Monitor and detect suspicious access patterns in real-time
All access attempts
Suspicious requests
High-risk requests