A detection strategy is the object that is used to examine business data, such as invoices, payments or purchase orders, for potential fraud
The following figure shows the parts of a detection strategy:

- Detection Strategy ID: This is the name, or unique ID, that you give to a detection strategy.
- Investigation Reason: The investigation reason expresses the motivation for a detection strategy and is the key value for alerts. You must specify an investigation reason for each detection strategy that you define. The investigation reason lets you control how detection strategies create alerts if they examine the same detection objects. For example, the investigation reason lets you choose whether each detection strategy can open its own alert or whether the detection strategies share a single alert.
| Example |
|---|
Assume that you have several detection strategies that have the same investigation reason. One detection strategy has run and has created an alert. When the next strategy runs, its detection findings are added as alert items to the existing alert. Because the investigation reasons are the same, the strategies share an alert. |
- Detection Object Type:Detection methods and detection strategies are both specific to a single type of business data object - a detection object type. In the detection strategy, you define the detection object type that the strategy examines. You also determine which detection methods can be included in a detection strategy.
- Selection Parameters: Selection parameters let you limit the set of detection objects that are selected for processing by a strategy. You set values for the selection parameters. When you run the strategy, only detection objects that meet your selection criteria are processed by the strategy. With the selection parameters, you can, for example, set up specialized strategies that work on separate sets of detection objects.
- Authorization Group: You can optionally limit authorization to work with detection strategies. If you enter a value for authorization group, then a user must be authorized both for detection strategies and for the authorization group

