Guard Manager in Narmi Command is your dedicated tool for investigating log-in events. It provides your staff with full visibility into log-in details, customer information, and outcomes, enabling them to troubleshoot issues and respond to high-risk activity. Importantly, Guard Manager is an investigation tool, not a processing queue like the ACH Manager or Wire Manager. Your institution can decide which log-in events require manual review and how often.
There are two main ways your staff can use Guard Manager:
Your team gets a call about a user being blocked, and a staff member will need to investigate and take action.
Staff members review blocked log-ins on a regular cadence according to your institution’s policies.
Guard Manager Permissions
To use Guard Manager, your staff must have the following permissions. To set permissions, from the Narmi Command sidebar, select Staff members > Roles.
Can view device evaluation – To have read-only access to Guard Manager
Can change device evaluation – To have edit access to Guard Manager
Investigation and Actions
Staff members can investigate events, take action, and add users to lists in Guard Manager. Staff can add and remove users from lists in Alloy.
Investigate Events
To investigate an event:
From the Narmi Command sidebar, select Guard.

The page opens to a customer list of log-in events, including the following information:
Customer/Member – The customer or member’s name
Event – The log-in attempt, either:
Login success – The user was able to successfully log in to Narmi Banking without multi-factor authentication (MFA) and was not stopped by Alloy.
MFA success – The user successfully logged in to Narmi Banking using MFA and was not stopped by Alloy.
Login blocked by evaluation – The user's login attempt was blocked due to Alloy's evaluation.
Outcome – The event result, either:
Accepted – No consequence
Blocked – Blocked from Narmi Banking, but they can still attempt to log in and potentially get access
Blocked and locked – Blocked from Narmi Banking, and their account is locked, so they cannot attempt to log in
Device ID – The identifier for a specific digital device
User Agent – The software application acting on behalf of a user to access web content
IP Address – The device IP address
Date – The date of the log-in event
Select the row of the customer you need to investigate. A side panel appears with event details. For blocked users, this includes the Outcome reason, or why the user was blocked (e.g., "high activity device behavior," "device ID on deny list").

From the details panel, you can review the following:
View all log-in events associated with a specific device ID or user agent – This includes which other users the device has accessed, to help confirm fraudulent patterns or identify other potentially compromised user accounts. In the Event details section, hover over the Device ID or User agent and select the magnifying glass icon that appears. A page of search results appears, displaying any other log-in events that matched the specific device ID and/or user agent.

View the user’s profile and their recent activity – In the User details section, select the user’s name, which opens their user profile.

If your institution has enabled the enhanced user profile, scroll to the Recent activity section to view recent events for the user.
View all outcome reasons and tags associated with this event – In the Event history section, select View details to open a dialog box.

Your institution defines the outcome reasons and tags in Alloy, and we can provide a starting template for you to use. Select View in Alloy to sign in to Alloy and open the detailed evaluation, which includes the user's full profile and relevant context.

Outcome reasons and tags include the following information:
INFO – An information tag without a specified risk level, for example, “Incognito mode.”
HI – A high-risk device signal. This typically blocks logins, such as those from bad bots or developer tools, for example, “High suspect score.”
MED – A medium-risk device signal. This will not block logins, but it may cause a transaction to be flagged, for example, “New device for user.”
LO – A signal that reduces the risk for a device, such as a device previously seen for that user or that has been added to a device allow-list, for example, “Returning device for user (10+ days)”
R# – This designates an outcome reason/rule, for example, “R6 High-risk device indicators.”
Take Action on Events
Once your staff has reviewed the event details, they can take action to reverse or enforce decisions on events. For example, if a user is accepted but calls in later to deem the log-in attempt as fraudulent, a staff member can report the event as fraudulent and take appropriate action. On the other hand, if a legitimate user is blocked due to legitimate reasons (e.g., new IP, traveling, etc.) a staff user may want to mark it as benign and put them on the allowlist so they don't have issues logging in.
From the detail panel, select the three dots menu for options.

The following actions are available:
Report benign – Select this option for false positives. For example, a shared branch laptop may have been flagged due to an unusually high level of activity.
You can select either:Add to IP address allow list
Add to device ID allow list
Note: Guard Manager blocks users from being added to the deny list if they are already on the allow list, and vice versa.

Once marked as benign, a banner appears at the top of the detail panel showing the name of the staff member who reviewed it.

Select View details to open a dialog box with additional information. Select View in Alloy to open the event details in Alloy.

Report fraudulent – Select this option for confirmed fraudulent events. You can select either:
Add to IP address deny list – This prevents traffic originating from the specified IP address.
Add to device ID deny list – This prevents the device from logging into any user account.
Lock customer account – Immediately lock the user’s account in the event of severe high-risk incidents.

Once marked as fraud, a banner appears at the top of the detail panel showing the name of the staff member who reviewed it.

Select View details to open a dialog box with additional information. Select View in Alloy to open the event details in Alloy.

Mark as reviewed – Select this option when staff have investigated the event, but there is insufficient evidence to confirm whether it was fraudulent or benign. A dialog box appears to enter additional information, such as an explanation for the decision. Select Submit.

Once marked as reviewed, a banner appears at the top of the detail panel showing the name of the staff member who reviewed it.

Select View details to open a dialog box with additional information. Select View in Alloy to open the event details in Alloy.

Once action has been taken, a checkmark appears next to the Event in Guard Manager to indicate that no further action is needed by colleagues.

Manage Lists in Alloy
You can manage allow and deny lists directly in Alloy, including adding or removing users from those lists. To access lists in Alloy, go to Settings > Lists and select the edit icon.

In Guard Manager, you cannot change events that were previously reported as either fraudulent or benign. But if a new log-in event occurs for a device ID or IP address that was previously reported as either fraudulent or benign, you can navigate to the new event to update the list. From Guard Manager, select the event row and on the detail panel of the new event, select the three dots > Report benign or Report fraudulent. In the dialog box that appears, select the link to open the list in Alloy and proceed to manually remove the device ID or IP address from the list.
