Welcome to BRC Risk Management

BRC Risk Management helps you monitor and assess the financial risk of your business partners through automated integration with third-party risk data providers. This guide will help you understand the key concepts and get started with basic operations.

Key Concepts

Business Entities

Business Entities are the core records that store risk assessment data for companies. Each entity represents a company that you monitor, linked to your Business Central customers and vendors.

Key Information Stored:

Risk Levels

Risk Levels define how risk assessment data is categorized and displayed throughout Business Central.

Default Risk Levels:

Watchlists

Watchlists provide proactive monitoring by automatically checking entities against specific criteria and sending notifications when conditions are met.

Example Watchlist Criteria:

User Interface Overview

Risk Manager Role Center

The Risk Manager Role Center provides a centralized workspace for risk management activities:

Headlines Section:

Quick Actions:

Customer and Vendor Integration

Risk information is seamlessly integrated into standard Business Central pages:

Customer/Vendor Lists:

Customer/Vendor Cards:

Business Entity Management

Business Entity List:

Business Entity Card:

Your First Tasks

1. Explore the Risk Manager Role Center

  1. Access the Role Center

    • Use the role selector to switch to “Risk Manager”
    • Alternatively, search for “Risk Manager” in the navigation
  2. Review the Overview

    • Check the Risk Assessment Cues for current portfolio status
    • Note any existing entities and their risk distribution
    • Review recent activity in headlines section
  3. Familiarize with Navigation

    • Click through each main action to see available pages
    • Explore the menu structure and available reports
    • Bookmark frequently used pages

2. Understand Existing Data

If your organization has been using BRC Risk Management:

  1. Review Business Entities

    • Open the Business Entity List
    • Sort by Risk Level to see highest-risk entities first
    • Note update frequencies and last fetch dates
  2. Check Customer/Vendor Links

    • Open a Customer Card
    • Look for the Risk FactBox on the right side
    • Click “Fetch Risk Data” to see the data fetching process
  3. Examine API Usage

    • Check current month’s API call consumption
    • Review rate limits and remaining calls
    • Understand your organization’s usage patterns

3. Learn Basic Navigation

Search Functionality:

Page Navigation:

Filtering and Sorting:

Common First-Time User Scenarios

Scenario 1: Checking Customer Risk Before a Large Sale

Steps:

  1. Open the Customer Card for the specific customer
  2. Look at the Risk FactBox on the right side
  3. Review the Credit Score and Risk Level
  4. If data is old, click Fetch Risk Data to update
  5. Consider the risk factors in your sales decision

What to Look For:

Scenario 2: Setting Up Monitoring for Key Customers

Steps:

  1. Identify your most important customers for monitoring
  2. Open each Customer Card
  3. Click Add to Watchlist to set up monitoring
  4. Configure notification preferences
  5. Set appropriate risk thresholds for alerts

Monitoring Recommendations:

Scenario 3: Understanding Your Risk Portfolio

Steps:

  1. Open the Business Entity List
  2. Use the Risk Level column to understand distribution
  3. Filter to show only High and Critical risk entities
  4. Review update schedules to ensure data freshness
  5. Consider creating watchlists for systematic monitoring

Analysis Points:

Getting Help

Built-in Help

Documentation Resources

Support Contacts

Next Steps

For Basic Users

  1. Daily Operations - Learn common tasks
  2. Practice Navigation - Explore customer/vendor risk indicators
  3. Understand Reports - Review available risk reports
  4. Ask Questions - Connect with your risk manager or IT support

For Risk Managers

  1. Advanced Features - Master watchlists and automation
  2. Setup Review - Ensure optimal configuration
  3. User Training - Prepare materials for team training
  4. Process Integration - Align with existing business processes

For Administrators

  1. Reference Documentation - Technical specifications
  2. Permission Management - Configure role-based access
  3. Integration Planning - Connect with other business systems
  4. Performance Monitoring - Optimize system usage

Take time to explore the interface and understand your organization’s current risk data before moving to advanced features.