The document outlines an 8-phase process for appropriately tuning automated transaction monitoring scenarios to balance identifying suspicious activity while maximizing efficiency. Key aspects of the process include using statistical techniques like clustering to set baseline thresholds, qualitatively assessing "above" and "below" threshold samples, and iteratively refining thresholds based on case outcomes. The goal is to establish thresholds representative of the 85th percentile to define the cutoff between normal and unusual transactions.