Overview
Suspicious login refers to a login in a place other than the frequent login city. After suspicious login protection is enabled, the system will check whether the login IP address is in the frequent place and require identity verification if not.
Directions
Enabling suspicious login protection
2. In the Suspicious Login Protection section, set Suspicious Login Verification to . Disabling suspicious login protection
2. In the Suspicious Login Protection section, set Suspicious Login Verification to .
Was this page helpful?