Behavioral Incidents
Detect, investigate, and resolve community anomalies
What is an Incident?
An incident is a detected behavioral anomaly—a deviation from your server's established patterns that is significant enough to warrant attention. BIE automatically detects incidents and alerts you based on their severity.
Incident Characteristics
- →Measurable Deviation
Clear statistical deviation from baseline (typically >15% change)
- →Time-Bounded
Occurs within a specific hour/day, not a gradual trend
- →Categorized Type
Classified into specific anomaly types for easier identification
- →Severity Assessed
Assigned a severity level (critical, high, medium, low)
- →Correlated Events
Linked to related incidents or events for context
Not All Anomalies Are Bad
Incident Types
BIE categorizes incidents by their behavioral pattern. Understanding the type helps you respond appropriately.
Activity Drop
Sudden significant decrease in overall server activity (messages, voice, events) compared to baseline.
When It Happens
Often indicates member exodus, server outage, or scheduled quiet period
Suggested Action
Check server status, investigate member retention, post engagement content
Activity Spike
Unusual surge in messages, voice activity, or member joins beyond expected patterns.
When It Happens
May indicate external event, content viral moment, or raiding/spam activity
Suggested Action
Verify legitimacy, investigate source, check for coordinated activity
Engagement Cliff
Rapid decline in member interactions (reactions, replies, participation) despite ongoing activity.
When It Happens
Suggests loss of community interest, controversial content, or moderation action
Suggested Action
Review recent discussions, assess content quality, gather member feedback
Mass Membership Change
Unusual number of members joining or leaving within a short timeframe.
When It Happens
Can indicate successful recruitment drive, external raid, or mass removal
Suggested Action
Verify member legitimacy, review recent invites, assess quality of new members
Pattern Deviation
Activity occurring at unusual times or from unusual channels, breaking established patterns.
When It Happens
May indicate bot activity, timezone changes, or unusual behavior from regular members
Suggested Action
Investigate source, check automation settings, verify member status
Voice Anomaly
Unusual voice channel activity, duration, or participant patterns.
When It Happens
Could indicate scheduled event, gaming marathon, or unusual gathering
Suggested Action
Check channel history, verify participants, assess legitimacy
Incident Severity Levels
Each incident is assigned a severity level that indicates urgency and potential community impact.
Severe deviation (>50% change)
Significant community impact requiring immediate review. Examples: 70% activity drop, mass member exodus, repeated spike incidents.
Major deviation (30-50% change)
Notable impact on community metrics. Close monitoring recommended. Examples: 40% activity increase, sudden engagement cliff, moderate mass joins.
Moderate deviation (15-30% change)
Noteworthy but not emergency-level. Worth investigating. Examples: 25% spike, channel-specific changes, isolated pattern deviation.
Minor deviation (<15% change)
Typical daily fluctuations or minor anomalies. Usually not actionable alone. Examples: slight time-of-day variations, single-channel blips.
Severity is Not Judgment
Investigating Incidents
When you receive an incident alert, follow these steps to understand what happened and determine appropriate action.
Review Incident Details
Open the incident from your alerts or incident dashboard. Review:
- • Type and severity classification
- • Specific metrics that changed
- • Comparison to baseline values
- • Exact time window of the anomaly
- • Affected channels or metrics
Check Activity Heatmaps
Navigate to the Activity Heatmaps section and:
- • Verify if the time window is an expected peak or trough
- • Check if the pattern matches established day/hour norms
- • Compare to previous weeks for recurring patterns
- • Identify if other activity types show similar anomalies
Review Channel History
Go to relevant channels and review activity during the incident window:
- • Look for announcements, controversial discussions, or moderation actions
- • Check pinned messages or recent thread activity
- • Verify if bot activity might have influenced metrics
- • Note any major community events or scheduled activities
Investigate Member Activity
For membership-related incidents:
- • Review recent member joins/leaves in member management
- • Check for invite links shared externally
- • Verify roles and permissions of new/departing members
- • Look for patterns suggesting organized activity
Consider External Context
Think about factors outside your server:
- • Marketing campaigns or content going viral
- • Scheduled events or live streams
- • External community news or drama
- • Timezone-specific events or holidays
- • Planned server downtime or maintenance
Create an Investigation Template
Correlating Incidents
BIE automatically identifies relationships between incidents that appear causally connected. Understanding correlations helps you see the full picture.
Common Correlation Examples
Mass Join → Activity Spike
New members joining causes increase in messages and activity as they introduce themselves and explore.
Announcement → Engagement Spike
Major announcement triggers reactions and discussions, showing community engagement with important news.
Moderation Action → Activity Drop
Deletion of spammy messages or removal of disruptive members immediately reduces anomalous activity.
Event Scheduling → Voice Spike
Organized gaming event or hangout causes burst of voice channel usage at scheduled time.
Pattern Deviation → Health Drop
Persistent unusual patterns across multiple incident types causes overall health score to decline.
Bidirectional Relationships
Resolving Incidents
After investigating an incident, you can mark it with a resolution status and optional notes. This helps BIE learn your community's patterns and improves future detection.
Resolution Actions
Resolved - Expected
The incident was expected/planned (scheduled event, announced change). Helps BIE distinguish between anomalies and planned activities.
Resolved - Addressed
You took action to address the incident (removed spam, posted announcement, etc.). Mark when problem is fixed.
Dismissed - False Positive
The incident was a false alarm or normal fluctuation. Mark incorrect detections to improve algorithm accuracy.
Dismissed - Benign
The incident is harmless (e.g., normal weekly pattern variation). Helps BIE learn your server's baseline.
Escalated - Needs Review
Flag serious incidents for leadership review or external investigation. Creates a review queue for moderation team.
Resolution Workflow
Acknowledge
Note the incident in your incident dashboard. Read the full details and severity assessment.
Investigate
Review correlated events, check channel activity, examine member behavior, look for external factors.
Context
Determine if the incident is expected (scheduled events, external collaborations) or concerning.
Action
Take appropriate action if needed (post announcement, investigate members, check settings).
Close
Mark incident as resolved, dismissed, or escalated. Provide optional notes for future reference.
Add Notes to Incidents
Incident Alert Notifications
BIE can notify you about detected incidents through various channels. Configure alerts to match your monitoring preferences.
Notification Channels
Discord Direct Message
Receive DM alerts directly for critical/high incidents in real-time
Dedicated Alerts Channel
Post incident alerts to a specific channel (e.g., #incidents or #mod-alerts)
Webhook Integration
Send alerts to external services (Slack, custom integrations) for multi-tool monitoring
Dashboard Notifications
View all incidents in the BIE dashboard with persistent history
Alert Customization
Severity Filtering
Choose which severity levels trigger alerts (only critical, critical+high, all levels)
Type-Specific Alerts
Configure different alert settings for different incident types
Quiet Hours
Set time windows to suppress non-critical alerts (e.g., night hours)
Threshold Adjustment
Fine-tune detection sensitivity based on your community's normal behavior
Alert Fatigue