: The total amount, in your local currency, associated with payments allowed by your rules.
  • Risk score: The corresponding risk outcomes assigned by our AI models to the set of payments allowed by your rules.
  • Disputes from overrides: The total number of allowed payments that were disputed.
  • Volume, disputes from overrides: The total amount, in your local currency, associated with disputes from allowed payments.

Remarque

If the disputed metrics are high, you might consider writing more narrowly targeted allow rules, to prevent allowing payments through that are eventually disputed.

Select an allow rule to see the following metrics:

Règles de blocage

You can view the following block rules:

  • Blocked payments: The total number of payments blocked by your rules.
  • Volume, blocked payments: The total amount, in your local currency, associated with payments blocked by your rules.

If you use Radar for Fraud Teams, you can also view the following:

  • Risk score: The corresponding risk outcomes assigned by our AI models to the set of payments allowed by your rules.
  • Est. false positive rate: The estimated percentage of non-fraudulent payments that were blocked for both your block rules as a set and by individual rules. These estimates are made using the estimated false positive rates of the corresponding AI risk scores, which we calculate with experiments across the Stripe network.
  • Est. fraudulent payments prevented: The estimated number of fraudulent payments that your block rules prevented. Stripe uses AI risk scores, calculated by analyzing millions of transactions across the Stripe network, to predict payments with a high probability of being disputed or declined because of fraud, and estimate which of those payments were successfully blocked by your rules.

Remarque

If the estimated false positive rate metrics are high, you might consider writing more narrowly targeted block rules or reviewing which payments are covered by the rule, to avoid blocking as many non-fraudulent payments.

Select a block rule to see the following metrics:

Règles de vérification

If you use Radar for Fraud Teams, you can view the following review rules:

  • Payments sent to review: The total number of payments sent to manual review by your rules.
  • Volume, approved reviews: The total amount, in your local currency, associated with approved payment reviews.
  • Refund rate: The percentage of reviews that were refunded.
  • Disputes from approved reviews: The total number of payments approved in your review, but were ultimately disputed.
  • Volume, disputes from approved reviews: The total amount, in your local currency, associated with disputes from approved payment reviews.

Select a review rule to see the following metrics:

Afficher l’historique des règles

Vous pouvez consulter l’historique des modifications apportées à vos règles Radar. Cette piste d’audit vous aide à comprendre quand une règle a été créée, modifiée, activée ou désactivée, et par quel utilisateur de votre équipe.

To see the activity for a specific rule, go to the Rules tab on the Radar page and click the name of the rule.

Le log Activité de la règle fournit un aperçu de toutes les modifications. Cliquez sur un événement particulier pour accéder à davantage de détails, notamment le prédicat complet de la règle avant et après la mise à jour. Seules les modifications des 180 derniers jours sont consultables.

Examiner régulièrement cette activité peut vous aider à établir une corrélation entre les modifications apportées aux règles et leur impact sur votre entreprise.

Regularly monitor your manual review queue

If your review queue is too large to manage, make sure you have the correct rules in place. If most reviews result in a refund because of fraud, consider additional rules to block payments. If most payments are approved, consider making your review rules more focused.

Analyse des paiements contestés et remboursés

Disputes are inherently linked to fraud, so the more you do to reduce fraud, the lower your dispute rate. Check to see if disputed payments share any similar characteristics (for example, from the same locations or of similar amounts). You can also perform this type of investigation by looking at payments that were refunded during a review. If you see trends, you can test and create the appropriate rules. If any payments appear to be fraudulent, refund and report them as fraud to avoid potential disputes.

Vous pouvez également utiliser nos produits de reporting Sigma et Data Pipelines pour interroger les données sur les litiges et les fraudes.

Vous pouvez répondre à tout litige entrant en utilisant le Dashboard ou l’API. Par ailleurs, notre documentation sur les litiges comprend plusieurs suggestions sur la façon de présenter un cas bien documenté.

Anticipate large changes to your business that might impact your fraud rate

If you’re planning any major product releases or changes to your service (for example, a new, high-value product or expanding your service into new countries), you might want to monitor these payments in the beginning. For these kinds of changes, it’s a good practice to set up some review rules so you can examine any new payments. Reviewing these payments and identifying patterns can help you set up new rules to help protect your business from fraud.

Les règles prennent en charge plusieurs moyens de paiement New

By default, Radar rules screen payments for cards, ACH, and SEPA Direct Debits for most users. We support the high risk block rule for all of these payment methods. If you use Radar for Fraud Teams or Radar for Platforms, we also support custom rules using the :payment_method_type: attribute to write rules that apply only to specific payment methods, for example: Block if :payment_method_type: = 'us_bank_account'. Learn more about supported attributes.

Élaborer des règles de compte

With Radar for Platforms, you can also add and manage account rules from the Rules tab on the Radar page in the Dashboard.

To add an account rule

  1. Cliquez sur + Ajouter une règle.
  2. Select the rule type: Review or Payout pause (which raises a review AND payout pause).
  3. Dans l’éditeur de règles, créez une règle en utilisant la syntaxe {action} if {attribute} {operator} {value} selon laquelle :
    • {action}: is how Radar responds when the rule criteria is met. This value is pre-populated based on the rule type you selected.
    • {attribute}: is the element of the payment to evaluate, such as the amount or card type. Begin typing with : to open a list of valid attributes.
    • {operator}: is how to compare the attribute to the value, such as =, >, !=, and so on.
    • {value}: is the value of the attribute to evaluate.
  4. Cliquez sur Tester la règle.
  5. Corrigez les erreurs de validation détectées, le cas échéant.
  6. On the Review new rule page, view the accounts that would match this rule today to confirm whether you want to enable it.
  7. Click Activate rule to apply this rule to all existing and future accounts.

Testing account-level rules takes longer than transaction testing, however we recommend testing to avoid unintentionally raising accounts for review or pausing automatic payouts. First, test raising accounts for review behavior. Then, test automatic payout pauses after you’re confident the rule impacts accounts as expected.

Voir aussi

  • 3DS rule examples
  • Continuous fraud management guide
  • Query disputes and fraud data
  • Rules reference
  • Supported attributes
Cette page vous a-t-elle été utile ?
OuiNon
  • Besoin d'aide ? Contactez le service Support.
  • Discutez par chat sur Discord avec les développeurs de Stripe.
  • Consultez notre log des modifications.
  • Des questions ? Contactez l'équipe commerciale.
  • LLM ? Lire llms.txt.
  • Propulsé par Markdoc
Sur cette page